【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
推荐试题
【判断题】
行政机关设立的派出机构、内设机构或者其他组织,未经法律、法规授权,对外以自己名义作出具体行政行为的,该行政机关为被申请人。
A. 对
B. 错
【判断题】
下级行政机关依照法律、法规、规章规定,经上级行政机关批准作出具体行政行为的,该下级行政机关为被申请人。
A. 对
B. 错
【判断题】
根据国务院或者省、自治区、直辖市人民政府对行政区划的勘定、调整或者征收土地的决定,省、自治区、直辖市人民政府确认土地、矿藏、水流、森林、山岭、草原、荒地、滩涂、海域等自然资源的所有权或者使用权的行政复议决定为最终裁决。
A. 对
B. 错
【判断题】
行政复议机关责令被申请人重新作出具体行政行为的,被申请人不得以同一的事实和理由作出与原具体行政行为相同或者基本相同的具体行政行为。
A. 对
B. 错
【判断题】
行政复议机关决定撤销或者确认具体行政行为违法的,无权责令被申请人在一定期限内重新作出具体行政行为。
A. 对
B. 错
【判断题】
在行政复议过程中,被申请人不得自行向申请人和其他有关组织或者个人收集证据。
A. 对
B. 错
【判断题】
行政复议期间具体行政行为停止执行是原则,不停止执行是例外。
A. 对
B. 错
【判断题】
公民、法人或者其他组织对行政机关的具体行政行为不服申请行政复议的,作出具体行政行为的行政机关是被申请人。
A. 对
B. 错
【判断题】
行政复议是具有一定司法性的行政行为。
A. 对
B. 错
【判断题】
行政复议以依职权行政行为为主要审查对象,并附带审查依申请行政行为。
A. 对
B. 错
【判断题】
公民、法人或者其他组织认为具体行政行为侵犯其合法权益的,可以自知道该具体行政行为之日起六十日内提出行政复议申请;但是法律规定的申请期限超过六十日的除外。
A. 对
B. 错
【判断题】
维持具体行政行为的行政复议决定,由作出具体行政行为的行政机关依法强制执行,或者申请人民法院强制执行。
A. 对
B. 错
【判断题】
行政复议必须采用书面审查的办法。
A. 对
B. 错
【单选题】
《使用有毒物品作业场所劳动保护条例》规定,使用有毒物品作业的用人单位有关___应当熟悉有关职业病防治的法律、法规以及确保劳动者安全使用有毒物品作业的知识。
A. 管理人员
B. 业务员
C. 办事员
【单选题】
两种可燃性液体的混合物的闪点,一般在这两种液体闪点之间,并___这两种物质的平均值。
A. 等于
B. 高于
C. 低于
【单选题】
运输爆炸、剧毒和放射性物品,应指派___押运。
A. 驾驶员
B. 押运员
C. 装卸工
【单选题】
每种化学品最多可以选用___个标志。
A. 二
B. 一
C. 三
【单选题】
易燃气体___与助燃气体、剧毒气体同储。
A. 允许
B. 可以
C. 不得
【单选题】
对于现场液体泄漏应及时进行___、稀释、收容、处理。
A. 填埋
B. 覆盖
C. 烧毁
【单选题】
《常用危险化学品分类及标志》中根据压缩气体和液化气体的理化性质,将压缩气体和液化气体分为三项即易燃气体、不燃气体、___气体。
A. 有毒
B. 助燃
C. 窒息
【单选题】
轻金属燃烧的火灾为___类火灾。
A. E
B. D
C. F
【单选题】
危险化学品经营单位在经营许可证有效期满前___个月向原发证机关提出经营许可证的延期申请,并提交延期申请书和相关文件、资料。
A. 2
B. 3
C. 6
【单选题】
特别重大事故,负责事故调查的人民政府应当自收到事故调查报告之日起___日内做出批复。
A. 30
B. 15
C. 60
【单选题】
安全设备的设计、制造、安装、使用、检测、维修、改造和报废,应当符合国家标准或者___标准。
A. 行业
B. 专业
C. 企业
【单选题】
生产经营单位的主要负责人是本单位安全生产的第一负责人,对安全生产工作___负责。
A. 直接
B. 主要
C. 全面
【单选题】
《化学品安全技术说明书编写规定》适用于___。
A. 民用受控消费品
B. 工业化学品
C. 以科学研究为目的的少量样品
【单选题】
储存的危险化学品应有符合国家标准要求的明显标志,同一区域储存两种或两种以上不同级别的危险品时,应按___等级危险物品的性能标志。
A. 最低
B. 最高
C. 中等
【单选题】
爆炸物品___单独隔离限量储存。
A. 不准
B. 必须
C. 根据具体情况而定
【单选题】
根据《工伤保险条例》,职工在工作时间和工作场所内,因工作原因受到事故伤害的,___认定为工伤。
A. 不得
B. 应当
C. 视具体情况而定
【单选题】
国务院及有关部门为应对某一类型或某几种类型突发公共事件而制定的应急预案叫突发公共事件___应急预案。
A. 部门
B. 专项
C. 总体
【单选题】
风险评价是对系统存在的危险进行定性或定量的分析,得出系统发生危险的可能性及其后果___程度的评价。
A. 危险
B. 完好
C. 严重
【单选题】
根据事故情景,应急处置结束后,所开展的事故损失评估、事故原因调查、事故现场清理和相关善后工作就是___。
A. 事后评估
B. 事故清理
C. 后期处置
【单选题】
在应急救援过程中,为了更好地维护危险区及其附近地区的___,还应及时利用通告、广播等形式将事故的有关情况及处置措施向群众通报,通过宣传教育,稳定群众情绪,严防由于群众恐慌或各种谣传引起社会混乱。
A. 公共卫生
B. 社会秩序
C. 公共环境
【单选题】
《危险化学品经营企业开业条件和技术要求》规定,库存危险化学品应根据其化学性质分区、分类、分库储存,___不能混存。灭火方法不同的危险化学品不能同库储存。
A. 商品
B. 禁忌物料
C. 所有物料
【单选题】
我国的职业病防治工作原则是:“分类管理、___治理”。
A. 综合
B. 彻底
C. 分期
【单选题】
发生危险化学品事故,事故单位___应当立即按照本单位危险化学品应急预案组织救援。
A. 主要负责人
B. 安全生产管理人员
C. 安全管理负责人
【单选题】
如果触电者伤势严重,呼吸停止或心脏停止跳动,应竭力施行___和胸外心脏按压。
A. 点穴
B. 按摩
C. 人工呼吸
【单选题】
乙炔瓶的定期检验,每三年进行一次,库存或停用周期超过___年的乙炔瓶,启用前应进行检验。
A. 1
B. 2
C. 3
【单选题】
在不大于规定充装量的条件下,液化石油气储罐的压力随___变化而变化。
A. 储存温度
B. 充装量
C. 输送设备的压力
【单选题】
劳动者离开用人单位时,有权索取本人职业健康监护档案复印件,用人单位应当如实、无偿提供,并在所提供的复印件上___。
A. 盖章
B. 签字
C. 签章