刷题
导入试题
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
推荐试题
【多选题】
24:保险专业代理公司与客户进行金融交易并通过本行账户划转款项的,由本行通过省联社反洗钱系统按照人民银行相关要求提交___
A. 大额交易报告
B. 可疑交易报告
C. 大额和可疑交易报告
D. 无需提交任何报告
【多选题】
25:非自然人客户银行账户与其他的银行账户发生当日单笔或者累计交易人民币___万元以上(含)、外币等值()万美元以上(含)的款项划转,应当通过反洗钱系统提交大额交易报告。
A. 100、10
B. 200、20
C. 50、5
D. 20、1
【多选题】
26:自然人客户银行账户与其他的银行账户之间发生当日单笔或者累计交易人民币___万元以上(含)、外币等值()万美元以上(含)的跨境款项划转,应当通过反洗钱系统提交大额交易报告。
A. 20、1
B. 20、5
C. 50、10
D. 50、5
【多选题】
27:银行在办理开户业务时,发现个人冒用他人身份开立账户的,应当及时向___。
A. 公安机关报案并将被冒用的身份证件移交人民银行当地分支机构
B. 人民银行当地分支机构报告并将被冒用的身份证件移交公安机关
C. 公安机关报案并将被冒用的身份证件移交公安机关
D. 人民银行当地分支机构报告并将被冒用的身份证件移交人民银行当地分支机构
【多选题】
28:属于汇款机构、外币兑换机构行业的客户,其风险等级可以评定为___客户。
A. 高风险
B. 中风险
C. 低风险
D. 无风险
【多选题】
29:下列属于大额交易的是___
A. 一笔25万元人民币的现金汇款
B. 自然人银行账户与其他银行账户之间当日累计18万元人民币的跨境款项划转
C. 自然人银行账户与其他银行账户之间当日累计45万元人民币的境内款项划转
D. 单位银行账户之间一笔150万元人民币的转账
【多选题】
30:资产所有人、控制人或者管理人对本行依据规定采取的对涉及恐怖活动的资产冻结措施有异议的,告知其可以向___提出异议。
A. 资产所在地县级公安机关
B. 资产所在地市级公安机关
C. 住所在地县级公安机关
D. 住所在地市级公安机关
【多选题】
31:《客户身份识别和客户身份资料及交易记录保存管理办法》规定,本行在与客户的业务存续期间,应当采取___客户身份识别措施。
A. 一次性的
B. 间隔的
C. 持续的
D. 定期的
【多选题】
32:临柜人员在办理业务过程中发现客户一般可疑交易的应当___
A. 及时向网点反洗钱联络员报告,报送可疑交易
B. 及时采取措施和扣押犯罪嫌疑人
C. 及时以书面形式向中国反洗钱监测中心报告
D. 马上报警
【多选题】
33:各支行成立反洗钱工作实施小组,由支行行长任组长、主管会计任副组长、各网点负责人为小组成员。指定各支行___为各支行的反洗钱管理员,指定( )为各营业网点的反洗钱工作人员。
A. 主管会计、网点负责人
B. 行长、网点负责人
C. 副行长、网点负责人
D. 副行长、主管会计
【多选题】
34:本行各营业机构为自然人客户办理人民币单笔___万元(含)以上或者外币等值()万元美元(含)以上的现金存取及转账业务时,应核对客户的有效身份证件或其他身份证明文件并摘录身份证号码(或在综合前端系统内录入身份证号码)。
A. 10、1
B. 5、1
C. 20、10
D. 10、5
【多选题】
35:本行反洗钱业务受到监管处罚时,由内部核算单位承担罚款,在当期考核利润额中调减,同时根据监管机构“双罚”金额合并计算后总金额的___进行追责。
A. 50%
B. 10%
C. 15%
D. 20%
【多选题】
36:按照账户分类管理有关要求,目前本行Ⅲ类户任一时点余额为不超过___元, Ⅲ类户非绑定账户转入、转出、消费和缴费日累计限额为()元,年累计限额为()元。
A. 1000,5000,10万
B. 1000,2000,5万
C. 2000,2000,5万
D. 2000,2000,10万
【多选题】
37:单位结算账户启用前账户状态为___,启用后为()状态,()后方可对外付款(次日生效,节假日顺延)。
A. 不收不付,只收不付,3个自然日
B. 不收不付,只收不付,3个工作日
C. 不收不付,不收不付,3个自然日
D. 不收不付,不收不付,3个工作日
【多选题】
38:自___起,银行业金融机构(以下简称银行)为个人开立银行结算账户的,同一个人在同一家银行(以法人为单位,下同)只能开立一个Ⅰ类户,已开立Ⅰ类户,再新开户的,应当开立Ⅱ类户或Ⅲ类户。
A. 2017年1月1日
B. 2016年12月1日
C. 2017年12月1日
D. 2018年1月1日
【多选题】
39:自2017年1月1日起,银行对经设区的市级及以上公安机关认定的出租、出借、出售、购买银行账户的单位和个人及相关组织者,假冒他人身份或者虚构代理关系开立银行账户的单位和个人,___内暂停其银行账户非柜面业务,()内不得为其新开立账户。
A. 5年,3年
B. 3年,1年
C. 5年,5年
D. 3年,3年
【多选题】
40:银行应当至少___排查企业是否属于严重违法企业,情况属实的,应当在3个月内暂停其业务,逐步清理。
A. 每月
B. 每季度
C. 每半年
