相关试题
【单选题】
277,s12700 随板卡AC 目前最多可支持多少个AP?___
【单选题】
279、S12700 支持1M MAC 表象的大规格系列板卡是___
A. EC 系列
B. X1E 系列
C. FC 系列
D.
E. D 系列
【单选题】
281、主控SRUH 可提升S7706 槽位带宽最大多少Gbpg?___
A. 160 Gbps
B. 240 Gbps
C. 320 Gbps
D. 480 Gbps
【单选题】
283、关于园区安全协防,以下说法错误的是___
A. 园区安全协防解决方案,扩展思路需要同客户的网络,安全两个部门进行沟通,适合之上而下的高举高打,更利于我司扩展
B. ,敏捷交换机新增的加密流量解析功能,需要进行报文解密,基于特征来将流量引导至C1S 分析
C. 安全协防联动机制是我司解决方案区别于360 等安全大数据厂商最大的区别
D. 安全协防方案中、交换机支持的高密技术,是由敏捷交换机模拟出一台有漏洞的网络虚拟主机,诱捕击者。
【单选题】
287,支持配置为SVF Client 节点的交换机有S57-LI .S2750 和___
A. S5720-HI
B. S5720-EI
C. S1700
D. S3750
【单选题】
288、s7700 系列交换机单板最大能支持多少10G 端口?___
【单选题】
289、S6720 的说法正确的是___
A. 不支持SVF Parent
B. 支持SVF Parent/ SVF
C. lient
【单选题】
297 WLAN 使用的无线频段为___
A. 800MH2 和1800MH
B. 400MHz 和800MHz
C. 24GHz 和5GHz
【单选题】
298 如下产品不支持802.11AX 的是___
A. AP7650
B. WA6628
C. AP8660
D. WA5620
【单选题】
299 下列关于AP8050DN 描述错误的是?___
A. AP805DN 内置蓝牙
B. AP8O5ODN 支持双5G
C. Ap8050DN 内置天线
D. AP8050DN 上行支持光口
【单选题】
303 新一代AR61XX 系列路由器中支持语音功能的是哪个款型___
A. AR6140-16G4XG
B. AR6120-W
C. AR6120
D. AR6160L
【单选题】
304 下面哪一款设备最适合放在离行自助网点作为无线上行网关?___
A. AR2220
B. AR201
C. AR511
D. AR509CG-LC
【单选题】
309 防火墙具体带机数是一个估算指标,不同用户会有差异,可以根据以下哪个指标估算出带机数___
A. 并发连接数
B. 吞吐量
C. 固定接口数量
D. 新建连接数
【单选题】
310. 华为NGFW/IPS 插口前面板的USB 接口的作用是什么?___
A. 连接键盘鼠标
B. 连接外置USG 硬盘做日志报表
C. 升级插口知识库
D. 升级插口软件
【单选题】
314. 对于随板AC 的销售策略,下列哪个描述明显是错误的?___
A. 在高密场景,可以主推X 系列单板的随板AC
B. 随板AC 不适合100 人以下园区使用
C. 在无线城市场景,主推ACU2
D. S7700 交换机主推SRUE/SRUH,尽量避免选用SRUA 和SRUB
【单选题】
315. 在H3C 的千兆接入和千兆上行的交换机中,下列哪个特性明显是S5110不支持,需要S5120 才能支持的持续性是?___
A. 硬件堆叠
B. RATP/MSTP
C. RIP
【单选题】
319. CE12800 最多支持一虚几?___
【单选题】
320. 以下对CE12800E 描述错误的是?___
A. CE12800E 与CE12800 单板可混淆
B. CE12800S 交换网板支持N+1 冗余
C. CE12800E 才用正交架构设计
D. CE12800S 严格前后风道
【单选题】
324.我国无线网络产品国标中安全机制的标准是___
A. 802.1x
B. WPA
C.
