【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
推荐试题
【单选题】
构建国家安全体系,包括政治、国土、军事、文化等11种安全,其中_____是总体安全的根本。___
A. 政治安全
B. 国土安全
C. 军事安全
D. 文化安全
【单选题】
党的十九大报告提出,制定国家____,依法赋予监察委员会职责权限和调查手段,用____取代“双规”措施。___
A. 监察法 留置
B. 监察法 拘留
C. 反腐败法 留
D. 反腐败法 拘留
【单选题】
关于党性和人民性的关系,下列表述错误的是________。___
A. 坚持党性就是坚持人民性
B. 党性和人民性是一致的、统一的
C. 没有脱离党性的人民性
D. 党性和人民性要统筹兼顾
【单选题】
党的十九大报告指出,中国特色社会主义文化,源自于中华民族五千多年文明历史所孕育的中华优秀传统文化,熔铸于党领导人民在革命、建设、改革中创造的_________,植根于中国特色社会主义伟大实践。___
A. 社会主义先进文化
B. 红色文化
C. 民族的科学的大众的文化
D. 革命文化和社会主义先进文化
【单选题】
传承弘扬中华优秀传统文化,要深入挖掘和阐发中华文化_______的时代价值,不断增强文化自信和价值观自信。①讲仁爱 ②重民本 ③守诚信 ④崇正义 ⑤尚和合 ⑥求大同___
A. ①②③④
B. ①②③④⑤
C. ②③④⑤⑥
D. ①②③④⑤⑥
【单选题】
中华优秀传统文化是中华民族的根和魂,对中华文化要____。___
A. 坚持突出本来、防范外来、面向未来
B. 促进百花齐放、百家争鸣
C. 实现创造性转化、创新性发展
D. 坚持全面继承和发展
【单选题】
中国共产党领导人民发展社会主义先进文化,弘扬以爱国主义为核心的民族精神和以______为核心的时代精神。___
A. 开拓创新
B. 与时俱进
C. 改革创新
D. 创新创业
【单选题】
深化文化体制改革,要加快构建把____放在首位、社会效益和经济效益相统一的体制机制。___
A. 经济效益
B. 社会效益
C. 集体效益
D. 团体效益
【单选题】
党的十八大以来,党中央加强对网信工作集中统一领导,对网信工作作出的一系列战略部署,不断推进理论创新和实践创新,不仅走出一条中国特色治网之道,而且提出一系列新思想新观点新论断,形成了____。___
A. 网络安全战略思想
B. 网络强国战略思想
C. 网络工作重要论述
D. 网络建设重要思想
【单选题】
宣传思想工作是做人的工作,人在哪儿重点就在哪儿,要把______作为重中之重。___
A. 群众性精神文明创建
B. 基层宣传思想工作
C. 高校思想政治工作
D. 网上舆论工作
【单选题】
习近平强调,各级领导干部特别是高级干部要不断提高对互联网规律的把握能力、对网络舆论的引导能力、对信息化发展的驾驭能力、______。___
A. 对网络安全的服务能力
B. 对互联网产品的生产能力
C. 对网络安全的保障能力
D. 对互联网产品的监管能力
【单选题】
十九大报告强调,推动城乡义务教育一体化发展,高度重视农村义务教育,办好学前教育、特殊教育和网络教育,普及______,努力让每个孩子都能享有公平而有质量的教育。___
A. 九年制义务教育
B. 高中阶段教育
C. 十二年制义务教育
D. 高等教育
【单选题】
______是民生之源,是改善民生、实现发展成果由人民共享最重要最直接的方式。___
A. 经济发展
B. 收入分配
C. 科学发展
D. 人民生活
【单选题】
党的十九大报告指出,必须多谋民生之利、多解民生之忧,在发展中补齐民生短板、促进社会公平正义,在____、弱有所扶上不断取得新进展。 ①幼有所育、学有所教 ②劳有所得、病有所医 ③老有所养、住有所居 ④衣有所给、食有所供___
A. ①②③
B. ①②④
C. ②③④
D. ①②③④
【单选题】
中国共产党领导人民构建社会主义和谐社会,加强和创新社会_____。___
A. 管理
B. 治理
C. 管控
D. 监管
【单选题】
打好精准脱贫攻坚战,要坚持“____”标准,既不能降低标准,也不能盲目抬高标准。___
A. 一不愁两保障
B. 两不愁两保障
C. 两不愁三保障
D. 三不愁两保障
【单选题】
党的十九大报告指出,坚持房子是用来住的、不是用来炒的定位,加快建立多主体供给、多渠道保障、____的住房制度,让全体人民住有所居。___
A. 租赁优先
B. 以购为主
C. 租购并举
D. 多手段调控
【单选题】
党的十九大报告指出,就业是最大的民生,要坚持就业优先战略和积极就业政策,实现____。___
A. 灵活就业和自主就业
B. 以创业带就业
C. 劳动者平等就业
D. 更高质量和更充分就业
【单选题】
党的十九大报告强调,____以药养医,健全药品供应保障制度。___
A. 逐步取消
B. 严格限制
C. 全面取消
D. 严厉打击
【单选题】
