刷题
导入试题
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
推荐试题
【多选题】
违反《公共场所卫生管理条例》的单位 , 卫生监督机构可以视情节轻重给予的 行政处罚为 ___ 。
A. 警告
B. 罚款
C. 暂扣 " 卫生许可证 "
D. 停业整顿
E. 通报
【多选题】
公共场所室内的新风不应来自___
A. 建筑物的走廊
B. 室外
C. 建筑物天棚吊顶内
D. 机房
E. 室内
【多选题】
公共场所哪些指标应符合国家卫生标准___
A. 空气和微笑气候
B. 采光和照明
C. 顾客用具
D. 噪声
E. 二次供水
【多选题】
公共场所室内噪声会对人体健康造成影响 , 主要包括 ___
A. 对神经系统的影响
B. 对听力的影响
C. 对消化系统的影响
D. 对心脏的影响
E. 对心理的影响
【多选题】
公共场所卫生标准中规定的场所内空气中的化学指标包括 ___
A. 一氧化碳
B. 温度
C. 可吸入颗粒物
D. 新风量
E. 甲醛
【多选题】
公共场所内可能通过公共用品用具传播的传染病包括 ___
A. 呼吸道传染病
B. 肠道传染病
C. 艾滋病
D. 性病
E. 皮肤病
【多选题】
候诊室的卫生操作要求包括___。
A. 室内应采用湿式清扫
B. 候诊室内不设共用饮水杯
C. 室内禁止吸烟
D. 不得在候诊室内出售商品和食物
E. 卫生间应随时清扫、消毒、保洁
【多选题】
住宿场所的卫生管理制度包括___。
A. 洗衣房卫生管理制度
B. 健康危害事故与传染病报告制度
C. 证照管理制度
D. 集中空调通风系统卫生管理制度
E. 设施设备维护保养制度
【多选题】
宾馆饭店中的公共用品用具主要包括 ___
A. 剃须刀
B. 床上用品
C. 洗浴用品
D. 牙刷
E. 杯具
【多选题】
为保证公共用品的消毒效果所必须采取消毒程序为 ___
A. 去污清洗
B. 消毒
C. 清水冲净
D. 保洁存放
E. 浸泡消毒
【多选题】
公共场所卫生监督员应具备的条件包括___
A. 大专以上学历
B. 准确运用法律法规
C. 正确执行执法程序
D. 良好的道德水平
E. 熟练掌握相关卫生规范和标准
【多选题】
公共场所卫生监督执法的法规体系包括 ___ 。
A. 传染病防治法
B. 公共场所卫生管理条例
C. 公共场所卫生标准
D. 化妆品卫生监督条例
E. 公共场所集中空调通风系统卫生管理办法
【多选题】
公共场所经常性卫生监督工作包括 ___ 。
A. 卫生监测
B. 图纸审查
C. 卫生技术指导
D. 建筑布局
E. 行政处罚
【多选题】
公共场所经常性卫生监督的基本方法是___
A. 现场观察
B. 询问调查
C. 卫生监测
D. 现场记录
E. 监督指导
【多选题】
《条例》规定的各类公共场所均涉及到的卫生监督内容有___
A. 卫生管理制度
B. 空调系统卫生状况
C. 卫生设施情况
D. 公共用品用具
E. 卫生许可证
【多选题】
公共场所卫生监督量化分级管理的评分依据包括___
A. 法律法规
B. 卫生标准
C. 服务水平
D. 价格水平
【多选题】
住宿场所棉织品清洗消毒描述是正确的有___。
A. 棉织品清洗消毒前后应分设存放容器
B. 清洗程序应设有高温或化学消毒过程
C. 棉织品必须由本单位清洗消毒,不得外送洗消毒。
D. 客用棉织品、客人送洗衣物、清洁用抹布应分类清洗。
E. 使用专用运输工具及时运送至储藏间保存。
【多选题】
公共场所必须符合下列卫生要求___
A. 室内空气卫生达到标准
B. 微小气候适宜
C. 噪声符合标准
D. 采光、照明良好
