【多选题】
在一台路由器上执行了如下命令: display ip routing-table 1.1.1那么对此命令的描述正确的是___。
A. 可以查看匹配目标地址为100.1.1.1 的路由项。
B. 可以查看匹配下一跳地址为100.1.1.1 的路由项。
C. 有可能此命令的输出结果是两条默认路由。
D. 此命令不正确,因为没有包含掩码信息。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AC
解析
暂无解析
相关试题
【多选题】
SDH网络单元主要有。___
A. 同步光缆线路系统       
B. 终端复用器
C. 分/插复用器           
D. 同步数字交叉连接设备
【多选题】
光纤数字通信包括下列哪些特点。___
A. 容量大、频带宽       
B. 损耗低
C. 可靠性强             
D. 抗干扰性强
【多选题】
下面对同步数字系列技术SDH描述正确的是。___
A. SDH采用同步复用方式和灵活的复用映射结构
B. 从OSI 模型的观点来看,SDH属于网络层
C. SDH采用的信息结构等级称为同步传送模块STM-N
D. SDH具有很好的兼容性
【多选题】
下面哪些原因可导致光传输全部中断。___
A. 光缆线路中断         
B. 临近电磁场的干扰
C. SDH传输设备故障     
D. 光端机故障
【多选题】
光缆的护层常用聚乙烯作内层,外层用铝带或塑料,目的是为了___
A. 耐压     
B. 防潮      
C. 防燃     
D. 防腐
【多选题】
光纤通信是由____、______和_______三个基本单元组成的。___
A. 光发射机
B. 光纤
C. 光接收机
D. 光放大器
【多选题】
通信支撑网由     组成___
A. 同步网
B. 公共信令网
C. 业务网
D. 网络管理网
【多选题】
通信电源由    构成___
A. 交流供电系统         
B. 直流供电系统
C. 防雷接地系统         
D. 电源管理系统
【多选题】
根据我省高速公路光缆结构形式,光缆线路在野外长途塑料管道中敷设时,下列哪项排流线设置原则正确。___
A. 10m深处的土壤电阻率ρ10<100Ω·m的地段,可不设排流线。
B. 10m深处的土壤电阻率ρ10<100Ω·m的地段,设一条排流线。
C. 排流线的连续布放长度应不小于2KM
D. 排流线的连续布放长度应不大于2KM
【多选题】
架空光缆可选用下列哪此防雷保护措施。___
A. 光缆架挂在长途明线的上方。
B. 光缆吊线间隔接地。
C. 雷害特别严重地段敷设架空地线。
D. 光缆架挂在长途明线下方。
【多选题】
以下说法正确的是 ___
A. 在设备上,更换同类型光板,槽位相同,更换后无需再网管上重新下发业务
B. 在设备上,更换同类型光板,槽位相同,更换后需要再网管上重新下发业务
C. 更换NCP时,备用NCP的IP不会自动与主用NCP的IP同步
D. 在网管上拨光纤不会影响正在运行的业务
【多选题】
在E300、U31网管上创建网元时,以下哪些属性若填写错误,在网元创建成功后还可以修改___
A. 设备类型
B. 设备硬件版本
C. 网元名称
D. 网元IP
【多选题】
E300、U31网管上可以配置以下哪几种时钟源类型___
A. 外时钟
B. 内时钟
C. 线路抽时钟
D. 支路抽时钟
【多选题】
某光板的光接口类型是L-4.1,已知其最小过载点是-8dBm,最差灵敏度是-28dBm。在以下测到的收光功率中,哪些是不合适的___
A. -30dbm
B. -3dbm
C. -10dbm
D. -25dbm
【多选题】
关于网管上插入告警,以下说法正确的是___
A. 在本端插入告警,AIS告警就在本端上报
B. 在本端插入告警,AIS告警会在对端上报
C. 插入AIS告警只是强制修改了开销字节,不表示线路实际产生了告警,所以不会导致保护倒换或影响业务
D. 插入AIS告警可能导致业务保护倒换
【多选题】
机房的长期工作环境温度、湿度范围正确的是___
A. 25℃ 50RH%
B. 35℃ 70RH%
C. 20℃ 55RH%
D. 0℃ 48RH%
【多选题】
以下关于单板维护注意事项,说法正确的是___
A. 当单板从一个温度较低、交干燥的地方拿到温度较高、交潮湿的地方时,至少需要等30分钟以后才能拆封
B. 单板在不适用时要保存在防静电袋内
C. 在接触设备时必须佩带防静电手环,并将防静电手环的另一端良好接地
D. 光线路板上未使用的光口一定要用防尘帽盖住
【多选题】
以下哪些操作会影响业务或导致业务保护倒换___
A. 对正在使用的业务通道进行误码离线测试
B. 对正在使用的业务通道进行误码在线测试
