【单选题】
网管自己锁屏功能可以通过d:\otnm\ui\otnm.ini文件中的哪项参数的值改为修改为-1,保证用部锁屏( )___
A. MENU_NEIPCFG
B. DEVCFGLOCK
C. AUTO_LOCK_TIMEOUT
D. USER_LOCKED_TIME
E.
F.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
有一台计算机安装了一块10/100M自适应网络接口卡,当该计算机通过UTP电缆跟下列设备对接时,分别工作在那种双工模式?对接的设备为HUB,LAN交换机。( )___
A. 全双工,全双工
B. 半双工,全双工
C. 全双工,半双工
D. 半双工,半双工
E.
F.
【单选题】
有一种互连设备工作于网络层,它既可以用于相同(或相似)网络间的互连,也可以用于异构网络间的互连,这种设备是___
A. 集线器
B. 交换机
C. 路由器
D. 网关
E.
F.
【单选题】
遇有下列情况,应适当增加巡检次数()___
A. 等级高,恢复时限短的重要集团客户电路
B. 电路近期运行质量较差,故障重复率高
C. 多次发生不明原因障碍
D. 以上都是
E.
F.
【单选题】
原则上线缆标签应固定在距线缆接头()厘米的范围之内。___
A. 2016/7/10
B. 2016/3/7
C. 2016/1/2
D. 以上都不对
E.
F.
【单选题】
原则上要求ANM2000网管安装在哪一个盘符下。( )___
A. C:
B. D:
C. E:
D. F:
E.
F.
【单选题】
远程登录网络设备的命令是( )___
A. PING
B. TELNET
C. TRACERT
D. IPCONFIG
E.
F.
【单选题】
远端缺陷指示告警为( )___
A. AIS
B. LOS
C. LOF
D. RDI
E.
F.
【单选题】
远端缺陷指示告警为( )___
A. AIS
B. LOS
C. LOF
D. RDI
E.
F.
【单选题】
运用插入菜单的工作表命令,可以建立一个新的空白工作表()___
A. 原先的当前工作表不变,新工作表插入到当前工作表之前
B. 原先的当前工作表不变,新工作表插入到当前工作表之后
C. 新工作表插入到当前工作表之前,然后把新工作表作为当前工作表
D. 新工作表插入到当前工作表之后,然后把新工作表作为当前工作表
E.
F.
【单选题】
QINQ域模板最多支持( )个.___
A. 512
B. 32
C. 1024
D. 128
E.
F.
【单选题】
网络 212.31.136.0/24和212.31.143.0/24汇聚后的地址是( )___
A. 212.31.136.0/22
B. 212.31.136.0/21
C. 212.31.128.0/21
D. 212.31.136.0/20
E.
F.
【单选题】
防火墙直接获得数据包的源 IP 地址、目的 IP 地址、源 TCP/ UDP 端口和目的 TCP/UDP 端口和协议号等,并根据定义的特定规则过滤数据包,这种防火墙我们称之为___
A. 包过滤防火墙
B. 代理防火墙
C. 状态检测防火墙
D. 电路层防火墙
E.
F.
【单选题】
在( )时需用反光警示牌.___
A. 过低压线
B. 过高压线
C. 过河流
D. 过公路
E.
F.
【单选题】
在Excel窗口的编辑栏中,最左边有一个名称框,里面显示的是当前单元格(即活动单元格)的( )___
A. 填写内容
B. 值
C. 位置
D. 名字或地址
E.
F.
【单选题】
在Excel中,冻结窗口操作的前提条件是( )___
A. 有新建的文档窗口
B. 已经打开了多个文档窗口
C. 当前文档窗口已被分割
D. 没有条件
E.
F.
【单选题】
在Excel中,下面错误的表述是() ___
A. Excel提供了自动套用格式的功能,它是系统预先设计的表格格式
B. 模板实际上是具有某种样式数据格式的空白表格
C. 模板是由系统提供的,用户不能自己创建
D. 在编辑过程中,对经常使用的格式,用户可自己建立一组样式,它可包含多种格式
E.
F.
【单选题】
在FTTX业务出现退出服务、业务中断故障后,现场工程师应通常首先采用以下那种方法来进行故障定位___
A. 重启设备
B. 拔插单板
C. 在上层各级设备依据不同业务的VLAN起三层接口互ping测试
D. 以上都正确
E.
F.
【单选题】
在IMS终端的注册流程中,UE发出注册请求,由哪个设备( )为用户选择S-CSCF?___
A. AS
B. HSS
C. I-CSCF
D. MGCF
E.
F.
【单选题】
在IP报头中,( )用来表示该数据报对应的IP协议版本号___
A. 数据区
B. B、服务类型
C. C、协议域
D. D、版本域
E.
F.
【单选题】
在PON网络驻地网布线中,常用的室外光纤是G.652单模光纤,与多模光纤相比,单模光纤的特点是( )___
A. 较高的传输率、较短的传输距离、较低的成本
B. 较低的传输率、较短的传输距离、较高的成本
C. 较低的传输率、较长的传输距离、较低的成本
D. 较高的传输率、较长的传输距离、较高的成本
E.
