刷题
导入试题
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
推荐试题
【多选题】
硝酸酯类药物的药理作用有哪些___
A. 扩张冠状动脉
B. 增加心脏侧支循环血流
C. 扩张周围血管,减低心脏前后负荷
D. 降低血小板黏附
E. 抗动脉粥样硬化
【多选题】
血脂包括___
A. 胆固醇
B. 三酰甘油酯
C. 磷脂
D. 游离脂肪酸
E. 脂蛋白
【多选题】
脂蛋白可分为___
A. 乳糜微粒
B. 极低密度脂蛋白
C. 中密度脂蛋白
D. 高密度脂蛋白
E. 低密度脂蛋白
【多选题】
氨茶碱可引起___
A. 恶心呕吐
B. 心律失常
C. 血压下降
D. 中枢兴奋
E. 中枢抑制
【多选题】
能选择性兴奋受体的药物是___
A. 肾上腺素
B. 克仑特罗
C. 去甲肾上腺素
D. 舒喘宁
E. 麻黄碱
【多选题】
平喘药物包括___
A. 二丙酸倍氯米松
B. 沙丁胺醇
C. 异丙肾上腺素
D. 色甘酸钠
E. 氨茶碱
【多选题】
根除幽门螺杆菌感染联合用药治疗方案中包括以下哪三种药物___
A. 奥美拉唑
B. 阿莫西林
C. 雷尼替丁
D. 甲硝唑
E. 硫糖铝
【多选题】
消化性溃疡病的常见并发症有___
A. 出血
B. 穿孔
C. 幽门梗阻
D. 栓塞
E. 癌变
【多选题】
急性胃肠炎的临床表现包括___
A. 剧烈腹泻
B. 发热
C. 频繁呕吐
D. 脱水
E. 腹痛
【多选题】
下列哪些药物可以用来治疗急性肠胃炎___
A. 甲氧氯普胺
B. 山莨菪碱
C. 氨苄西林
D. 洛哌丁胺
E. 双八面体蒙脱石
【多选题】
下列哪种因素可阻碍铁剂吸收___
A. 浓茶
B. 稀盐酸
C. 四环素
D. 维生素C
E. 碳酸氢钠
【多选题】
铁制剂可用于下列哪些原因引起的贫血___
A. 机体需要量增加(妊娠、儿童生长发育期)
B. 内因子缺乏
C. 慢性失血
D. 由于造血功能减退
E. 萎缩性胃炎
【多选题】
泌尿道感染的一般治疗原则___
A. 多饮水、勤排尿,注意会阴部的清洁卫生
B. 避免使用尿路器械,尽可能除去结石、梗阻等易感因素
C. 在未使用抗生素之前,先做尿细菌培养及药敏试验
D. 做好泌尿道感染的定位诊断,治疗方案的选择不同,疗程亦不同
E. 临床症状的缓解,并不意味着细菌学治愈
【多选题】
治疗泌尿道感染的常用药物有___
A. -内酰胺类抗生素
B. 氨基苷类抗生素
C. 喹诺酮类
D. 磺胺药和甲氧苄啶
E. 四环素和氯霉素
【多选题】
荨麻疹的药物治疗原则___
A. 控制或干扰变态反应发生、发展的某个环节,从而减轻生理功能紊乱或组织损伤
B. 缓解变态反应性疾病的症状,减轻患者痛苦
C. 非特异性控制抗原抗体反应,尽量减少糖皮质激素、免疫调节药与免疫抑制药等的不良反应
D. 预防和控制继发感染
E. 尽量避免吃海鲜
【多选题】
下列哪些药物可以用来治疗荨麻疹___
A. 氯雷他定
B. 氯苯那敏
C. 氯氮卓
D. 雷尼替丁
E. 地塞米松
【多选题】
荨麻疹的常见病因有___
A. 食物
B. 药物
C. 物理因素
D. 动物
E. 感染
【多选题】
治疗甲状腺危象可以选用下列哪些药物___
A. 小剂量碘剂
B. 复方碘溶液
C. 普萘洛尔
D. 大剂量PTU
E. 糖皮质激素
【多选题】
大剂量碘剂可用于___
A. 甲亢手术前准备
B. 甲亢的内科治疗
C. 甲状腺危象
D. 单纯性甲状腺肿
E. 呆小病
【多选题】
下列哪些是糖尿病的并发症___
A. 双目失明
B. 酮症酸中毒
C. 感染
D. 血管病变
E. 高渗性昏迷
【多选题】
治疗糖尿病的药物包括___
A. 硫脲类
B. 磺酰脲类
C. 双胍类
D. 胰岛素
E. -葡萄糖苷酶抑制剂
【多选题】
慢性咽炎者需应用口含片使用时注意___
A. 应把药片置于舌根部,并尽量贴近咽部
