【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
A
解析
暂无解析
相关试题
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
推荐试题
【单选题】
坚持党的基本路线一百年不动摇的关键是___。
A. 坚持以经济建设为中心不动摇
B. 坚持“两手抓,两手都要硬 ”的方针不动摇
C. 坚持四项基本原则不动摇
D. 坚持改革开放不动摇
【单选题】
邓小平指出:“一个党,一个国家,一个民族,如果一切从本本出发,思想僵化,迷信盛行,那它就不能前进,它的生机就停止了,就要亡党亡国。”这段话,非常深刻地阐明了___。
A. 实事求是的重要性
B. 解放思想的重要性
C. 改革开放的重要性
D. 破除迷信的重要性
【单选题】
邓小平理论形成的主要历史根据是___。
A. 新民主主义革命的历史经验
B. 社会主义建设的经验教训
C. 西方国家现代化建设的历史经验
D. 发展中国家现代化建设的历史经验
【单选题】
毛泽东说:“房子是应该经常打扫的,不打扫就会积满了灰尘;脸是应该经常洗的,不洗也就会灰尘满面。我们同志的思想,我们党的工作,也会沾染灰尘的,也应该打扫和洗涤”。这段话形象地反映了中国共产党在长期革命实践中形成的___。
A. 密切联系群众的优良作风
B. 艰苦奋斗的优良作风
C. 理论联系实际的优良作风
D. 批评与自我批评的优良作风
【单选题】
以下关于社会主义改造不正确的观点是___。
A. 社会主义改造的基本完成标志着社会主义基本制度在中国的确立
B. 社会主义改造的基本完成使我国的社会经济结构发生了根本变化
C. 社会主义改造的基本完成标志着广大劳动人民成为掌握生产资料的国家和社会的主人
D. 社会主义改造的基本完成标志着结束了中国半殖民地半封建社会的历史
【单选题】
从中华人民共和国成立到社会主义改造基本完成,是我国从新民主主义到社会主义的过渡时期,这一时期,个体经济向社会主义集体经济过渡的形式是___。
A. 国营经济
B. 私人资本主义经济
C. 合作社经济
D. 国家资本主义经济
【单选题】
进入新民主主义社会后,___官僚资本,建立国营经济,是彻底摧毁半殖民地半封建制度,建立新民主主义制度,迅速恢复国民经济和巩固人民民主专政的重要条件和根本保证。
A. 没收
B. 赎买
C. 合营
D. 合并
【单选题】
建国初期,中国工业化道路最重要的问题是___。
A. 处理好沿海工业和内地工业的关系
B. 处理好重工业和轻工业、农业的关系
C. 处理好中央和地方的关系
D. 处理好工业现代化和农业现代化的关系
【单选题】
邓小平理论的创立为中国作出了历史性的重大贡献,它是___。
A. 中国特色社会主义理论体系的开篇之作
B. 毛泽东思想的重要组成部分
C. 中国特色社会主义理论体系的接续发展
D. 邓小平毕生的社会主义思想结晶
【单选题】
我们党全部工作的出发点,就是___。
A. 始终代表中国先进生产力的发展要求
B. 不断实现好维护好发展好最广大人民的根本利益
C. 始终代表中国先进文化的前进方向
D. 全面建成小康社会
【单选题】
中国共产党领导中国革命斗争,建立统一战线,必须认清中国社会结构是一个 ___。
A. 小资产阶级众多的社会
B. 农民众多的社会
C. “两头小中间大”的社会
D. 敌人异常强大的社会
【单选题】
当前我国进行的改革开放是一场新的革命,其性质是___。
A. 社会主义制度的根本性变革
B. 社会主义制度的自我完善和发展
C. 原有经济体制的修补
D. 解放生产力和发展生产力
【单选题】
毛泽东把___比喻为文章的上篇和下篇。“两篇文章,上篇和下篇,只有上篇做好,下篇才能做好。”
A. 旧民主主义革命和新民主主义革命
B. 新民主主义革命和社会主义革命
C. 社会主义革命和社会主义建设
D. 社会主义建设和社会主义改革
【单选题】
我国社会主义初级阶段的时间跨度是指___。
A. 从社会主义改造基本完成到基本实现社会主义现代化
B. 从社会主义改造基本完成到全面建成小康社会
C. 从中华人民共和国成立到社会主义改造基本完成
D. 从中华人民共和国成立到基本实现社会主义现代化
【单选题】
在社会主义建设道路探索时期,___提出了知识分子是工人阶级一部分的观点,强调要加强和改善党对知识分子和科学文化工作的领导,善于团结广大知识分子,使得他们更好地为社会主义服务。
A. 毛泽东
B. 周恩来
C. 刘少奇
D. 陈云
【单选题】
在社会主义改造完成后,关于我国社会主要矛盾,以下说法不正确的是___。
A. 我国国内的主要矛盾,是人民对于建立先进的工业国的要求同落后的农业国的现实之间的矛盾
B. 我国国内已经居于主导地位的是人民内部矛盾
C. 我国国内的主要矛盾,是人民对于经济文化迅速发展的需求同当前经济文化不能满足人民需要之间的矛盾
D. 我国社会的主要矛盾仍然是敌我矛盾
【单选题】
毛泽东在《论十大关系》中论述的第一大关系是___。
A. 经济建设和国防建设的关系
B. 重工业、轻工业和农业的关系
C. 沿海工业和内地工业的关系
D. 国家、生产单位和生产者个人的关系