F.
【单选题】
在PON系统中,解决ONU的注册冲突的方案是___
A. 配置ONU注册优先级
B. TDMA
C. 随机延迟时间法
D. 测距
E.
F.
【单选题】
网络管理系统的每个节点都包含一组与管理有关的软件,称为()___
A. 网络接口
B. 网络视图
C. 网络管理实体
D. 网络管理应用
E.
F.
【单选题】
在PTN的同步网络中,同步以太网的可以实现什么同步( )___
A. 相位
B. 频率
C. 时间
D. 震幅
E.
F.
【单选题】
防火墙中,安全区域与各网络的关联应遵循原则不包括( )___
A. 内部网络应安排在安全级别较高的区域
B. 外部网络应安排在安全级别最低的区域
C. 一些可对外部提供有条件服务的网络应安排在安全级别中等的DMZ区
D. 内部网络应安排在中等的DMZ区
E.
F.
【单选题】
在QinQ配置中,对CVLAN部分可以选择透传和TAG,选择TAG则对应的上行数据流为( ) ___
A. 带一层VLAN
B. 不带任何VLAN信息
C. 带两层VLAN
D. 必须带4088的VLAN信息
E.
F.
【单选题】
在SDH中,每秒可以传送____帧STM-1信号___
A. 8000
B. 4000
C. 2000
D. 1000
E.
F.
【单选题】
在TMN中,将各种模拟和数字设备及其相应的支持设备称之为:___
A. ONE
B. NE
C. NML
D. EML
E.
F.
【单选题】
在WIN2000 下手动安装T2000,需要设置两个环境变量IMAP和SQL SERVER,其中IMAP环境变量的值为:___
A. 数据库的安装目录
B. T2000 的安装目录
C. imap.cfg 文件所在的目录
D. t2000client.bak 文件所在的目录
E.
F.
【单选题】
在Windows 命令窗口以下哪个命令可以用来查看DNS 服务器的IP。___
A. DNSserver
B. DNSconfig
C. DNSip
D. nslookup
E.
F.
【单选题】
在Windows操作系统中,哪一条命令能够显示ARP表项信息?___
A. display arp
B. arp -a
C. arp -d
D. show arp
E.
F.
【单选题】
在windows命令窗口输入( )命令,来查看DNS服务器的IP的___
A. nslookup
B. B、ipconfig
C. C、tracert
D. D、telnet
E.
F.
【单选题】
在WLAN日常维护工作中,一般使用以下哪些仪表进行网络覆盖与质量测试( )___
A. 路测软件
B. 测试手机
C. CDS测试仪表
D. WirelessMon测试软件
E.
F.
【单选题】
网络控制协议可为 PPP 连接提供什么功能. ( )___
A. 建立和终止数据链路
B. 错误检测
C. 管理网络拥塞以及测试链路质量
D. 允许多种第 3 层协议在同一物理链路上工作
E. 为 PPP 提供身份验证功能
F.
【单选题】
在WLAN中用来解决隐藏节点的问题所用到的传输技术为( )___
A. CSMA/CA
B. CSMA/CD
C. CTS/RTS
D. CTS-to-self
E.
F.
【单选题】
在Word 中,若要在当前窗口中打开(关闭)绘图工具栏,则可选择的操作是( )___
A. 单击工具→绘图
B. 单击视图→绘图
C. 单击编辑→工具栏 →绘图
D. 单击视图→工具栏 →绘图
E.
F.
【单选题】
防火墙作为一个业务访问的中间节点,对 Client 来说防火墙是一个 Server,对 Server 来说防火墙是一个 Client 。这种防火墙叫___
A. 包过滤防火墙
B. 代理防火墙
C. 状态检测防火墙
D. 应用网关防火墙
E.
F.
【单选题】
在Word的编辑状态下,当前编辑的文档是C盘中的d1.doc文档,要将该文档拷贝到u盘,应当使用( )___
A. 文件菜单中的另存为命令
B. 文件菜单中的保存命令
C. 文件菜单中的新建命令
D. 插入菜单中的命令
E.
F.
【单选题】
在Word的编辑状态下,若要使用菜单进行字体效果的设置(如上、下标等),首先应打开的下拉菜单是( )___
A. 编辑
B. 视图
C. 格式
D. 工具
E.
F.
【单选题】
在Word的编辑状态下,使用标尺可以直接设置缩进,标尺的右部三角形标记代表( )___
A. 左缩进
B. 右缩进
C. 首行缩进
D. 左端缩进
E.
F.
【单选题】
在Word的编辑状态下,文档窗口显示出水平标尺,则当前的视图方式( )___
A. 一定是全屏显示视图方式
B. 可能是全屏显示视图或大纲视图
C. 可能是页面视图或普通视图方式
D. 可能是页面视图或大纲视图方式
E.
F.
推荐试题
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps