【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
推荐试题
【判断题】
列入禁止进境范围的所有物品均属禁止出境物品。
A. 对
B. 错
【判断题】
因科学研究等特殊需要引进动植物病原体的,必须事先提出申请,经农业部批准
A. 对
B. 错
【判断题】
宠物犬和猫必须经过海关或其授权宠物医院检疫,并持有海关出具的检疫证书才能携带出境。
A. 对
B. 错
【判断题】
酸奶属于禁止携带进境物。
A. 对
B. 错
【判断题】
用做预防或治疗的自用血液制品或生物制品可以邮寄入境。
A. 对
B. 错
【判断题】
《中华人民共和国禁止携带、邮寄进境的动植物及其产品名录》规定所有的活动物都是不能携带进境的。
A. 对
B. 错
【判断题】
动物源性中药材可以携带、邮寄入境。
A. 对
B. 错
【判断题】
飞行员是航空公司的员工,入境时其携带物无需接受检疫。
A. 对
B. 错
【判断题】
携带、邮寄植物种子、种苗及其他繁殖材料进境,未依法办理检疫审批手续的,作退回或者销毁处理。
A. 对
B. 错
【判断题】
动物精液不能携带、邮寄进境。
A. 对
B. 错
【判断题】
根据规定,入境旅客携带动植物、动植物产品和其他检疫物进境时,必须向海关申报。
A. 对
B. 错
【判断题】
大米属于禁止进境物。
A. 对
B. 错
【判断题】
《中华人民共和国禁止携带、邮寄进境的动植物及其产品名录》所列各物,经国家有关行政主管部门审批许可,并具有输出国家或地区官方机构出具的检疫证书,可以携带入境。
A. 对
B. 错
【判断题】
蝴蝶标本可以携带或邮寄入境。
A. 对
B. 错
【判断题】
因科研需要邮寄入境的动物产品可以不实行检疫直接放行。
A. 对
B. 错
【判断题】
进境供展览用的转基因产品,展览结束后,可以销售。
A. 对
B. 错
【判断题】
旅客携带超出自用、合理数量的燕窝可作征税后放行。
A. 对
B. 错
【判断题】
人参、西洋参均禁止携带进境。
A. 对
B. 错
【判断题】
进出境物品的所有人可以自行办理报关纳税手续,也可以委托他人办理报关纳税手续。
A. 对
B. 错
【判断题】
停留在设立海关的地点的进出境运输工具,未经海关同意,不得擅自驶离。
A. 对
B. 错
【判断题】
进境的境外运输工具,未向海关办理手续并缴纳关税,不得转让或者移作他用。
A. 对
B. 错
【判断题】
个人携带进出境的行李物品、邮寄进出境的物品,应当以自用、合理数量为限,并接受海关监管。
A. 对
B. 错
【判断题】
进出境邮袋的装卸、转运和过境,应当接受海关监管。
A. 对
B. 错
【判断题】
进境物品的纳税义务人,应当在物品放行前缴纳税款。
A. 对
B. 错
【判断题】
因纳税义务人违反规定而造成海关少征或者漏征税款的,海关在5年内可以追征。
A. 对
B. 错
【判断题】
海关及其工作人员的行政执法活动,依法接受公安机关的监督。
A. 对
B. 错
【判断题】
逃避海关监管及国家有关限制性管理规定,邮寄限制进境物品进境的,属于走私行为。
A. 对
B. 错
【判断题】
进出口侵犯中华人民共和国法律、行政法规保护的知识产权的货物的,由海关依法没收侵权货物并处以罚款; 构成犯罪的,依法追究刑事责任。
A. 对
B. 错
【判断题】
海关在查验进出境货物时,损坏被查验的货物的,应当赔偿实际损失。
A. 对
B. 错
【判断题】
有违法嫌疑的货物、物品、运输工具无法或者不便扣留的,当事人或者运输工具负责人应当向海关提供等值的担保。
A. 对
B. 错
【判断题】
海关备案的知识产权不再受法律、行政法规保护的,知识产权海关保护备案随即失效。
A. 对
B. 错
【判断题】
海关依职权调查处理的知识产权案件,海关必须在扣留侵权嫌疑货物之日起30个工作日内对货物是否侵犯知识产权进行调查、认定并作出处理决定。
A. 对
B. 错
【判断题】
海关可以要求纳税义务人提供确定商品归类所需的资料,认为必要时可以组织化验、检验,并将海关认定的化验、检验结果作为商品归类的依据。
A. 对
B. 错
【判断题】
海关征收关税、滞纳金等,应当按人民币计征。
A. 对
B. 错
【判断题】
纳税义务人发现多缴纳税款的,自放行之日起1年内,可以向海关申请退还多缴的税款并加算银行同期活期存款利息。
A. 对
B. 错
【判断题】
个人携带超过合理、自用数量的进境物品,应当按照进口货物依法办理相关手续。
A. 对
B. 错
【判断题】
外国在华常驻人员携带物品进境,免征进口税。
A. 对
B. 错
【判断题】
使馆和使馆人员经外交部批准可携运文物出境。
A. 对
B. 错
【判断题】
使馆发送或者收受的外交邮袋,海关予以免验放行。
A. 对
B. 错
【判断题】
依照《海关行政处罚实施条例》处以警告、罚款等行政处罚,但不没收进出境货物、物品、运输工具的,不免除有关当事人依法缴纳税款、提交进出口许可证件、办理有关海关手续的义务。
A. 对
B. 错