C. 对业务通道进行环回
D. 插入MS-AIS告警
【多选题】
与通道保护相比,复用段的保护的特点是___
A. 使用于分散型业务
B. 需要使用APS协议
C. 容量大
D. 倒换时间长
【多选题】
以下说法正确的是___
A. 单板上电瞬间红绿指示灯交替闪烁,表明单板正在自检,上电正常
B. 单板自检完成后,如果单板绿灯闪烁而红灯亮,表明自检完成,但有告警
C. 若发现单板自检后红、绿指示灯同时闪烁的情况,可能是单板无用户程序,需在线下载用户程序
D. 以上说法都不正确
【多选题】
下面关于SDH设备光板OL4 L-4.2描述正确的是___
A. 该光板的传输速率为622M
B. 该光板的传输速率为2.5G
C. 该光板为长距光板,最大可支持80KM
D. 该光板为短距光板,最大可支持40KM
【多选题】
在通信传输网络中,传输速率可以支持2.5G的设备有哪些___
A. S325
B. S330
C. S360
D. S385
【多选题】
对于通信电源上电下电的操作过程中,操作正确的有哪些___
A. 设备上电时,首先要确认设备的硬件安装和线缆布放完全正确,设备的交流输入符合要求,设备内无短路现象;随后将电源分配箱市电空开置于“ON”
B. 在市电上电前,要确保通信设备电源板开关为“OFF”,待市电上电完成后,再将通信设备各电源板开关置于“ON”
C. 设备下电时,先将通信设备各电源板开关置于“OFF”,随后将电源分配箱空气开关置于“OFF”
D. 待设备下电完成后,需关闭机房对设备的供电回路开关
【多选题】
在日常光板维护注意事项中,说法正确的是___
A. 光线路板上未用的光口需要用防尘帽盖住
B. 清洗尾纤插头时,需使用无尘纸蘸无水酒精小心清洗,也可使用普通的工业酒精、医用酒精或水
C. 更换光线路板时,需先拔掉光线路板上的尾纤,再拔光线路板,禁止带纤插拔单板
D. 更换光线路板时,如果机房环境良好,可以不带防静电手环进行单板的插拔
【多选题】
PTN是一种新型的分组传送技术,PTN相对SDH设备的优势有哪些___
A. 支持时间同步
B. 支持端到端通道配置
C. 支持完善的QOS功能
D. 支持时钟同步
【多选题】
安全事故处理的原则有___。
A. 事故单位未受到处理不放过
B. 事故原因未查清不放过
C. 事故责任人未受到处理不放过
D. 事故未制定整改措施不放过
E. 事故有关人员未受到教育不放过
【多选题】
互通立交夜间施工具备哪些安全管理设施___。
A. 白天施工应设置的安全管理设施
B. 施工区频闪等等警示灯具
C. 施工照明
D. 通信联络工具
【判断题】
ETC车道应7×24小时不间断运行,ETC车道系统发生严重故障时,应在4小时内响应、24小时内修复。
A. 对
B. 错
【判断题】
ETC车道系统发生其他一般故障应在48小时内修复。
A. 对
B. 错
【判断题】
MTC 出口车道应包含非现金支付卡有效性、车卡绑定以及黑名单查询等3项基本判定流程。
A. 对
B. 错
【判断题】
MTC 入口车道应至少包含非现金支付卡有效性、非现金支付卡发行属地判定、车卡绑定以及黑名单查询等4项基本判定流程。
A. 对
B. 错
【判断题】
非现金支付卡余额不足或被列入黑名单,转入MTC车道处理,若判定预付卡余额不足时,可以选择一半预付卡扣款,一半现金的支付方式,若判定黑名单时,必须转为全额现金支付。
A. 对
B. 错
【判断题】
如因ETC用户信用问题,如故意提供虚假行驶证等情况,造成故意偷逃费或欠费,由用户负责。
A. 对
B. 错
【判断题】
如用户通行ETC车道交易流水未上传,根据用户提出交易的时间及地点,不必补传交易流水,直接进行退费处理。
A. 对
B. 错
【判断题】
ETC车道系统交易时,车道显示屏只需显示车牌信息及本次交易金额即可。
A. 对
B. 错
【判断题】
ETC车辆办理了非现金支付卡,则可以在ETC车道通行。
A. 对
B. 错
【判断题】
ETC设备型式检验可由设备生产厂家或者各省市ETC系统建设和管理单位委托,由具备相关检测资质的第三方检测机构进行。
A. 对
B. 错
【判断题】
ETC空卡可能是跟车造成的,应咨询司机入口站名, 人工输入入口站收费放行,并提醒司机通过ETC车道时保持车距。
A. 对
B. 错
【判断题】
OBU具备防止用户拆卸功能,一旦被拆卸,OBU信息储存区中标志字节/标志位被激活,引起的ETC应用失效。该状态不能够通过软件设置的方式得到恢复。
A. 对
B. 错
【判断题】
用户可在实际发生通行费用后的第10个自然日起,取得相应消费的增值税电子普通发票。
A. 对
B. 错
推荐试题
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud