【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
推荐试题
【单选题】
使用电气工具时,禁止提着电气工具的导线或___。
A. 金属部分
B. 外壳部分
C. 转动部分
D. 以上均不正确
【单选题】
使用电钻时,不得戴___。
A. 安全帽
B. 戒指
C. 眼镜
D. 手套
【单选题】
使用防毒面具时,空气中氧气浓度不得低于___,不能用于槽、罐等密闭容器环境。
A. 百分之八
B. 百分之十八
C. 百分之三十八
D. 以上均不正确
【单选题】
使用___灭火既损害电气设备的绝缘,又具有导电性,不宜用于带电灭火。
A. 泡沫灭火器
B. 1121灭火器
C. 二氧化碳灭火器
D. 干粉灭火器
【单选题】
使用砂轮研磨时,应戴___或装设防护玻璃。
A. 线手套
B. 防护眼镜
C. 安全帽
D. 以上均不正确
【单选题】
使用梯子时,工作人员必须在距梯顶不少于___的梯蹬上工作。
A. 1档
B. 2档
C. 3档
D. 4档
【单选题】
使用消火栓时,应对准火焰什么部位灭火?___
A. 火焰顶部
B. 火焰中部
C. 火焰根部
D. 以上都可以
【单选题】
使用携带型仪器在高压回路上进行工作,应至少由___人进行。
A. 1
B. 2
C. 3
D. 4
【单选题】
___是电焊作业人员常见的职业性眼外伤,主要由电弧光照射、紫外线辐射引起。
A. 白内障
B. 失明
C. 电光性眼炎
D. 色盲
【单选题】
___是救活触电者的首要因素。
A. 请医生急救
B. 送往医院
C. 使触电者尽快脱离电源
D. 通知触电者家属
【单选题】
___是指火灾危险性大,发生火灾时后果很严重的部位或场所。
A. 一级动火区
B. 二级动火区
C. 三级动火区
D. 四级动火区
【单选题】
手指出血时可用指压止血法,最好的止血部位是压迫___。
A. 伤指根部左右两侧
B. 伤指根部前后两侧
C. 伤肢的手腕处
D. 伤肢的手腕动脉
【单选题】
所有电气设备的___均应有良好的接地装置。使用中不准将接地装置拆除或对其进行任何工作。
A. 金属外壳
B. 裸露部分
C. 绝缘部分
D. 以上均不正确
【单选题】
所有气瓶不得靠近明火,气瓶与明火的安全距离为___米以上。
A. 3
B. 5
C. 10
D. 20
【单选题】
台风天气在变电站(线路走廊)内的户外工作,一般不存在以下哪一方面的危害?___
A. 狂风的危害
B. 高处物体的危害
C. 暴雨的危害
D. 重复运动的危害
【单选题】
未产生疾病、伤害、损坏或其他损失的事件,是___。
A. 事故
B. 未遂事件
C. 事件
D. 不安全行为
【单选题】
未经检验或检验不合格的特种设备___使用并应进行标识。
A. 严禁
B. 可以
C. 批准后
D. 检查后
【单选题】
物品应堆垛牢固、整齐,符合___。
A. 宽度要求
B. 高度要求
C. 体积要求
D. 人机工效
【单选题】
下班离开前,应将办公室的电器设备电源___。
A. 尽量切断
B. 调为节电休眠模式即可
C. 正常打开
D. 都可以
【单选题】
现场急救的四项技术是指___。
A. 清创包扎固定搬运
B. 无菌清创包扎固定
C. 止血包扎固定搬运
D. 止血包扎固定急救
【单选题】
现场人员停止心肺复苏的条件是:___。
A. 威胁人员安全的现场危险迫在眼前
B. 出现微弱自主呼吸
C. 医师已判断病人死亡
D. 抢救无反应
【单选题】
消防水池的补水时间不宜超过___。
A. 96小时
B. 72小时
C. 48小时
D. 12小时
【单选题】
携带型短路接地线的截面不得小于___平方毫米,且还需满足其他方面的要求。
A. 15
B. 25
C. 30
D. 40
【单选题】
携带型接地线还应满足___的要求。
A. 价格实惠
B. 装设地点天气
C. 装设地点设备运行电流
D. 装设地点短路电流
【单选题】
携带型接地线应使用___。
A. 不透明的塑料护套
B. 不透明的橡胶护套
C. 透明塑料护套
D. 无需任何护套
【单选题】
心肺复苏指南中胸外按压的部位为___。
A. 双乳头之间胸骨正中部
B. 心尖部
C. 胸骨中段
D. 胸骨左缘第五肋间
【单选题】
需要变更工作班中的成员时,须经___同意。
A. 监护人
B. 许可人
C. 工作负责人
D. 班长
【单选题】
蓄电池火灾时可以使用的灭火剂有:___。
A. 泡沫灭火器
B. “1211”或二氧化碳灭火器
C. 水
D. 以上都可以
【单选题】
蓄电池火灾时,应___。
A. 立即停止充电
B. 继续充电
C. 直接用水灭火
D. 直接用泡沫灭火器扑灭
【单选题】
验电时,必须使用___的验电器,在检修设备进出线两侧各相分别验电。
A. 电压等级合适而且合格
B. 电压等级合适
C. 合格
D. 经过检验
【单选题】
验电时,应戴___,并有专人监护。
A. 绝缘手套
B. 皮手套
C. 棉手套
D. 导电手套
【单选题】
一旦初步确定伤员意识丧失,应立即招呼___人前来协助抢救。
A. 专业人员
B. 上级领导
C. 周围的
D. 以上均不正确
【单选题】
以下___出血最具危险性,如不及时处理将造成生命危险。
A. 毛细血管出血
B. 静脉出血
C. 动脉出血
D. 淋巴出血
【单选题】
以下风险控制方法遵循顺序排序正确的是:___
A. 隔离---替代---转移---工程
B. 转移---工程---替代---隔离
C. 隔离—工程---替代---转移
D. 替代---转移---工程---隔离
【单选题】
有人触电导致呼吸停止、心脏停跳,此时在场人员应___。
A. 迅速将伤员送往医院
B. 迅速做心肺复苏
C. 立即打急救电话,等待急救人员赶到
D. 摇动头部,看是否能苏醒
【单选题】
有一物体扎入人员的身体中,此时救助者应如何处理___。
A. 拔出扎入的物体
B. 拔出扎入的物体实施加压包扎
C. 直接包扎
D. 固定扎入的物体后送往医
【单选题】
雨天操作室外高压设备时,绝缘棒应有___。
A. 均压环
B. 防雨罩
C. 绝缘套
D. 避雷器
【单选题】
遇有电气设备着火时,应___。
A. 立即将有关设备的电源切断,然后进行救火
B. 直接救火
C. 立即离开
D. 立即报告领导
【单选题】
遇有溺水者,首先要尽快使其脱离水面,尽快倒出胸腹腔积水,倒出积水的方法包括___。
A. 抱腹法
B. 倒立法
C. 平卧法
D. 侧卧法
【单选题】
员工在发现或怀疑工作现场安健环条件不符合要求的情况下,可向___提出拒绝作业的请求,并陈述拒绝作业的原因。
A. 部门负责人
B. 现场工作负责人
C. 班组负责人
D. 局领导