【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
推荐试题
【单选题】
在TV业务平台中机顶盒的业务账号与机顶盒的什么标识进行绑定:( )___
A. 网络拨号账号
B. IP地址
C. STB ID
D. MAC地址
E.
【单选题】
机顶盒恢复出厂设置那些参数不会被修改:( )___
A. 业务账号
B. 拨号账号
C. EPG地址
D. 接入方式
E.
【单选题】
时移和回看采用( )方式传输 ___
A. 单播
B. 组播
C. 分别属于组播和单播
D. 分别属于单播和组播
E.
【单选题】
机顶盒与RMS远程管理平台间使用的管理协议是( )___
A. SNMP
B. TR069
C. CMIS/CMIP
D. LMMP
E.
【单选题】
机顶盒待机时各指示灯的状态及颜色:( )___
A. 红外指示灯亮(红色),网络指示灯熄灭,电源指示灯亮(红色);
B. 红外指示灯熄灭,网络指示灯亮(红色),电源指示熄灭;
C. 红外指示灯亮(红色),网络指示灯熄灭,电源指示灯熄灭;
D. 红外指示灯熄灭,网络指示灯熄灭,电源指示灯亮(红色);
E.
【单选题】
以下哪项技术用于减少由于网络丢包造成的组播业务播放卡顿( )___
A. FEC
B. ARQ
C. FCC
D. 双栈
E.
【单选题】
以下哪种不是高清分辨率:( )___
A. 720*576
B. 1280*720
C. 1080i
D. 1080p
E.
【单选题】
现网主流的视频流封装格式为:( )___
A. TS
B. ES
C. PS
D. ISMA
E.
【单选题】
以下协议不能用于点播视频的是 ( )___
A. RTSP
B. TR069
C. TCP
D. HLS
E.
【单选题】
以下哪句为服务禁用语( )___
A. 非常抱歉,我迟到了,耽误您时间请原谅!
B. 请问您想将**业务终端按放在什么位置?
C. 由于**具体原因,需要改布线,您看行吗?
D. 不知道,这事不归我们管。
E.
【单选题】
除客户原因外,对同一客户的入户服务不能出现( )次失约___
A. 1
B. 2
C. 3
D. 4
E.
【多选题】
计算机网络的拓扑结构有( )___
A. 星型拓扑、树型拓扑
B. 环型拓扑
C. 总线型拓扑
D. 网状型拓扑
E.
F.
【多选题】
引起计算机运行速度缓慢的主要原因有()等___
A. 计算机感染病毒
B. 计算机硬件配置较低
C. 计算机软件安装太多
D. 计算机硬盘空间不够
E.
F.
【多选题】
以下关于网络的描述正确的是()___
A. 计算机网络是现代通信技术与计算机技术相结合的产物
B. 通过网络,用户可以和其他连到网络上的用户一起共享网络资源,如磁盘上的文件及打印机等,也可以和他们互相交换数据信息
C. 我们可以把网络分为局域网(LAN,Local Area Network)和广域网(WAN,Wide Area Network)
D. 我们常说的Internet即是最典型的广域网
E.
F.
【多选题】
TCP/IP和OSI模型中相同的层次有哪些?( )___
A. 表示层
B. 会话层
C. 网络层
D. 传输层
E.
F.
【多选题】
下列哪些协议使用到了TCP/IP ( )___
A. ARP
B. HTTP
C. SMTP
D. FTP
E. ICMP
F.
【多选题】
对于TCP/IP协议结构中,下列哪些是传输层的协议( )___
A. FTP
B. TCP
C. UDP
D. IP
E.
F.
【多选题】
下面属于应用层的协议有( )。___
A. FTP
B. TCP
C. RTSP
D. SNMP
E.
F.
【多选题】
工作于应用层的协议有( )___
A. TCP
B. TFTP
C. HTTP
D. ARP
E.
F.
【多选题】
下列属于计算机网络协议的有( )___
A. TCP/IP
B. MAC
C. IPX/SPX
D. V.24
E.
F.
【多选题】
以太网交换机的三个主要功能是( )___
A. 对数据封装、解封装
B. 地址学习
C. 转发过滤
D. 避免环路
E.
F.
【多选题】
以下有关以太网交换机的说法正确的是( )___
A. 以太网交换机上电运行后,接收到的第一个单播数据包将向所有端口转发
B. 以太网交换机上电运行后,接收到的第一个单播数据包只向该数据包的目的地所在端口转发
C. 在MAC表项的学习过程中,从一个数据包中只能学习到一个条目
D. 在MAC表项的学习过程中,从一个数据包中可以学习到两个条目
E.
