【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
推荐试题
【单选题】
空调列车因空调设备故障在运行过程中不能修复时,应退还___。
A. 已收与已乘区间空调票价票款
B. 未使用区间的空调票价
C. 全程空调票价
D. 已乘与未乘区间空调票价差额
【单选题】
发生线路中断旅客要求退票时,在发站(C包括中断运输站返回发站的)退还___。
A. 全部票价收退票费
B. 部分票价不收退票费
C. 全部票价不收退票费
D. 全部票价
【单选题】
发生线路中断,旅客返回中途站要求退票时,退还___,不足起码里程按起码里程计算,不收退票费。
A. 全部票价
B. 已收票价与发站至停止旅行站的票价差额
C. 已收票价与未乘区间票价差额
D. 已收票价与未使用部分票价差额
【单选题】
发生线路中断旅客要求退票时,在发站___,不收退票费。
A. 不办理退票
B. 退还部分票价
C. 退还全部票价
D. 退还卧铺票价
【单选题】
82旅客携带品由___负责看管。
A. 旅客
B. 自己
C. 承运人
D. 列车员
【单选题】
免费携带品的体积,每种物品的外部尺寸长、宽、高之和不超过___Cm。
A. 210
B. 200
C. 180
D. 160
【单选题】
残疾人旅行时,代步的折叠式轮椅___上车。
A. 可免费携带
B. 按25kg补票
C. 按20kg补票
D. 按15kg补票
【单选题】
成人旅客可将___杆状物品免费带入车内。
A. 重21kg、长200Cm
B. 重25kg、长160Cm
C. 重10kg、长210Cm
D. 重20kg、长195Cm
【单选题】
成人旅客免费携带品的最大重量为___kg。
A. 20
B. 25
C. 30
D. 35
【单选题】
一成人旅客携带1.12米儿童一名,可免费携带随物品___千克。
A. 20
B. 25
C. 30
D. 35
【单选题】
一成人旅客怀抱2名婴儿,携带1.5米儿童一名,可免费携带随物品___千克。
A. 40
B. 50
C. 35
D. 45
【单选题】
一成人旅客携带1.51米儿童一名,可免费携带随物品___千克。
A. 40
B. 50
C. 30
D. 45
【单选题】
一成人旅客怀抱2名婴儿,携带1.51米儿童一名,可免费携带随物品___千克。
A. 40
B. 50
C. 60
D. 55
【单选题】
外籍旅客可免费携带___的携带品。
A. 20kg
B. 25kg
C. 30kg
D. 35kg
【单选题】
一伤残旅客按行李托运1辆残疾人用车,重45kg,其计费重量是___。
A. 45kg
B. 20kg
C. 25kg
D. 40kg
【单选题】
旅客携带品的外部尺寸,每件长、宽、高相加之和不得超过___Cm 。
A. 120
B. 140
C. 160
D. 180
【单选题】
儿童(A含免费儿童)免费携带品的重量是___kg。
A. 10
B. 15
C. 20
D. 25
【单选题】
根据《客规》规定,允许外交人员免费携带品的重量是___。
A. 35千克
B. 30千克
C. 25千克
D. 20千克
【单选题】
伤残旅客免费携带品最大重量为___。
A. 10kg
B. 15kg
C. 20kg
D. 35kg
【单选题】
外交人员免费携带品的重量是___kg.。
A. 30
B. 35
C. 40
D. 50
【单选题】
___不能凭法规规定的持枪证明佩带枪支子弹乘车。
A. 现役军人
B. 猎人
C. 公安人员
D. 射击运动员
【单选题】
如旅客超重、超大的物品价值低于运费时,可按物品价值的___核收运费。
A. 40%
B. 0.5
C. 0.6
D. 1
【单选题】
旅客违章携带物品补收运费时,不得___本次列车的始发和终点站。
A. 超出
B. 赶过
C. 越过
D. 超过
【单选题】
旅客将宠物携带上车,应___。
A. 予以没收
B. 编记录交前方站
C. 补收四类包裹运费
D. 应安排在列车通过台由旅客自行看管
【单选题】
列车发现危险物品,应交___处理,必要时移交公安部门处理。
A. 前方停车站
B. 县、市站
C. 车务段所在地车站
D. 三等及以上车站
【单选题】
发现旅客违章携带妨碍公共卫生的物品时,按该件全部重量___乘车站至下车站四类包裹运费。
A. 60%补收
B. 补收
C. 50%补收
D. 加倍补收
【单选题】
发现旅客违章携带危险品乘车,按该件全部重量___乘车站至下车站四类包裹运费,危险品交前方停车站处理。
A. 补收
B. 20%补收
C. 加倍补收
D. 50%补收
【单选题】
对不可分拆的整件超重、超大物品,动物,按该件全部重量补收上车站至下车站___包裹运费。
A. 二类
B. 四类
C. 一类
D. 三类
【单选题】
《铁路旅客运输规程》规定,没收危险品时,应向被没收人出具___
A. 书面证明
B. 没收危险品决定书
C. 客运记录
D. 收据
【单选题】
对旅客的遗失物品应___归还原主。
A. 想法
B. 想招
C. 设法
D. 筹谋
【单选题】
要本着___的原则,坚持人民铁路为人民的服务宗旨,周到热情为旅客服务。对旅客在旅行中发生的困难应千方百计予以解决。
A. 旅客至上
B. 安全第一
C. 预防为主
D. 旅客第一
【单选题】
站车服务设施和引导标志应采用___或国家标准规定的图形标志。标准没有规定时,自行设计的标志应易于识别并附加汉字。
A. 《铁路客运服务图形标志》
B. 《铁路服务图形标志》
C. 《客运服务图形标志》
D. 《铁路客运图形标志》
【单选题】
除车票外,还可以持铁路乘车证和___乘车。
A. 特种乘车证
B. 调度命令
C. 保洁证
D. 餐饮证
【单选题】
___为特种乘车证。
A. 用于到外站装卸作业及抢险的调度命令
B. 全年定期乘车证
C. 离休人员使用的软、硬席乘车证
D. 便乘证
【单选题】
“中国铁路免费乘车证”由___制定和管理。
A. 国务院主管部门
B. 铁路主管部门
C. 国务院铁路主管部门
D. 国务院铁路部门
【单选题】
有计算机售票设备的车站,除系统设备故障等特殊情况外,不得发售___车票。
A. 作废
B. 电子
C. 手工
D. 手写
【单选题】
车站发售客票时,不能使用到站不同但___相同的车票互相代替。
A. 票款
B. 价格
C. 日期
D. 票价
【单选题】
发售加快票时,如中间有无快车运行的区段时,则不能发售___加快票。
A. 单程
B. 全程
C. 全部
D. 区间
【单选题】
成人无论身高多少均应购买___票。
A. 全价
B. 联合票
C. 硬座
D. 全程
【单选题】
___不论身高多少,均按学生票办理。
A. 小学生
B. 通学的小学生
C. 通学的学生
D. 大学生