刷题
导入试题
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AC
解析
暂无解析
相关试题
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
【单选题】
1.三相刀开关的图形符号与交流接触器的主触点符号是___。
A. 一样的
B. 可以互换
C. 有区别的
D. 没有区别
【单选题】
2.刀开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
3.行程开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
4.交流接触器的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
5.熔断器的作用是___。
A. 短路保护
B. 过载保护
C. 失压保护
D. 零压保护
【单选题】
6.热继电器的作用是___。
A. 短路保护
B. 过载保护
C. 失压保护
D. 零压保护
推荐试题
【单选题】
基础主梁在高度变截面处,上下钢筋深入支座长要达到什么要求( )___  
A. 深入支座长要满足 La       
B. 深入支座长要满足 1000mm   
C. 深入支座长要满足 15d    
D. 深入支座长要满足 2 倍的梁高
【单选题】
下列关于基础梁端部有外伸情况的钢筋构造说法正确的是( )___      
A. 纵筋伸至梁端弯折 12d    
B. 纵筋伸至梁端弯折 15d    
C. 上部第二排筋伸入支座内,长度为 lae 
D. 上部第二排筋伸至支座对边弯折 15d,而不必伸至悬挑端弯折
【单选题】
承台下部钢筋端部到桩里皮小于 35d 时,承台钢筋需向上弯折多少___      
A. 15d     
B. 12d     
C. 承台厚/2    
D. 10d
【单选题】
___" 
A. 15d  
B. 12d  
C. 10d    
D. La
【单选题】
下面哪种不是灌注桩配筋构造(   )___ 
A. 通长等截面配筋
B. 通长变截面配筋
C. 部分长度等截面配筋
D. 部分长度变截面配筋
【单选题】
条形基础分布钢筋起步距离是()___
A. 50
B. 100       
C. s/2与75取小     
D. S
【单选题】
灌注桩的加劲筋如果设计未注明时应按照多大直径算()___
A. 8  
B. 10
C. 12
D. 16
【单选题】
基础梁外伸构造中当外伸长度小于la时,基础梁下部钢筋应伸至端部后弯折,且从柱内边算起水平段长度≥0.6lab,弯折长度为()___        
A. 12d       
B. 15d       
C. 150       
D. 10d
【单选题】
基础梁的侧面抗扭钢筋的锚固和搭接分别是多少()___
A. 150150
B. 150,lle       
C. la,ll    
D. lae,Lle    
【单选题】
梁板式筏形基础梁端部无外伸构造中伸至尽端钢筋内侧弯折长度为()___
A. 6d
B. 12d       
C. 15d       
D. 20d
【单选题】
基础梁侧面纵向构造钢筋的搭接长度为()___
A. 6d
B. 12d       
C. 15d       
D. 20d
【单选题】
基础梁侧面的拉筋直径筋除注明者均为()___
A. 6  
B. 8  
C. 10
D. 12
【单选题】
基础次梁端部外伸构造中,当从基础主梁内边算起的外伸长度不满足直锚要求时,基础次梁下部钢筋应伸至端部后弯折()___        
A. 6d
B. 12d       
C. 15d       
D. 20d
【单选题】
非框架梁下部钢筋采用弯锚的时候带肋钢筋伸入端支座长度要满足大于( )___      
A. 10d       
B. 7.5d     
C. 15d        
D. 12d
【单选题】
楼梯支座上部纵筋、下部纵筋之间以“( )”分割___      
A. /   
B. :
C. ;
D. +
【单选题】
GTJ2018软件中斜条基下的斜垫层如何快速布置?(    ) ___   
A. 新建点式垫层,按条基中心线智能布置
B. 新建线式垫层,按条基中心线智能布置        
C. 新建面式垫层,按条基中心线智能布置
D. 新建线式垫层,直线绘制,垫层会自适应条基标高
【单选题】
筏板基础的保护层输入为25/35/40,其中35表示的是(  )保护层。___      
A.   顶面        
B. 底面    
C. 侧面  
D. 顶、底、侧面
【单选题】
在GTJ2018CAD识别时,转换钢筋符号使用哪个功能?___     
A. CAD操作下的查找替换    
B. 查找图元    
C. 钢筋三维    
D. 属性列表内
【单选题】
在GTJ2018中用户在使用软件时不小心将“图层管理”关闭,如何再次启用它?___
A. 视图-图层管理   
B. 工具-图层管理    
C. 云应用-图层管理        
D. 开始-图层管理
【单选题】
在GTJ2018中平板变斜的功能有( )?___       
A. 三点变斜、抬起点变斜、坡度变斜皆可
B. 智能布置    
C. 按梁分割板        
D. 取消升降板
【单选题】
___" 
A. 测量区域面积   
B. 测量两点间距离     
C. 长度标注   
D. 对齐标注
【单选题】
工程中绘制了跨层的构件,如何才能显示跨层图元?(  )___ 
A. 工具-选项-绘制设置-显示跨层图元
B. 建模-通用操作-显示跨层图元  
C. 视图-用户面板   
D. 构件右键属性
【单选题】
GTJ2018产品的全名是?___ 
A. 广联达BIM土建计量平台        
B. 广联达BIM土建算量软件        
C. 广联达云计量平台    
D. 广联达BIM土建计量软件
【单选题】
在GTJ2018中默认汇总计算的快捷键是什么?___    
A. F9
B. F10       
C. F11       
D. F12
【单选题】
在GTJ2018中如何将图元存盘方便重复使用?___    
A. 图元存盘+图元提取  
B. 跨图层选择
C. 添加前后缀
D. 构件提取
【单选题】
在GTJ2018工程中每个楼层卫生间比楼层标高低一点,可以先调整卫生间位置的板的标高,然后使用什么功能,可快速完成柱、梁、墙构件标高的调整(  )。___     
A. 平齐板顶         
B. 修改属性里的标高   
C. 定义斜板   
D. 查改标高
【单选题】
基础层查看大开挖土方工程量时,素土回填体积扣除了房间,但是基础层没有房间,原因是?___
A. 首层标高比室外地坪低    
B. 首层标高比室外地坪高    
C. 修改计算设置即可    
D. 软件计算错误,重新汇总即可
【单选题】
___" 
A. 新建参数化独基
B. 新建异形独基
C. 新建自定义独立基础
D. 不能处理
【单选题】
在GTJ2018中,什么情况下筏板基础会计算斜面面积___   
A. 设置边坡    
B. 设置角度    
C. 设置变截面
D. 设置斜面面积
【单选题】
在GTJ2018中柱、墙柱纵筋搭接接头错开百分率在哪个位置调整?___
A. 计算设置    
B. 节点设置    
C. 搭接设置        
D. 弯钩设置
【单选题】
在GTJ2018中如何将设置好的计算规则,节点设置、箍筋公式等保存,在其他工程中使用?(  )___      
A. 导出规则、导入规则        
B. 合并工程    
C. 图元存盘    
D. 图元提取
【单选题】
在GTJ2018中下列属于分单元建立的构件是?___    
A. 独立基础    
B. 筏板基础    
C. 梁
D. 柱
【单选题】
在GTJ2018中下列属于分单元建立的构件是?___    
A. 独立基础    
B. 筏板基础    
C. 梁
D. 柱
【单选题】
在GTJ2018中,如何删除全楼同位置图元?___  
A. 选中图元右键-删除同位置图元        
B. 构件-删除同位置图元   
C. 楼层-删除同位置图元      
D. 只能一层层删除
【单选题】
在GTJ2018软件中不考虑保护层的情况下集水坑的坑壁水平筋的计算公式为(  )。___      
A. 坑壁净长+2*锚固长度             
B. 坑壁净长+15*d  
C. 坑壁净长+12*d               
D. 坑壁净长+伸入坑底长度+弯折15*d
【单选题】
在GTJ2018中梁的拉筋关于修改间距描述正确的是?___
A. 可以在计算设置中修改    
B. 可以在节点设置中修改   
C. 不可以修改间距    
D. 可以在属性中修改
【单选题】
在GTJ2018中关于模板面积和大钢模板面积的区别表述正确的是?(  )___    
A. 模板面积扣减门窗,大钢模板不扣减        
B. 两个都扣减门窗,大钢模板要加洞口侧壁    
C. 两个没有什么区别    
D. 两个都扣减门窗,大钢模板不加洞口侧壁
【单选题】
在GTJ2018中批量添加构件后缀在哪里?___    
A. 定义界面→添加前后缀    
B. 开始界面→添加前后缀    
C. 属性设置→添加前后缀    
D. 计算设置→添加前后缀
【单选题】
在使用GTJ2018中对量核量时,需要对某些构件图元的计算结果进行修改,如何操作才能确保修改后的钢筋量不发生变化?(  )___
A. 锁定    
B. 解锁    
C. 构件数据刷
D. 复制
【单选题】
设计室外地坪以下的回填可以称为___
A. 基础回填    
B. 房心回填    
C. 灰土回填    
D. 素土回填
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用