F.
【多选题】
在以太网中( )可以将网络分成多个冲突域,但不能将网络分成多个广播域___
A. 网桥
B. 单一VLAN交换机
C. 路由器
D. 集线器
E.
F.
【多选题】
二层交换时,如果有环路产生,主要危害有( )___
A. 引起广播风暴
B. 帧的重复制
C. MAC地址表的不稳定
D. 以上都不是
E.
F.
【多选题】
有关广播域和冲突域的概论,下面说法正确的是( )___
A. 一个交换机的端口是一个冲突域
B. 一个Hub的所有端口都是一个冲突域
C. 交换机中,同属于一个VLAN的端口是一个广播域
D. 以上都不对
E.
F.
【多选题】
下面有关端口聚合的作用,错误的是( )___
A. 提供冗余链路,增加系统可靠性
B. 增加线路带宽,尤其适用于上行带宽严重不足的场合
C. 增加系统安全性
D. 可以自动学习链路中VLAN的配置情况
E.
F.
【多选题】
以下关于端口捆绑的描述,哪些是正确的( )___
A. 端口捆绑的好处是可以增加网络链路的带宽
B. 端口捆绑的另一个好处是减少网络链路故障的恢复时间
C. 生成树将一组捆绑端口看待成一条链路
D. 在一组捆绑的端口中,不必要求每个端口要承载相同的VLAN
E.
F.
【多选题】
一个广播域中IP地址与MAC地址的对应关系正确的是 ( )___
A. 一个IP地址只能对应一个MAC地址
B. 一个IP地址可以对应多个MAC地址
C. 一个MAC地址只能对应一个IP地址
D. 一个MAC地址可以对应多个IP地址
E.
F.
【多选题】
下面关于三层交换机和路由器区别的描述,哪些是正确的( )___
A. 路由器能转发数据包,而三层交换机不行
B. 交换机通常有更小的时延
C. 路由器通常每个端口的成本相对三层交换机更高
D. 三层交换机不具有路由功能
E.
F.
【多选题】
以下关于MAC地址的说法中正确的是( )___
A. MAC地址的一部分字节是各个厂家从IEEE得来的
B. MAC地址一共有6个字节,它们从出厂时就被固化在网卡中
C. MAC地址也称做物理地址,或通常所说的计算机的硬件地址
D. 局域网中的计算机在判断所收到的广播帧是否为自己应该接收的方法是,判断帧的目的MAC地址是否与本机的硬件地址相同
E.
F.
【多选题】
下面属于私网地址段的有( )。___
A. 172.16.0.0-172.16.31.255
B. 10.0.0.0-10.255.255.255
C. 192.168.0.0-192.168.255.255
D. 172.160.0.0-172.160.255.255
E.
F.
【多选题】
以下属于私有地址的网段是( )___
A. 192.168.0.0/16
B. 10.0.0.0/8
C. 172.16.0.0/12
D. 224.0.0.0/8
E.
F.
【多选题】
以下哪些IP地址是属于172.16.1.0/28网段 ( )___
A. 172.16.1.4
B. 172.16.1.8
C. 172.16.1.12
D. 172.16.1.16
E.
F.
【多选题】
10.0.0.129/26主机地址所在网段的广播地址不会是( )___
A. 10.0.0.128
B. 10.0.0.255
C. 10.0.0.191
D. 10.0.0.192
E.
F.
【多选题】
对于地址192.168.19.255/20,下列说法正确的是?( )___
A. 是一个广播地址
B. 是一个私有地址
C. 地址在192.168.16.0/20网段上
D. 是一个主机地址
E.
F.
【多选题】
路由表中的路由可能有以下几种来源( )___
A. 接口上报的直接路由
B. 手工配置的静态路由
C. 动态路由协议发现的路由
D. 以太网接口通过ARP协议获得的该网段中的主机路由
E.
F.
【多选题】
以下为局域网标准的有( )___
A. IEEE 802.3
B. X.25
C. SLIP
D.
E. thernet II E.
F.
【多选题】
1000BASE-T 以太网可以使用( )线缆。___
A. CAT5
B. CAT5E
C. CAT6
D. CAT6E
E.
F.
【多选题】
超百兆使用的网线必须8芯,下列选项中属于判断网线是否符合要求标准的是( )。___
A. 网线材质
B. 网线长度
C. 网线芯线
D. 水晶头工艺
E.
F.
【多选题】
BRAS 的主要功能是AAA,它的功能和作用还包括( )___
A. 网络安全
B. QoS管理
C. 带宽管理
D. VPN管理
E.
F.