【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
C
解析
暂无解析
相关试题
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
【单选题】
以下关于数据处理的叙述中,不正确的足___。
A. :数据处理不仅能预测不久的未来,自时还能影响未
B. :数据处理和数据分析可以为决策提供真知灼见
C. :数据处理的重点应从技术角度去发现和解释数据蕴涵的意义
D. :数据处理足从现实世界到数据,冉从数据到现实世界的过程
【单选题】
“互联网十制造”是实施《中国制造2025》的重要措施。以下对“互联网十制造”主要特征的叙述中,不正确的是___。
A. :数字技术得到普遍应用,设计和研发实现协同与共享
B. :通过系统集成,打通整个制造系统的数据流、信息流
C. :企业生产将从以用户为中心向以产品为中心转型
D. :企业、产品和用户通过网络平台实现联接和交互
【单选题】
信息技术对传统教育方式带来了深刻的变化。以下叙述中,不正确的是___。
A. :学习者可以克服时空障碍,实现随时、随地、随愿学习
B. :给学习者提供宽松的、内容丰富的、个性化的学习环境
C. :通过信息技术与学科教学的整合,激发学生的学习兴趣
D. :教育信息化的发展使学校各学科全部转型为电子化教育
推荐试题
【多选题】
固定汇率制的缺陷有哪些___
A. 一次性大幅度的官方汇率调整不利于经济效率
B. 与资本高度流动是一种极不稳定的政策组合
C. 以汇率目标替代货币目标
D. 可能自动输入国外通货膨胀
【多选题】
在“蒙代尔—弗莱明模型”中,正确的论述有___
A. 进口限制政策并不能使本币贬值
B. 货币扩张政策不会使经常账户恶化
C. 货币扩张政策不会损害本国产出
D. 进口限制政策不会损害本国产出
【多选题】
以下关于蒙代尔政策搭配理论的说法正确的有___
A. 将原有的支出转移政策分裂为财政政策和货币政策两个独立的政策工具
B. 假设国际资本流动的利率敏感性高于国内货币需求,故IB曲线比EB曲线更加陡峭
C. 考虑到不同的政策作用机制,每种政策工具应当施用于最具影响力的政策目标之上
D. 遵循“以货币政策实现外部均衡目标,财政政策实现内部均衡目标”的规则
【多选题】
一国国际收支经常账户和资本账户之和为逆差,则该国___
A. 外汇储备减少和官方短期债权减少
B. 外汇储备减少和官方短期债权增加
C. 外汇储备增加和短期债务增加
D. 外汇储备减少和官方短期债务增加
【多选题】
其他条件不变的情况下,一国的国际收支顺差一般会___
A. 促进进口的进一步增加
B. 在固定汇率制下,带来国内通胀压力
C. 在浮动汇率制下,使本国货币升值
D. 在固定汇率制下,抑制本国通货膨胀
【多选题】
在资本不完全流动的情况下,根据蒙代尔-弗莱明模型,有:___
A. IS曲线斜率为正,表示国内商品市场的均衡
B. LM曲线斜率为正,表示国内货币市场的均衡
C. BP曲线是垂直的,国际收支平衡只有在特定的产出水平下才能实现
D. BP曲线斜率为正,随着产出水平的上升,需要提高本国利率来吸引国外资金,为经常账户融资。
【多选题】
以下对国际收支的支出分析法的论述中,错误的有___
A. 它是以边际分析法为理论基础的
B. 它考虑到了汇率变动对诸多经济部门的影响
C. 它认为一国价格水平上升一定有助于改善国际收支
D. 它认为一国收入水平上升一定有助于改善国际收支
【多选题】
以下关于斯旺图形的说法正确的有___
A. YY'曲线向右下方倾斜,曲线右侧代表通货膨胀,左侧代表失业
B. EE'曲线向右上方倾斜,曲线右侧代表经常账户顺差,左侧代表经常账户逆差
C. 若YY'曲线比EE'曲线更加陡峭,说明汇率政策对外部均衡的影响力相对更大
D. 仍然无法解决固定汇率制下或者可调整固定汇率制下的米德冲突问题
【多选题】
在资本完全流动,且汇率浮动的情况下,根据蒙代尔-弗莱明模型,如果本国政府扩大开支,则在内外均衡重新实现时,有___
A. IS曲线右移,本国国民收入提高
B. LM曲线不变,本国利率上升
C. IS曲线不变,本国国民收入不变
D. LM曲线不变,本国利率不变
E. BP曲线不变,本国货币升值
【多选题】
关于本币贬值对国际贸易条件的影响,正确的有___
A. 当本国和外国的需求价格弹性无穷大时,贸易条件改善
B. 当本国和外国的供给价格弹性无穷大时,贸易条件恶化
C. 当本国对出口商品具有定价权时,贬值对贸易条件的负效应较为有限
D. 在现实中,贬值会或多或少地引起贸易条件的恶化
【多选题】
根据蒙代尔-弗莱明模型,在资本完全流动的情况下,不能同时实现的是___
A. 独立的货币政策和固定汇率
B. 独立的货币政策和浮动汇率
C. 有效的财政政策和固定汇率
D. 有效的财政政策和浮动汇率
【多选题】
当本国货币当局在外汇市场上卖出外币,买入本币,并在本国债券市场上对其进行冲销时,根据资产组合分析法___
A. 本国货币贬值
B. 本国货币升值
C. 本国利率上升
D. 本国利率下降
【多选题】
在下列理由中,支持浮动汇率制的是___
A. 国际收支平衡要以牺牲内部平衡为代价
B. 汇率能发挥其调节国际收支的杠杆作用
C. 有利于国际经济贸易的发展
D. 对国际储备的需求减少
E. 增加国际货币制度的稳定
【多选题】
当国际收支不平衡时,国际收支逆差国所能采取的措施是___
A. 通过国际借贷融资
B. 用本国外汇储备向顺差国支付差额
C. 采取紧缩本国支出的政策
D. 货币相对于顺差国贬值
【多选题】
外汇的基本特征有___
A. 是外国资产
B. 是以外币表示的资产
C. 可以在国外得到偿付
D. 能自由兑换成其他形式的资产或支付手段
E. 无需经过货币发行国货币当局批准,即可自由兑换成其他国家货币
【多选题】
以下各项哪些是国际收支决定货币分析法的政策含义___
A. 国际收支赤字本质上是一种货币现象
B. 进口限额有可能使国际收支改善
C. 提高银行的法定准备金比例会改善国际收支
D. 央行公开市场操作对国际收支没有影响
【多选题】
下列哪些项属于间接标价法___
A. 在纽约外汇市场:1英镑=1.56美元
B. 在伦敦外汇市场:1英镑=3.78德国马克
C. 在苏黎士外汇市场:1瑞士法郎=3.20法国法郎
D. 在法兰克福外汇市场:1美元=1.79德国马克
E. 在巴黎外汇市场:1英镑=10.68法国法郎
【多选题】
在大量资本流入时允许本币升值的好处有___
A. 提升本币的国际地位
B. 使国内信贷和银行体系免受不利影响
C. 通过汇率调整国内相对价格
D. 以一定程度的不确定性阻止国际投机资本的进一步攻击
【多选题】
在日本发生了投机性短期资本外流,原因可能是___
A. 日元汇率疲软
B. 日本大藏省宣布将短期利率下调到较低水平
C. 预期日本的金融资产价格上涨
D. 预期外国商品价格下降