B. 为避免过敏反应发生,含后应及时漱口
C. 含服后30分钟内不宜进食或饮水
D. 含服时不宜咀嚼或吞咽
E. 发生过敏、皮疹、瘙痒等反应,及时停药
【多选题】
慢性肥厚性咽炎的表现___
A. 咽黏膜充血、色暗红
B. 咽后壁有淋巴滤泡增生
C. 扁桃体充血、肿大
D. 咽部有异物感、痒感、痰多
E. 进食困难
【多选题】
慢性咽炎的类型有___
A. 慢性过敏性咽炎
B. 慢性单纯性咽炎
C. 慢性肥厚性咽炎
D. 萎缩性及干燥性咽炎
E. 慢性反流性咽炎
【多选题】
下列有关便秘的叙述中哪些是正确的___
A. 排便频率减少
B. 排便困难,粪便干结
C. 习惯性便秘,多发生于中、老年人
D. 正常人排便的标准是1次/d
E. 便秘伴呕吐、肠绞痛提示肠梗阻
【多选题】
下列药物中,经常服用可引起便秘的有___
A. 吗啡
B. 酚酞
C. 阿托品
D. 硫糖铝
E. 安定
【多选题】
便秘的发生机制包块下列哪几项___
A. 肠道内肌肉张力减低和蠕动减弱
B. 排便过程的神经活动障碍
C. 摄入食物过少或纤维素及水分不足
D. 肠蠕动受阻碍
E. 排便的相关肌肉活动障碍
【多选题】
下列属于功能性便秘的原因有___
A. 食物中缺乏纤维素
B. 老年人腹肌及盆肌张力不足
C. 结肠冗长
D. 甲状腺功能低下
E. 经常应用吗啡止痛
【多选题】
泻药只要用于___
A. 急、慢性便秘
B. 排出肠内有害物质
C. 服中药后
D. 痔疮患者
E. 急腹症患者
【多选题】
泻药分类为___
A. 急性泻药
B. 渗透性泻药
C. 接触性泻药
D. 润滑性泻药
E. 慢性泻药
【多选题】
急性扁桃体炎病毒感染的病原体包括___
A. 鼻病毒
B. 腺病毒
C. 呼吸道合胞病毒
D. 副流感病毒
E. 流感病毒
【多选题】
下列哪些是急性扁桃体炎的临床表现___
A. 发病急骤,局部症状以明显咽痛为主要表现
B. 可有畏寒、发热、头痛、全身不适、乏力等症状
C. 儿童患者常伴有食欲下降、呕吐、腹泻、腹痛等消化道症状
D. 可并发急性肠系膜淋巴结炎
E. 细菌感染者白细胞和中性粒细胞增高,有核左移现象
【多选题】
下列可用于治疗沙眼的非处方药有___
A. 磺胺醋纤纳滴眼液
B. 硫酸锌滴眼液
C. 酞丁安滴眼液
D. 红霉素眼膏
E. 庆大霉素滴眼液
【多选题】
下列可用于治疗急性结膜炎的非处方药有___
A. 磺胺醋纤纳滴眼液
B. 硫酸锌滴眼液
C. 酞丁安滴眼液
D. 红霉素眼膏
E. 庆大霉素滴眼液
【多选题】
关于小儿发育阶段下列说法正确的是___
A. 小儿发育可分为新生儿期、婴幼儿期、儿童期和少年期
B. 新生儿期为出生后28天内
C. 婴幼儿期为出生后1个月~3岁
D. 儿童期为3~12岁
E. 少年期为12~16岁
【多选题】
可促进新生儿黄疸或核黄疸发生的药物有___
A. 安钠咖
B. 磺胺
C. 维生素K1
D. 青霉素
E. 地西泮
【多选题】
小儿用药应注意___
A. 绝不滥用,尤其注意不能滥用抗生素、维生素、解热镇痛药及丙种球蛋白
B. 严格掌握剂量,注意用药间隔,必须时监测血药浓度
C. 选择适当的给药途径,为防止婴幼儿哭闹,静脉滴注要快
D. 又能吃奶的孩子尽量采用口服给药
E. 较大的婴幼儿,循环较好,可用肌内注射
【多选题】
下列哪几种药小儿的用量可相对偏大___
A. 苯巴比妥
B. 安钠咖
C. 氨茶碱
D. 巴比妥
E. 吗啡
【多选题】
以下药物有明确的致畸作用的是___
A. 沙利度胺
B. 卡马西平
C. 庆大霉素
D. 可卡因
E. 乙醇
【多选题】
下列药物可以经过乳汁转运进入婴儿体内产生毒害作用的是___
A. 甲硝唑
B. 麦角新碱
C. 异烟肼
D. 阿司匹林
E. 地西泮
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用