E. 用具、卫生设施、用水达到卫生标准
【多选题】
公共场所经营者申请卫生许可证时应当提交的资料包括___
A. 卫生许可证申请表;
B. 法定代表人或者负责人身份证明;
C. 公共场所卫生管理制度;
D. 卫生设施平面布局图;
E. 公共场所卫生检测或者评价报告
【多选题】
公共场所经营者有下列哪些情形,可由县级以上卫生行政部门责令限期改正;逾期不改的,给予警告,并处以一千元以上一万元以下罚款___
A. 未建立卫生管理档案的
B. 未按照规定索取公共卫生用品检验合格证明和其他相关资料的;
C. 未按照规定对公共场所新、改、扩建项目办理预防性卫生审查手续的;
D. 未按照规定办理公共场所卫生许可证复核手续的;
E. 安排未获得有效健康合格证明的从业人员从事直接为顾客服务工作的。
【多选题】
公共场所经营单位在禁止吸烟方面应该履行哪些职责?___
A. 公共场所经营者应当设臵醒目的禁止吸烟警语和标志。
B. 室外公共场所设臵的吸烟区不得位于行人必经的通道上。
C. 公共场所不得设臵自动售烟机。
D. 公共场所经营者应当开展吸烟危害健康的宣传,并配备专(兼)职人员
E. 对抽烟者实施罚款。
【判断题】
卫生监督是一种卫生行政执法行为。
A. 对
B. 错
【判断题】
卫生监督是对公共卫生领域全部活动所进行的监督检查。
A. 对
B. 错
【判断题】
卫生监督是卫生监督主体实施的行政行为
A. 对
B. 错
【判断题】
卫生监督检查是依卫生法律、法规、规章的规定 , 对公民、法人或者其他的组织守法和履行法定义务的情况实施的检查、了解和 监督的行政行为。
A. 对
B. 错
【判断题】
卫生监督检查是实现卫生监督目的的必不可少的手段和方法。
A. 对
B. 错
【判断题】
具有行政管理职能的行政机关或机构是卫生监督检查的主体。
A. 对
B. 错
【判断题】
行政管理区域的全体公民、法人或者其他组织是卫生监督检查的对象。
A. 对
B. 错
【判断题】
卫生行政部门的工作人员均有权施行卫生监督检查。
A. 对
B. 错
【判断题】
根据目前我国卫生法律法规的规定 , 在相对人拒绝的情形下卫生监督员应当强行实施卫生监督检查。
A. 对
B. 错
【判断题】
根据目前我国卫生法律法规的规定 , 在相对人不配合的情形下卫生监督员无法实现卫生监督检查。
A. 对
B. 错
【判断题】
卫生行政部门及其卫生监督员在进行卫生监督检查过程中 , 对涉及相对人的商业秘密、私人隐私等事项要予以保密。
A. 对
B. 错
【判断题】
行政机关可以根据工作需要 , 作出影响公民、法人和其他组织权利和义务的决定。
A. 对
B. 错
【判断题】
行政机关要平等对待行政管理相对人 , 不偏私、不歧视。
A. 对
B. 错
【判断题】
行政机关可任意行使自由裁量权。
A. 对
B. 错
【判断题】
行政机关可以根据工作需要 , 随时撤销或变更已经生效的行政决定。
A. 对
B. 错
【判断题】
卫生监督管辖是指关于不同级别和不同地域的卫生行政部门实施卫生监督权限的分工。
A. 对
B. 错
【判断题】
卫生行政执法人员作出的具体行政行为应符合管辖和职权范围。
A. 对
B. 错
【判断题】
卫生行政部门在实施处罚时按照违法行为发生地的管辖标准行使管辖权。
A. 对
B. 错
【判断题】
按照法律规定 , 由上级卫生行政部门实施的卫生行政许可 , 下 级卫生行政部门不得实施 , 相反 , 由下级卫生行政部门实施的卫生行政许可 , 上级卫生行政部门可以实施。
A. 对
B. 错
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用