刷题
导入试题
【单选题】
烽火ONU MGCP协议向平台发起心跳所使用的命令为( )___
A. RSIP
B. NOTIFY
C. AUEP
D. AUCX
E.
F.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
在编辑多个Word文档的操作中曾经关闭过文档,现要打开最近关闭的文档,应选择的菜单是___
A. 工具
B. 视图
C. 文件
D. 编辑
E.
F.
【单选题】
在波分系统中,经过一段距离的传输后,收端信号的光信噪比都会有一定程度的降低,最主要的原因是 ( )___
A. 没有使用新型光纤
B. 分波合波器的使用
C. EDFA的使用
D. 光线纤衰减太大
E.
F.
【单选题】
在出入口控制系统中,读卡机可提供多种操作和控制方式,持卡人将有效卡插入读卡机之后,还要输入个人密码属于___
A. 正常方式
B. 复合识别方式
C. 双重识别方式
D. 锁定方式
E.
F.
【单选题】
在传输机房侧对SDH支路板进行环回操作,若向交换机方面进行环回,则称为 ( ) ___
A. 内环回
B. 外环回
C. 左环回
D. 右环回
E.
F.
【单选题】
在创建数据库实例时,设置turbo的端口号为( )___
A. 6000
B. 1546
C. 3075
D. 2048
E.
F.
【单选题】
在从事登高作业和夜间作业时,现场必须有( )以上在场联合作业,方可实施.___
A. 2
B. 3
C. 4
D. 5
E.
F.
【单选题】
为了保证IP承载网设备散热和通风状况良好,避免防尘网被灰尘堵住,必须定期清洗防尘网.建议至少( )个月定期清洗一次,机房防尘环境较差的清洗频率应更高,防尘网在使用一年左右更换一次.___
A. 1
B. 3
C. 6
D. 9
E.
F.
【单选题】
在大型网络设计中,考虑到网络的健壮性,对于汇聚层设备一般采用()连接方式连接到核心层网络设备___
A. 全网状
B. 星形
C. 直连
D. 双上行
E.
F.
【单选题】
在代理或可控组播模式下GSWC与EC2需要设置的模式为( )___
A. PROXY
B. SNOOPING
C. PROXY-SNOOPING
D. SNOOPING-SNOOPING
E.
F.
【单选题】
在道路中央上方的吊线上悬挂的是( )___
A. 跨路警示牌
B. 严禁射击牌
C. 双面禁止超高牌
D.
E.
F.
【单选题】
在地线测量过程中,被测地线E、电位探测针P和电流探测针C彼此之间的距离应为( )___
A. 10米
B. 20米
C. 30米
D.
E.
F.
【单选题】
关于BGP下列说法正确的是( )___
A. BGP是用在自治系统内部以及自治系统之间承载并控制路由信息的
B. BGP是用在自治系统内部发现路径的
C. BGP是直接承载在IP报文里的
D. BGP必须基于直联链路来建立对等关系
E.
F.
【单选题】
在发生大客户故障时,各相关单位和部门采取( )的原则,立即启动通信恢复(如主备用电路的切换、启动应急预案等)及故障排除的工作流程.___
A. 先业务恢复、后故障修复
B. 先故障修复、后业务恢复
C. 对故障修复
D. 进行业务恢复
E.
F.
【单选题】
在防火墙上配置的基本策略是 除非明确禁止,否则允许 ,这种策略是___
A. 宽松控制策略
B. 限制控制策略
C. 折衷控制策略
D.
E. udemon 默认控制策略 E.
F.
【单选题】
在分布式网管上设置TL1接口服务,应在接口服务器上的D:\AEMS\md\ini目录中找到anmws.ini文件,打开并修改设置[RCF]中的rcfserver=应用服务器的IP,设置[TL1SERVER]中的IP=( )的IP。___
A. 应用服务器
B. 接口服务器
C. 存储服务器
D. ANM2000客户端服务器
E.
F.
【单选题】
在分析传输告警时,应按照告警级别逐级进行分析,依次分析主要告警、次要告警、一般告警、危急告警。( )___
A. 对
B. 错
C.
D.
E.
F.
【单选题】
在敷设蝶形光缆时,蝶形光缆不能长期浸泡在( )___
A. 泥中
B. 水中
C. 土中
D. 墙中
E.
F.
【单选题】
为了加强网络安全,命令行方式登入设备需要采用支持加密的( )协议.___
A. Telnet
B. UDP
C. SSH
D. RSTP
E.
F.
【单选题】
在敷设蝶形光缆时,瞬间最大牵引力不得超过光缆允许张力的( )___
A. 0.8
B. B.0.9
C. C.0.6
D. D.1
E.
F.
【单选题】
在服务工作中,对客户提出的要求,应如何处理___
A. 您的要求太过分了,我们无法满足
B. 在符合规定、条件允许的情况下,应予满足
C. 您说的问题我们不清楚,请您找回客户经理解决
D. 你当移动是什么单位啊,你懂不懂规矩
E.
F.
