【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
推荐试题
【单选题】
必然王国是指___
A. 共产主义社会以前的社会状态
B. 原始社会
C. 文明社会
D. 社会主义社会
【单选题】
马克思主义认为,自由是___
A. 人们选择的主动性
B. 人们能够随心所欲
C. 人们能够摆脱必然性
D. 人们在对必然的认识基础上对客观的改造
【单选题】
共产主义理想之所以能够实现,是因为它___
A. 具有客观可能性
B. 人类向往的美好境界
C. 具有客观必然性
D. 人类追求的目标
【单选题】
无产阶级解放斗争的最终目是___
A. 夺取政权
B. 消灭阶级
C. 消灭剥削
D. 实现共产主义
【单选题】
必然王国和自由王国是社会发展的___
A. 两种不同的选择
B. 两条不同的道路
C. 两种不同的理想
D. 两种不同的状态
【单选题】
科学社会主义的直接思想来源是___
A. 16.17世纪的早期空想社会主义
B. 19世纪初期以圣西门.傅立叶.欧文为代表的空想社会主义
C. 18世纪的空想平均共产主义
D. 文艺复兴运动
【单选题】
科学社会主义创立的理论基础是___
A. 英国古典政治经济学
B. 德国古典哲学
C. 唯物史观和剩余价值学说
D. 空想社会主义学说
【单选题】
社会主义由空想到科学的标志是___
A. 《共产党宣言》的发表
B. “共产主义者同盟”的建立
C. 空想社会主义理想的破灭
D. 无产阶级革命的胜利
【单选题】
中国特色社会主义社会主义最本质的特征是坚持___
A. 马克思主义的指导
B. 无产阶级专政
C. 中国共产党的领导
D. 社会主义方向
【单选题】
建设社会主义的根本目的是___
A. 消灭剥削.消除两极分化,最终达到共同富裕
B. 实行无产阶级专政
C. 巩固共产党的领导
D. 镇压资产阶级的反抗
【单选题】
“民主社会主义”实质上是___
A. 发达国家的社会主义
B. 改良的资本主义
C. 科学社会主义中的一种
D. 社会主义的最佳模式
【单选题】
无产阶级政党的组织原则是___
A. 民主集中制
B. 理论联系实际
C. 实事求是
D. 集体领导
【单选题】
无产阶级夺取国家政权的最终目的是___
A. 改变无产阶级受剥削.受压迫的地位
B. 建立无产阶级专政的国家政权
C. 解放和促进社会生产力的发展
D. 彻底打碎资产阶级国家的机器
【单选题】
列宁提出社会主义可能在一国或数国首先取得胜利观点的依据是___
A. 无产阶级是最先进.最革命的阶级的原理
B. 帝国主义时代资本主义政治经济发展不平衡的规律
C. 资本主义国家无产阶级与资产阶级斗争的规律
D. 资本主义必然灭亡.社会主义必然胜利的规律
【单选题】
下列观点中,错误的是___
A. 社主义在中国焕发出强大生机活力
B. 社会主义必然取代资本主义
C. 社会主义取代资本主义是一个长期的曲折的过程
D. 社会主义在若干国家的严重挫折改变了资本主义必然灭亡的命运
【单选题】
资本主义必然被社会主义所代替的主要依据是___
A. 现代无产阶级日益壮大和觉醒
B. 个别企业有组织的生产与整个社会生产无政府状态之间的矛盾
C. 无产阶级与资产阶级斗争的尖锐化
D. 生产的社会化与资本主义私人占有制之间的矛盾
【单选题】
无产阶级革命之所以能取得胜利,其根本保证是___
A. 无产阶级政党的正确领导
B. 取得国家政权
C. 人民群众的革命积极性的极大提高
D. 建立革命统一战线
【单选题】
无产阶级革命的根本问题是___
A. 统一战线中的领导权问题
B. 国家政权问题
C. 武装斗争问题
D. 农民问题
【单选题】
社会主义的根本任务是___
A. 进行阶级斗争
B. 改革生产资料所有制
C. 进行政治体制改革.经济体制改革
D. 解放生产力.发展生产力
【单选题】
实现社会主义的必要政治前提是___
A. 建立无产阶级专政
B. 建立广泛的革命统一战线
C. 无产阶级的革命斗争
D. 无产阶级政党的领导
【单选题】
马克思说:“暴力是每一个孕育着新社会的旧社会的助产婆”,这说明了___
A. 暴力革命是无产阶级革命的唯一形式
B. 暴力革命是无产阶级革命的主要的基本形式
C. 暴力革命与和平发展互相排斥
D. 暴力革命与和平发展可以相互取代
【单选题】
列宁对社会主义革命学说的重大贡献是___