D. WAPI
【单选题】
325. AD9431DN-24X 最多可以接入对少个远端接入模块RRU? ___
【单选题】
329.下列哪些款产品是华为公司的工业交换机___
A. AR550
B. AR169
C. AR1220C
D. AR511
【单选题】
332. FirHunter 沙箱可以和哪个华为产品实现拦截联动?___
A. WAF
B. CIS
C. Loncenter
D. USG 防火墙
【单选题】
333. 华为USG6000 业界独家的功能是?___
A. 流量地图和威胁地图
B. SmartPlicy 智能策略优化
C.
D. SVPN
【单选题】
200、以下际款交换机支持100GE 上行___
A. CE6857
B. CE5855
C. CE6855
D. CE6810
【单选题】
256.完全防水等级IP66 的第二个6 的意思是___
A. 承受猛烈的海浪冲击或强烈喷水时,电器的流水量应不致达到有害的影响
B. 完全防止外物侵入,且可完全防止灰尘进入
C. 完全防止外物侵入,虽不能完全防止灰尘进入,但侵入的灰尘量并不会影响灯具的正常工作
D. 浸在水中一定时间或水压在一定标准以下确保不因进入而造成损坏
【多选题】
7. 关于芯片,如下描述正确的是___
A. ENP 兼具ASIC 芯片的性能优势和商用NP 的灵活性优势,是两者的完美组合
B. 商用NP 芯片架构灵活,但性能和功能却成为瓶颈
C. ENP 芯片比ASIC 芯片性能更高,比NP 芯片灵活性更强
D. ASIC 芯片性能高,功耗小,但架构固化不灵活
【多选题】
8. S7700 支持的硬件级检测技术有 ___
A. BFD
B. ETH OAM
C. RRPP
D. SEP
【多选题】
9. 以下哪些盒式款型支持MPLS VPN 功能___
A. S5720SI
B. S5710EI
C. 5720HI
D. 5720EI
【多选题】
14.以下哪些是敏捷广域解决方案的亮点___
A. 管理效率提升,最佳商业体验
B. 全局流量优化,管道传送效率提升
C. 有线无线深度融合,让运维不再繁琐
D. 技术能力创新,极致业务体验
【多选题】
15.与传统Qos 技术相比,,IP 硬管道具备哪些优势___
A. 提升调度灵活性
B. 提升业务体验性
C. 降低配置复杂度
D. 提升链路可靠性
【多选题】
22.下列产品属于数据中心交换机的是___
A. 华为CE12800
B. 华为的S12700
C. H3C 的S10500
D. H3C 的S12500X-AF
E. H3C 的S12508-S
【多选题】
23.华为AI Fabric 方案当前可应用于哪些场景___
A. HPC 场景
B. 分布式场景
C. AI 场景
D. DCI
【多选题】
24.以下哪些交换机支持无损以太(AI Fabric)特性___
A. CE6865
B. CE6855
C. CE8850-64CQ
D. CE8861
【多选题】
33.以下哪些技术为802.11n 所使用的关键技术? ___
A. 帧聚合
B. OFDM-MIMO
C. 信道捆绑
D. Short-GI
【多选题】
34.华为云管理网络,支持全生命周期云端管理,如下哪些操作可以在云端?___
【多选题】
35.2051-E 的主要特性包括: ___
A. 支持POE 输出供电
B. 内置智能天线
C. 6 个GE 下线接口
D. 内置蓝牙
【多选题】
36.以下关于云管理说法正确的是: ___
A. 云管理支持全场景的解决方案
B. 云管理可以支持128 台AP 的本地转发
C. 2019 云管理的激励包括上线500 台返5 万,上线2000 台返20 万
D. 云管理AP 都支持双栈模式
【多选题】
37.敏捷分布式WIFI 的典型应用场景主要有哪些? ___
A. 医院病房
B. 学生宿舍
C. 车厢覆盖
D. 酒店客户
【多选题】
42.AR 630 款型与华三MSR5600 的竞争中,可以引导的策略包括哪些?___
A. 自主化CPU
B. 自带端口数量>24
C. 自带端口LAN/WAN 支持灵活切换
D. 主控与转发双冗余
【多选题】
43.下列AR1200 系列路由器中,哪几款主机支持wifi 功能? ___
A. AR1220W
B. AR1220VW
C. AR1220EVW
D. AR1220V
推荐试题
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image