【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
推荐试题
【单选题】
典型心绞痛常有以下特点,哪一项除外___
A. 剧烈活动后易发生
B. 疼痛部位常见中段胸骨后
C. 多含硝酸甘油片3分钟内缓解
D. 每次持续都不超过15分钟
E. 疼痛可放射至右肩右臂
【单选题】
下列哪种疾病不会引起阿-斯综合征___
A. 风湿性主动脉瓣狭窄
B. 高血压病
C. 急性心肌梗死
D. 完全性房室传导阻滞
E. 原发性心肌病
【单选题】
监护急性心肌梗死是发现下列哪种情况最危急___
A. 体温上升至39℃
B. 呕吐伴出冷汗
C. 收缩压<10C.7kPa
D. 室性期前收缩落在前面T波上
E. 室性期前收缩6~7次/分
【单选题】
一般急性心肌梗死患者,发病后几天可转出冠心病监护病房___
A. 2~5天
B. 5~7天
C. 7~10天
D. 10~14天
E. 至少2周以上
【单选题】
阵发性心动过速由几个连续发生的期前收缩形成___
A. 2个
B. 3个
C. 3个或3个以上
D. 5个
E. 4个
【单选题】
下列哪项不是急性心肌梗死溶栓治疗的指征___
A. 年龄在65岁以下
B. 发病在6小时以内
C. 胸痛持续30分钟以上
D. 出现病理性Q波
E. 相邻2个以上导联ST段抬高大于2mm
【单选题】
急性心肌梗死患者,早期出现的症状是___
A. 剧烈而持久的胸骨后疼痛
B. 心源性休克
C. 心力衰竭
D. 胃肠道反应
E. 发热
【单选题】
患者,女性,60岁,诊断为冠心病.心力衰竭,服用地高辛.双氢克尿塞1周后症状加重,心电图示有多发性室性早搏。下列处理哪项是错误的___
A. 吸氧
B. 补钾
C. 利多卡因
D. 静脉补钾
E. 使用双氢克尿塞改用速尿
【单选题】
患者,男性,65岁,因胸骨后闷痛1小时入院,心电图示急性广泛前壁心肌梗死。住院当夜,您发现其反应迟钝.面色苍白.皮肤湿冷.脉搏细弱,应考虑___
A. 心源性休克
B. 急性肺水肿
C. 并发脑血栓
D. 心室颤动征象
E. 心肌梗死后综合征
【单选题】
关于心肌梗死的治疗,下列能使闭塞的冠状动脉再通的治疗是___
A. 吗啡皮下注射
B. 尿激酶静脉滴注
C. 利多卡因静脉注射
D. 硝酸甘油含服
E. 安装起搏器
【单选题】
某高血压患者,胸痛反复发作,心电图见ST段短暂上抬,并有室性早搏,心率为54次/分,持续15分钟后均恢复正常。最好选用以下何种药物治疗___
A. 利多卡因
B. 维拉帕米
C. 心律平
D. 硝苯地平
E. 异山梨酯
【单选题】
长期高血压易导致下列哪些脏器出现并发症___
A. 心.肺.脑
B. 肝.肺.肾
C. 心.肝.肾
D. 肝.肾.脑
E. 心.脑.肾
【单选题】
主动脉粥样硬化形成的主动脉瘤最常见于___
A. 冠状动脉开口处
B. 升主动脉
C. 腹主动脉
D. 肾动脉开口处
E. 主动脉弓
【单选题】
要判断刘女士服用的抗凝剂药物用量是否合适,护士应注意评估下面哪项指标___
A. 凝血酶原时间
B. 血清钾含量
C. 出入量
D. 血小板
E. 白细胞
【单选题】
临床最常用下列哪项检查诊断隐性冠心病___
A. X线及临床化验
B. 超声心动图
C. 选择性冠状动脉造影及心向量图
D. 心电图及心电图负荷试验
E. 心功能检查与放射性核素检查
【单选题】
下列原发性高血压的主要并发症,哪一项除外___
A. 高血压性心脏病
B. 糖尿病
C. 急性心血管疾病
D. 慢性肾功能衰竭
E. 冠心病
【单选题】
导致心肌病猝死的直接原因是___
A. 急性左心衰竭
B. 突发呼吸衰竭
C. 心内膜炎
D. 恶性心律失常
E. 脑动脉栓塞
【单选题】
患者,女性,20岁,发热.心悸.乏力2天,晕厥1次。平素体健,两周前曾因着凉感冒。体检:体温38℃,咽部充血;心率116次/分,心律尚齐,偶闻及期前收缩5~6次/分,余无特殊发现。血白细胞计数为12×10_TagUpStart_9_TagUpEnd_/升,红细胞沉降率(ESR)为28mm/h。心电图见S-T段压低,T波低平或倒置,窦性心动过速,室性期前收缩频发(7~8次/分)。您认为最可能是患有___
A. 上呼吸道感染
B. 风湿热
C. 柯萨奇病毒性心肌炎
D. 流感病毒性心肌炎
E. 风湿性心肌炎
【单选题】
某患者半小时前急起气短,咳粉红色泡沫痰。查体示:心率120次/分,血压170/100mmHg,双肺可闻及散在湿啰音和哮鸣音。下列治疗用药哪组最为合理___
A. 哌替啶.西地兰.氨茶碱.硝普钠