D. 每一年
【多选题】
41:客户在手机银行、网银内使用关键字搜索“企业预开户”,即可进入预约页面。如客户未开通我行社手机银行、网银,___进行预约开户。
A. 需先在我行开通手机银行或者网银后
B. 可以游客身份
C. 无权
【多选题】
42:资金内部户的账号第十一位为___。
A. 6
B. 7
C. 8
D. 9
【多选题】
43:下列业务代号中用于核算单位临时周转使用的资金的是___。
A. 1963
B. 3475
C. 3453
D. 1964
【多选题】
44:下列业务代号中用于核算应交代扣印花税的是___。
A. 3490
B. 3491
C. 3465
D. 3474
【多选题】
45: 置换贷款本金上划时,使用6674交易将内部账资金转入 3475过渡户,然后使用___交易, 将过渡户资金转入上级机构3475过渡户,上级机构统一入账。
A. 6674
B. 6747
C. 8080
D. 3475
【多选题】
46:临时户有效期最长不超过___。
A. 一年
B. 两年
C. 三年
D. 四年
【多选题】
47:下列有关【1058】单位活期账户启用交易的说法,错误的是___。
A. 基本户启用时,取现标志系统默认为可取现;
B. 临时户启用时,取现标志系统默认为可取现;
C. 一般户启用时,取现标志系统默认为可取现;
【多选题】
48:关于久悬账户管理,下列说法正确的是___
A. 已转为久悬的账户,账户控制状态为不收不付;
B. 已转为营业外收入的账户,账户控制状态为只收不付;
C. 账户从营业外支出转正常后,不可再次使用,需办理销户手续;
D. 账户从久悬户转正常后,不可再次使用,需办理销户手续。
【多选题】
49:【1132】单位账户维护交易,以下维护事项说法正确的是 ___
A. 机构证件类型、证件号码为客户的关键信息,在本交易中可以修改;
B. 可以增加除主证件类型外的其他证件号码;
C. 可以通过本交易实现变更基本户开户行行名、行号、账号、开户许可证号码等信息;
D. 可以通过本交易维护验资户转为基本户。
【多选题】
50:七天理财开户时,应选择的转存方式是下列转存方式中的哪一个? ___
A. 默认转存
B. 不转存
C. 本息转存
D. 本金转存
【多选题】
51:对于个人账户开户1052交易,以下说法错误的是___?
A. 不需要上传新开存单;
B. 需要上传个人业务交易单正、背面;
C. 个人业务交易单背面填写和勾选必须与系统一致;
D. 1052业务不需要拍摄现金。
【多选题】
52:以下关于单据和凭证规范使用说法错误的是哪一个?___
A. 制式凭证中的勾选项可以修改,需修改的应在错误处加盖柜员私章,且修改不能超过三处,超过三处的应重新填写凭证。
B. 凭证的修改不允许使用修正液,使用修正液的凭证应做作废处理,重新填写。
C. 各种单折上应在规定的位置加盖业务章或公章,没有盖章的视为无效凭证。
D. 个人有卡(折)存取款、存单(折)正常销户不必填制个人业务交易单。
【多选题】
53:电汇凭证、进账单,___日内的视为有效凭证。
A. 1
B. 2
C. 3
D. 4
【多选题】
54:9月28日开出的转账支票,其有效期为___。
A. 9月28日-10月8日
B. 9月28日-10月7日
C. 9月29日-10月8日
D. 9月29日-10月7日
【多选题】
55:根据账户分类管理要求,同一客户在各法人行社Ⅰ类户不超过___个。
A. 1
B. 2
C. 3
D. 4
【多选题】
56:根据账户分类管理要求,同一客户在全省各级行社卡数量限额为___个。
A. 4
B. 6
C. 7
D. 8
【多选题】
57:根据账户分类管理要求,同一客户在全省各法人行社Ⅱ、Ⅲ各不超过___个。
A. 4
B. 5
C. 6
D. 7
【多选题】
58:根据账户分类管理要求及省联社暂定标准,同一客户在全省Ⅱ、Ⅲ各不超过___个。
A. 4
B. 10
C. 40
D. 50
【多选题】
59:银行业金融机构在收缴假币过程中,一次性发现假人民币( )张、枚(含)以上,假外币( )张、枚(含)以上的,应当立即报告当地公安机关并提供有关线索。___
A. 20,10
B. 10,5
C. 10,5
D. 20,5
【多选题】
60:根据公安部和中国人民银行联合下发了《关于进一步加强反假货币工作的通知》(公通字〔2009〕43号)要求,银行业金融机构一次性发现假人民币___元(含)以上的,要立即通报公安机关,一次性发现假人民币( )元(含)以上的,要在当天通报公安机关。
A. 500,100
B. 500,200
C. 400,100
D. 400,200
【多选题】
61:银行业金融机构收缴的假币应在每月末前___日内解缴中国人民银行当地分支行。
A. 1
B. 2
C. 3
D. 4
E. 5
【多选题】
62:冠字号码信息在金融机构本地及上传到信息系统后至少应保存___个月,并确保数据的安全。
A. 1
B. 2
C. 3
D. 6
【多选题】
63:银行业金融机构应组织对本机构所辖网点前___工作日上传的冠字号码信息的完整性进行核查。
A. 1
B. 2
C. 3
D. 4
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用