【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
推荐试题
【判断题】
敦煌网的定位是全球中小供应商与采购商,盈利模式是交易成功的佣金制
A. 对
B. 错
【判断题】
凡是给潜在客户或者是客户发送电子邮件都可以被看作是电子邮件营销
A. 对
B. 错
【判断题】
各地检验部门自实施 “电子报检 ”以来,运行平稳,减少了工作交叉,提高了工作效率,方便了出口企业
A. 对
B. 错
【判断题】
根据当前的跨境电子商务的发展状况及人才需求的趋势,大体可以把跨境电子商务的岗位划分为三个层次六个岗位
A. 对
B. 错
【判断题】
供应商发货后应尽量完整保存发货凭证以及产品信息(例如 :产品照片 ,发货批次的产品质检报告) ,保证在产生纠纷时能有证明无责的材料
A. 对
B. 错
【判断题】
海外仓储及其配套系统节省更多的时间,减少出错率
A. 对
B. 错
【判断题】
海外仓的头程将零散的国际小包转化成大宗运输,会大大增加物流成本
A. 对
B. 错
【判断题】
海外仓能将传统的国际派送转化为当地派送,确保商品更快速、更安全、更准确地到达消费者手中,完善消费者跨境贸易购物体验
A. 对
B. 错
【判断题】
海外仓批量发货是零散货物清关方式,清关检查严格,要求提供相关证明
A. 对
B. 错
【判断题】
海外仓在降低成本等方面优势不明显
A. 对
B. 错
【判断题】
海外电商直邮优点是缩短物流时间;集运模式,节约成本;电子通关,渠道阳光
A. 对
B. 错
【判断题】
海运舱单录入申报只包括舱单一项,以包裹单号、录入日期作为主索引键对用户所要预录入的舱单进行唯一性检查,如果预录入库中已有该舱单数据,说明该舱单已向海关申报,就不允许用户再次录入相同舱单
A. 对
B. 错
【判断题】
集报企业资质和集报商品内容发生变更后,需要向海关申请集报备案变更
A. 对
B. 错
【判断题】
检验检疫机构应及时对申请开展电子报检业务的报检人进行审查。经审查合格的报检人可以开展电子报检业务
A. 对
B. 错
【判断题】
跨境电商交易环节简单(生产商 -零售商 -消费者或生产商 -消费者)涉及中间环节较少
A. 对
B. 错
【判断题】
跨境电商缩短了对外贸易的中间环节,提升了进出口贸易的效率,为小微企业提供了新的机会
A. 对
B. 错
【判断题】
跨境电商需要有很强的政策、规则敏感性 ,要及时了解国际贸易体系、规则 ,进出口管制、关税细则、政策的变化 ,对进出口形势也要有更深入的了解和分析能力
A. 对
B. 错
【判断题】
跨境电商业务通常借助第三方物流企业 ,一般以航空小包的形式完成 ,物流因素对交易主体影响明显
A. 对
B. 错
【判断题】
跨境电商有利于传统外贸企业转型升级 ,对保持我国外贸稳增长具有深远意义
A. 对
B. 错
【判断题】
跨境电子商务 B2B网站平台的宗旨就是为企业服务,让买家与卖家的市场销售成本降低,降低交易成本,提高订单利润
A. 对
B. 错
【判断题】
跨境电子商务不仅冲破了国家间的障碍,使国际贸易走向无国界贸易,同时它也正在引起世界经济贸易的巨大变革
A. 对
B. 错
【判断题】
跨境电子商务的定义是 “通过互联网达成进出口的 2B/2C信息交换、交易等应用,以及与这些应用关联的各类服务和环境 ”
A. 对
B. 错
【判断题】
跨境电子商务的发展带动了跨境物流服务和支付服务的快速发展
A. 对
B. 错
【判断题】
跨境电子商务定义是指分属不同关境的交易主体,通过电子商务平台达成交易、进行支付结算,并通过跨境物流送达商品、完成交易的一种国际商业贸易活动
A. 对
B. 错
【判断题】
跨境电子商务岗位可以细分为国际物流操作岗位、出口退税操作岗位、成本核算操作岗位、跨境电商操作岗位、电子口岸操作岗位、跨境电商运营与维护岗位
A. 对
B. 错
【判断题】
跨境电子商务进口快速增长,但出口规模远大于进口规模
A. 对
B. 错
【判断题】
跨境电子商务进口通关服务系统依托信息化手段,结合大数据、云计算等新技术应用,建设全国统一的通关高效、监管严密、便利企业的跨境进口通关系统
A. 对
B. 错
【判断题】
跨境电子商务领域支付方式由传统模式变为银行转账、信用卡等多种支付方式并存的绝对安全模式
A. 对
B. 错
【判断题】
跨境电子商务流程为:国内贸易商 →跨境电子商务平台 →国外消费者
A. 对
B. 错
【判断题】
跨境电子商务是全球经济一体化、互联网络无国境化、国际贸易深化发展相互交织融合的产物
A. 对
B. 错
【判断题】
跨境贸易电子商务通关服务平台系统是由中国电子口岸数据中心开发的,方便电子商务企业等单位向海关报送通过电子商务模式成交的进出境物品的通关数据
A. 对
B. 错
【判断题】
跨境支付方式包括代理购汇支付和线下统一购汇支付
A. 对
B. 错
【判断题】
跨境支付方式由信用卡统一购汇支付
A. 对
B. 错
【判断题】
留存率反应的是电商留住会员的能力
A. 对
B. 错
【判断题】
毛利率,是衡量电商企业盈利能力的指标,是销售毛利与销售收入的比值
A. 对
B. 错
【判断题】
免费登录分类目录的方式已经越来越不适应实际的需求,将逐步退出网络推广的舞台
A. 对
B. 错
【判断题】
企业向海关申报集报清单,海关审批通过后可以凭集报清单办理放行手续,每个月底或者次月初企业选择已放行的集报清单,汇总生成报关单向海关申报
A. 对
B. 错
【判断题】
全球顺主要面向国内的电商企业,即卖家服务
A. 对
B. 错
【判断题】
识别信息需求是管理者的职责 ,管理者应根据决策和过程控制的需求,提出对信息的需求
A. 对
B. 错
【判断题】
实行 “电子报检 ”后,促使企业提前报检,为提前进行风险分析、出口检验检疫前移、入境检验检疫后延、实现口岸 “大通关 ”创造了条件
A. 对
B. 错