B. 吗啡.速尿.地塞米松.西地兰
C. 哌替啶.西地兰.速尿.硝普钠
D. 西地兰.速尿.氨茶碱.多巴酚丁胺
E. 千胺哇琳.多巴酚丁胺.西地兰.氨茶碱
【单选题】
患者,女性,46岁,反复心慌.气促15年,再发加重伴双下肢浮肿1周,既往有风湿活动史,现诊断为风湿性心脏病合并___
A. 风湿活动
B. 肺气肿
C. 肝硬化
D. 周围循环衰竭
E. 充血性心力衰竭
【单选题】
某患者服用地高辛0.25mg,每日1次,共2周,出现何种情况下应停药___
A. 血钾降低
B. BUN升高
C. 心尖区收缩期杂音增强
D. 心率40次/分,心尖区闻及大泡音
E. 心房颤动,心率由120次/分降至80次/分
【单选题】
患者,女学生,16岁,平素体健,学校体检时心率96次/分,律齐,心尖区闻及舒张期隆隆样杂音,心界增大不明显。恰当的保健指导是___
A. 保持卧床休息
B. 及早洋地黄治疗
C. 宜口服利尿剂
D. 避免重体力活动,防止感染,经常随访
【单选题】
高血压最常见的死因是___
A. 心功能不全
B. 心律失常
C. 脑血管意外
D. 肾功能衰竭
E. 眼底动脉硬化
【单选题】
患者突然心脏停搏,护士独自发现首选措施是___
A. 尽快招呼医师来抢救
B. 推抢救车行电极除颤
C. 心肺基础复苏术
D. 给予吸氧,作好气管插管准备
E. 建立静脉通路,保证静脉给药途径
【单选题】
电极复律前正确的准备措施是___
A. 停服洋地黄3~5天
B. 暂时拔除吸氧导管
C. 禁食4小时,排空大.小便
D. 忌用镇静剂
E. 褥垫保证松软无硬物
【单选题】
窦性心动过速的特点是___
A. 静脉推注利多卡因后停止发作
B. 心电图无室性融合波
C. 心率大于100次/分
D. 按压颈动脉窦能停止发作
E. 静脉推注强心药后停止发作
【单选题】
风湿性心瓣膜病最常见的并发症是___
A. 亚急性感染性心内膜炎
B. 充血性心力衰竭
C. 栓塞
D. 心律失常
E. 肺部感染
【单选题】
低温疗法一般肛温以保持什么温度为宜___
A. 22℃
B. 30℃
C. 32℃
D. 34℃
E. 36℃
【单选题】
有症状的病态窦房结综合征患者,最宜选择的治疗方法是___
A. 阿托品
B. 普萘洛尔
C. 异丙肾上腺素
D. 麻黄碱
E. 人工心脏起搏器
【单选题】
急性心肌梗死常发生左心衰竭的主要原因是___
A. 频发性室性心动过速
B. 房室传导阻滞
C. 心脏负荷加重
D. 心肌收缩力不协调
E. 心肌收缩力下降
【单选题】
某中年女教师晨起锻炼时,发生心绞痛,即用硝酸甘油1片(0.5mg)舌下含服,1分多钟后感眼前发黑.恶心,手心发凉。此时应嘱患者___
A. 马上吃些点心
B. 立即躺下平卧
C. 再服一片硝酸甘油
D. 站立勿动待自行恢复
E. 急去医院心电图室检查
【单选题】
高血压患者不宜选用下列哪种食物油___
A. 菜油
B. 花生油
C. 玉米油
D. 大豆油
E. 茶油
【单选题】
最常见的诱发心力衰竭的因素是___
A. 呼吸道感染
B. 发生快速性心律失常
C. 过度体力活动或情绪激动
D. 钠盐摄入过多
E. 输液(血)过量及过快
【单选题】
右心衰竭与肝硬化的区别是___
A. 肝颈静脉返流征阳性
B. 食欲减退
C. 肝脏肿大
D. 腹水形成
E. 下肢水肿
【单选题】
心力衰竭临床表现的基本原理是___
A. 动脉系供血不足,静脉系瘀血
B. 肺循环充血,体循环缺血
C. 微循环血流灌注不足
D. 急性肺水肿致组织缺氧
E. 体液潴留致细胞水肿
【单选题】
对心力衰竭患者输液,应严格限制滴速在每分钟___
A. 20~30滴
B. 30~40滴
C. 40~50滴
D. 50~60滴
E. 60~80滴
【单选题】
下列哪项症状区分心源性哮喘和支气管哮喘最有价值___
A. 端坐呼吸
B. 咳粉红色泡沫痰
C. 突发夜间呼吸困难
D. 冬.春季发病多见
E. 喘息
【单选题】
某慢性心功能不全患者表现为夜间阵发性呼吸困难.尿量减少等症状,给予药物治疗后,上述症状好转,但是出现心慌.恶心.呕吐.食欲不振.头晕头痛.黄视.视物模糊等,应考虑为___
A. 慢性心功能不全症状反复
B. 利尿剂的副作用
C. 洋地黄药物中毒
D. 扩血管药物的不良反应
E. 洋地黄药物用量不足
【单选题】
左心功能不全的主要症状为___
A. 肝大
B. 咳嗽.咳痰
C. 少尿
D. 呼吸困难
E. 颈静脉怒张
【单选题】
下列各项中不属洋地黄中毒表现的是___
A. 恶心呕吐
B. 室性早搏
C. 心律不齐
D. 色视幻觉
E. 震颤抽搐