【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
推荐试题
【单选题】
19:存款保险费率由基准费率和风险差别费率构成。费率标准由存款保险基金管理机构根据经济金融发展状况、存款结构情况以及存款保险基金的累积水平等因素制定和调整,报___批准后执行。
A. 中国人民银行
B. 中国银行保险监督管理委员会
C. 财政部
D. 国务院
【单选题】
20:存款保险费率由基准费率和风险差别费率构成。费率标准由存款保险基金管理机构根据经济金融发展状况、___以及存款保险基金的累积水平等因素制定和调整,报国务院批准后执行。
A. 银行经营情况
B. 银行盈利情况
C. 银行管理情况
D. 存款结构
【单选题】
21:各投保机构的适用费率,由存款保险基金管理机构根据投保机构的___等因素确定。
A. 经营管理状况和风险状况
B. 盈利状况和风险状况
C. 资产状况和风险状况
D. 存款结构情况和风险状况
【单选题】
25:存款保险基金的运用,应当遵循安全、流动、保值增值的原则,限于下列形式___:
A. 存放在中国人民银行
B. 投资政府债券、中央银行票据、信用等级较高的金融债券以及其他高等级债券
C. 国务院批准的其他资金运用形式
D. 以上选项都是
【单选题】
27:存款保险基金管理机构应当自每一会计年度结束之日起___内编制存款保险基金收支的财务会计报告、报表,并编制年度报告,按照国家有关规定予以公布。
A. 1个月
B. 2个月
C. 3个月
D. 4个月
【单选题】
28:存款保险基金管理机构应当自每一会计年度结束之日起3个月内编制存款保险基金收支的___、报表,并编制年度报告,按照国家有关规定予以公布。
A. 财务审计报告
B. 财务收支报告
C. 财务决算报告
D. 财务会计报告
【单选题】
29:存款保险基金管理机构履行职责,发现有下列___情形之一的,可以进行核查:
A. 投保机构风险状况发生变化,可能需要调整适用费率的,对涉及费率计算的相关情况进行核查
B. 投保机构保费交纳基数可能存在问题的,对其存款的规模、结构以及真实性进行核查
C. 对投保机构报送的信息、资料的真实性进行核查
D. 以上选项都是
【单选题】
32:存款保险基金管理机构发现投保机构存在资本不足等影响存款安全以及存款保险基金安全的情形的,可以对其提出 ___。
A. 安全警示
B. 安全警告
C. 风险警示
D. 风险警告
【单选题】
33:投保机构因重大资产损失等原因导致资本充足率大幅度下降,严重危及存款安全以及存款保险基金安全的,投保机构应当按照___、中国人民银行、银行业监督管理机构的要求及时采取补充资本、控制资产增长、控制重大交易授信、降低杠杆率等措施。
A. 存款保险基金管理机构
B. 财政部
C. 国务院
【单选题】
34:存款保险基金管理机构可以选择下列___方式使用存款保险基金,保护存款人利益:
A. 在本条例规定的限额内直接偿付被保险存款
B. 委托其他合格投保机构在本条例规定的限额内代为偿付被保险存款
C. 为其他合格投保机构提供担保、损失分摊或者资金支持,以促成其收购或者承担被接管、被撤销或者申请破产的投保机构的全部或者部分业务、资产、负债。
D. 以上选项都是
【单选题】
36:存款保险基金管理机构的工作人员有下列___行为之一的,依法给予处分:
A. 违反规定收取保费
B. 违反规定使用、运用存款保险基金
C. 违反规定不及时、足额偿付存款。
D. 以上选项都是
【单选题】
37:投保机构有未依法及时、足额交纳保费情形的,存款保险基金管理机构还可以按日加收未交纳保费部分___的滞纳金。
A. 0.02%
B. 0.03%
C. 0.05%
D. 0.06%
【单选题】
38:存款保险条例施行前,已被国务院银行业监督管理机构依法决定接管、撤销或者人民法院已受理破产申请的___,不适用本条例。
A. 金融机构
B. 吸收存款的金融机构
C. 吸收存款的银行业金融机构
【多选题】
1:存款保险制度的资金来源包括___