A. 提出了新经济政策
B. 提出了战时共产主义政策
C. 提出了社会主义革命将首先在一国或数国取得胜利的理论
D. 提出了利用国家资本主义过渡社会主义的理论
【单选题】
社会主义各个阶段的划分最终应以___
A. 生产力的发展为标准
B. 生产关系为标准
C. 生产资料的公有制程度为标准
D. 以阶级斗争为标准
【单选题】
无产阶级专政的实质,就是___
A. 无产阶级作为统治阶级掌握国家政权
B. 要消灭剥削.消灭阶级,进到无阶级社会
C. 镇压敌对阶级的反抗和破坏活动
D. 领导和组织社会主义建设
【单选题】
经济文化相对落后的国家可以先于发达资本主义国家进人社会主义,其根本原因是___
A. 革命的客观形势和条件所决定的
B. 经济文化相对落后的国家具有较高的精神文明
C. 它是以高度社会化的资本主义大生产作为社会主义革命的物质前提的
D. 社会主义生产关系可以在旧社会的内部孕育生长起来
【单选题】
19世纪初期欧洲空想社会主义的代表人物不包括___
A. 法国的圣西门
B. 法国的傅立叶
C. 英国的欧文
D. 德国的黑格尔
【单选题】
无产阶级革命的发生归根结底是由___
A. 生产力发展水平决定的
B. 生产关系的性质决定的
C. 无产阶级的意愿决定的
D. 资产阶级的行为决定的
【单选题】
马克思主义政党的最高纲领和最终奋斗目标是___
A. 消除两极分化
B. 巩固无产阶级专政
C. 实现共产主义
D. 共同富裕
【单选题】
劳动不再仅仅是一种谋生手段而成为人们生活第一需要的社会是___
A. 社会主义社会
B. 共产主义社会
C. 资本主义社会
D. 信息网络社会
【单选题】
集中体现着共产主义社会主要特征和本质要求的原则标志是___
A. 各尽所能,按需分配
B. 各尽所能,按才能分配
C. 各尽所能,按劳分配
D. 各尽所能,按地位分配
【单选题】
在人的发展和社会发展的关系问题上,马克思主义认为___
A. 前者是个人的理想,后者是社会的目标
B. 前者体现了个人价值,后者体现了社会价值
C. 前者和后者是彼此独立的历史发展过程
D. 前者和后者互为前提和基础
【单选题】
第二次世界大战后,发达资本主义国家的发展进入国家垄断资本主义的新阶段,这意味着___
A. 作为一种新的垄断资本主义生产关系体系最终得以确立
B. 国家垄断资本掌控经济生活
C. 所有重要的经济部门实行国有化
D. 国家垄断重于私人垄断
【单选题】
国家垄断资本主义的产生和发展,从根本上说是___
A. 国内市场竞争的结果
B. 国际竞争激烈化的结果
C. 垄断统治加强的结果
D. 科技进步和生产社会化程度进一步提高的产物,是资本主义基本矛盾进一步尖锐化的必然结果
【单选题】
金融资本是由___
A. 产业资本和商业资本融合或混合生长而成的
B. 银行资本的工业资本融合或混合生长而成的
C. 工业垄断资本和银行垄断资本融合在一起而形成的一种垄断资本
D. 垄断银行资本和银行资本融合或混合生长而成的
【单选题】
在垄断资本主义阶段占统治地位的资本是___
A. 工业资本
B. 农业资本
C. 银行资本
D. 金融资本
【单选题】
自由竞争资本主义进入垄断资本主义,最根本的标志在于___
A. 垄断代替自由竞争并占据统治地位
B. 资本输出代替商品输出在经济生活中占统治地位
C. 银行资本代替工业资本在经济生活中占统治地位
D. 国家垄断代替私人垄断在经济生活中占统治地位
【单选题】
国家垄断资本主义的出现___
A. 改变了经济的资本主义性质
B. 维护了整个垄断资产阶级的利益
C. 代表了个别资本家的利益
D. 消灭了私人垄断资本主义的基础
【单选题】
国家垄断资本主义的形式中,最主要.最重要的形式是___
A. 国家市场垄断经济
B. 国家调节经济过程和经济活动
C. 公私合营经济
D. 国家自然垄断经济
【单选题】
国家垄断资本主义___
A. 可以从根本上解决资本主义基本矛盾
B. 有利于缓解资本主义生产的无政府状态
C. 导致资本主义向社会主义和平过渡
D. 可以消除资本主义经济危机
【单选题】
国家垄断资本主义的局限性在于___
A. 使垄断资本主义存在着时而迅速发展时而停滞的趋势
B. 使垄断资本主义经济长期处于停滞状态
C. 使垄断资本主义经济长期处于滞胀状态
D. 使资本主义经济制度内的经济关系调整,并没有从根本上消除资本主义的基本矛盾