【单选题】
在服务中对客户提出的要求不清楚或没有把握时,应如何应对?___
A. 应满足客户任何要求
B. 应给予耐心解释并婉言拒绝
C. 详细记录,请示上级后尽快将解决方案或处理结果反馈给客户
D. 当做没听到
E.
F.
【单选题】
在工程现场,通过串口线从超级终端登陆06型ONU时,波特率和密码为:( )___
A. 9600,GEPON
B. 9600,gpon
C. 115200,GEPON
D. 11520,gpon
E.
F.
【单选题】
在工程现场,通过串口线从超级终端登陆07型ONU里的IAD时,波特率和密码为:( )___
A. 9600,GEPON
B. 9600,gpon
C. 115200,GEPON
D. 11520,gpon
E.
F.
【单选题】
关于IPv6,下面的论述中正确的是___
A. IPv6数据包的首部比IPv4复杂
B. IPv6的地址分为单播、广播和任意播3种
C. 主机拥有的IPv6地址是唯一的
D. IPv6地址长度为128比特
E.
F.
【单选题】
在工作表的某一单元格中,输入:=99-1l-28,则该单元格内显示( )___
A. =99-11-28
B. 1999年11月28日
C. 60
D. 99-11-28
E.
F.
【单选题】
在故障处理流程中的,首先应进行( )___
A. 分析告警
B. 定位故障
C. 处理故障
D. 抢通恢复业务
E.
F.
【单选题】
在光时域仪测量光纤损耗的波形中,初始脉冲是由什么因素引起的( )___
A. 光纤端面的菲涅尔反射引起的
B. 接头处的光功率损耗引起的
C. 沿光纤反向传播受到光纤的损耗引起的
D. 光纤缺陷或光纤断裂引起的
E.
F.
【单选题】
在光纤接头中,LC和SC型连接器都属于( )。___
A. 椭圆
B. B.圆锥形
C. C.矩形
D. D.圆形
E.
F.
【单选题】
为了实现业务量相对较小的接入,我公司还提供了小型MSAP机框式设备-OPCOM3500E-6,可以插入___块业务盘, OPCOM3500-6中的群路盘不能与OPCOM3500E-12中的群路盘通用___
A. 2
B. B、4
C. C、6
D. D、8
E.
F.
【单选题】
在光纤熔接过程中,光纤固定于光纤定位板上,通过对光纤进行X、Y、( )三个方向的调整,使纤芯对准后,方能熔接.___
A. W
B. Z
C. N
D.
E.
F.
【单选题】
在光纤通信中,一般使用APD雪崩二极管作为( )___
A. 光电检测器
B. 光衰耗器
C. 光源
D. 中继器
E.
F.
【单选题】
在互联网专线维护中,Ping网关是一种常用的测试方法,而互联网专线工程中经常默认将一个网段中的第一个可用的主机地址作为该网段的网关,现有一网段218.155.42.72/30,请分析一下,该网段的网关是___
A. 218.155.42.1
B. 218.155.42.72
C. 218.155.42.73
D. 218.155.42.74
E.
F.
【单选题】
在环形网中最常用的网元是 ()___
A. TM
B. ADM
C. REG
D. DXC
E.
F.
【单选题】
在基站侧对SDH支路板进行环回操作,若向交换机方面进行环回,则称为()___
A. 内环回
B. 外环回
C. 左环回
D. 右环回
E.
F.
【单选题】
在架空光缆日常维护中,杆路逐杆检修的周期为( )___
A. 每年一次
B. 两年一次
C. 每年两次
D.
E.
F.
【单选题】
关于设备非QinQ的软件版本升级到QinQ软件版本,配置脚本转换出现端口占用的问题错误的说法是:( )___
A. 首先在DUBUG目录set old_config2qinq all命令进行配置适配
B. 主控盘版本为R1.21.03.34以后的不存在此问题
C. 在DEBUG目录对后8槽位凡是端口业务数不为0的端口执行以下命令:set epon slot <1-18> onu <onulist> port <portlist> flag 2 reserve
D. 做完所有命令后,不用保存直接重启
E.
F.
【单选题】
在监控传输误码性能时,一般情况下BBE的引出先后关系(即哪一种BBE会引出后面相应的BBE)是:___
A. RS、MS、HP、LP
B. LP、HP、MS、RS
C. MS、RS、HP、LP
D. LP、MS、RS、HP
E.
F.
【单选题】
在街道上架空光缆距地面的最小垂直净距为( )米___
A. 5.5
B. 5
C. 4.5
D. 4
E.
F.
【单选题】
在进行客户端的故障处理前,技术服务人员应事先( )得到客户允许后方可进入现场.___
A. 与客户联系
B. 准备好光猫
C. 准备好电动车
D. 准备好记录本
E.
F.
【单选题】
为了提高注册效率,IMS允许一个用户存在多个公有标识(IMPU)时,一个IMPU注册成功,则相关的IMPU均注册成功。这种机制叫( )___
A. 隐式注册
B. 通配注册
C. 第三方注册
D. 重注册
E.
F.
推荐试题
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用