A. 存款人交纳的保费
B. 在投保机构清算中分配的财产
C. 投保机构交纳的保费
D. 存款保险基金管理机构运用存款保险基金获得的收益
E. 存款保险基金投资于企业债获得的利息
【多选题】
1:有下列情形之一的,法人解散___
A. 法人章程规定的存续期间届满或者法人章程规定的其他解散事由出现
B. 法人的权力机构决议解散
C. 因法人合并或者分立需要解散
D. 法人依法被吊销营业执照、登记证书,被责令关闭或者被撤销
【多选题】
4:有下列情形之一的,撤销权消灭___
A. 当事人自知道或者应当知道撤销事由之日起一年内、重大误解的当事人自知道或者应当知道撤销事由之日起三个月内没有行使撤销权
B. 当事人受胁迫,自胁迫行为终止之日起一年内没有行使撤销权
C. 当事人知道撤销事由后明确表示或者以自己的行为表明放弃撤销权
D. 当事人自民事法律行为发生之日起五年内没有行使撤销权的,撤销权消灭
【多选题】
1:对公客户办理收单业务需要提供的资料包括___。
A. 营业执照、
B. 法人身份证、
C. 特约商户申请表。
D. 商户公章、
E. 房屋租赁协议或房产证复印件、
F. 商户绑定账号
【多选题】
4:以下属于我行手机银行“河南农信(个人家)”APP下载渠道的有___
A. 手机应用市场中搜“河南农信”
B. 通过微信公众号“河南农信”中“微服务”下载
C. 进入我行或河南农信官网,扫码下载
【多选题】
8:客户于2018年11月1日申请金燕e贷20万元,授信期限为12个月,到2019年10月30日时,客户支用一笔,此时关于该合同的到期日,下列说法正确的是___
A. 可以到2019年的12月31日
B. 可以到2020年的6月1日
C. 可以到2020年的10月29日
D. 只能到2019年的11月1日
【多选题】
9:电子银行中的社保缴费功能,其中的灵活就业人员包括___
A. 与用人单位解除或终止劳动关系的失业人员
B. 与用人单位解除或终止劳动关系的辞职人员
C. 档案寄存期间经劳动人事部门批准退休人员
D. 已办理就业失业登记的未就业人员
E. 从事个体劳动的人员,个体经济组织业主及其从业人员
【多选题】
安全保卫检查的主要内容:上级安全保卫工作安排、会议精神和有关文件贯彻落实情况;___安全保卫部门人员配备情况; 其他需要检查的事项。
A. 安全保卫工作制度贯彻落实情况
B. 员工防范意识和执行规章制度、操作规程情况
C. 定期分析案件特点、作案手段、发案原因,及时提出防范意见
D. 安全防范设施建设和安防器材管理、使用情况
E. 各类刑事案件和治安、灾害事故查处情况
【多选题】
安全保卫检查以___定期查与不定期查相结合,采取( )的检查方法。
A. 普查和抽查、自查与互查
B. 白天查与晚上查、现场查与非现场查
C. 听(汇报)、看(现状)
D. 问(情况)、查(实况)、评(反馈意见)
【多选题】
上级或外部单位对营业场所、业务库进行检查的。检查时必须持有___经被查单位验证确认登记后,方可允许进入。
A. 检查单位介绍信
B. 并有被查单位保卫部门负责人陪同
C. 出示身份证
D. 非河南省农村信用社系统人员还需要工作证
【多选题】
有下列行为之一的,给予有关责任人经济处罚并视情节给予警告直至开除行政处分,触犯刑法的,移交司法机关处理___
A. 营业期间,大宗现金(抽屉内存放现金超过5 万元或存有整把现金)未入保险柜存放的
B. 营业终了未将现金、印鉴、密押、移动存储介质、有价单证、重要空白凭证入库保管的
C. 未按规定进行安全检查,致使安全隐患未发现或对检查出来的安全隐患不报告的
D. 营业期间接打电话的
E. 营业期间擅离职守,形成一人临柜的或无人临柜的
【多选题】
银行营业场所接待安全检查人员应做到___
A. 在没有本单位领导和保卫人员陪同的情况下,可以打开营业室通勤门让检查人员进入营业室进行检查
B. 请检查人员出示有关证件
C. 对检查人员提出的任何问题可以做解答
D. 检查人员出示相关手续后,营业人员必须接受检查人员的检查,并如实向检查人员反映情况