党的十九大报告强调,积极应对人口老龄化,构建____政策体系和社会环境。___
A. 养老、孝老、敬老
B. 综合养老
C. 医养结合
D. 老龄事业和产业协调发展
【单选题】
党的十九大报告指出,建设生态文明是中华民族永续发展的千年大计,必须树立和践行_____的理念,坚持节约资源和保护环境的基本国策。___
A. 人与自然和谐共生
B. 民生优先
C. 绿水青山就是金山银山
D. 人与自然是生命共同体
【单选题】
党的十九大报告指出,人与自然是生命共同体,人类必须尊重自然、_____、保护自然。___
A. 利用自然
B. 崇尚自然
C. 顺应自然
D. 开发自然
【单选题】
党的十九大报告指出,坚持节约优先、_____的方针,坚持生产发展、生活富裕、生态良好的文明发展道路。___
A. 发展优先、合理保护为主
B. 保护优先、人工恢复为主
C. 保护优先、自然恢复为主
D. 发展优先、适度开发为主
【单选题】
党的十九大报告提出,着力建设资源节约型、环境友好型社会,实行_____生态环境保护制度。___
A. 适度宽松的
B. 最严格的
C. 比较严格的
D. 适度从紧的
【单选题】
党的十九大报告指出,着力解决突出环境问题,坚持全民共治、源头防治,持续实施大气污染防治行动,打赢____。___
A. 蓝天保卫战
B. PM2.5防治战
C. 空气防卫战
D. 化工污染防治战
【单选题】
巩固和发展最广泛的爱国统一战线,最根本的是要_______。___
A. 实现大团结大联合
B. 解决人心和力量问题
C. 坚持党的领导
D. 妥善处理各方利益关系
【单选题】
党对统一战线领导主要是_______。___
A. 政治领导
B. 部门领导
C. 个人领导
D. 工作领导
【单选题】
党的十九大报告指出,坚持长期共存、互相监督、肝胆相照、____,支持民主党派按照中国特色社会主义参政党要求更好履行职能。___
A. 生死与共
B. 荣辱与共
C. 患难与共
D. 进退与共
【单选题】
中国共产党维护和发展_____团结互助和谐的社会主义民族关系。___
A. 平等
B. 民主
C. 公平
D. 友爱
【单选题】
党的十九大报告提出,全面贯彻党的民族政策,深化民族团结进步教育,铸牢_____意识,加强各民族交往交流交融,促进各民族像石榴籽一样紧紧抱在一起。___
A. 中华民族一体化
B. 中华民族一家亲
C. 中华民族共同体
D. 中华民族统一体
【单选题】
我国最广泛的爱国统一战线是由全体社会主义劳动者、社会主义事业的建设者、拥护社会主义的爱国者、拥护祖国统一和_____组成的。___
A. 致力于弘扬传统文化的爱国者
B. 致力于中华民族伟大复兴的爱国者
C. 维护总体国家安全的爱国者
D. 拥护中国共产党领导的爱国者
【单选题】
党的十九大报告指出,保持香港、澳门长期繁荣稳定,实现祖国完全统一,必须把维护中央对香港、澳门特别行政区____和保障特别行政区高度自治权有机结合起来,确保“一国两制”方针不会变、不动摇,确保“一国两制”实践不变形、不走样。___
A. 外交主导权
B. 人事主导权
C. 全面管治权
D. 实质管治权
【单选题】
贯彻党的十九大精神,国务院台办、国家发展改革委等29个部门出台了《关于促进两岸经济文化交流合作的若干措施》,简称“_____”。___
A. 惠台31条
B. 惠台20条
C. 惠台45条
D. 惠台25条
【单选题】
中国共产党坚持_____的和平外交政策,坚持_____道路,坚持_____的开放战略,统筹国内国际两个大局,积极发展对外关系,努力为我国的改革开放和现代化建设争取有利的国际环境。___
A. 亲诚惠容 以我为主 互利共赢
B. 共建共享 和平发展 友好往来
C. 独立自主 和平发展 互利共赢
D. 独立自主 和平发展 互助助利
【单选题】
党的十九大报告提出,在国际事务中,维护世界和平,促进人类进步,推动构建_____,推动建设持久和平、共同繁荣的和谐世界。___
A. 人类命运共同体
B. 地球村
C. 人类发展共同体
D. 国际命运共同体
【单选题】
中国周边外交的基本方针,就是坚持与邻为善、以邻为伴,坚持睦邻、安邻、富邻,突出_______的理念。___
A. 互利合作
B. 亲诚惠容
C. 互联互通
D. 真实亲诚
【单选题】
中国共产党按照_____的原则,发展我党同各国共产党和其他政党的关系。___
A. 互相尊重主权和领土完整、互不侵犯、互不干涉内政、平等互利、和平共处
B. 独立自主、完全平等、互相尊重、互不干涉内部事务
C. 长期共存、互相监督、肝胆相照、荣辱与共
D. 互相尊重、平等互利、互不干涉内部事务
【单选题】
党的十九大报告提出,各国人民同心协力,构建人类命运共同体,建设______的世界。___
A. 持久和平、普遍安全、共同繁荣、开放包容、公平正义
B. 持久和平、普遍安全、共同繁荣、公平正义、清洁美丽
C. 持久和平、普遍安全、共同繁荣、开放包容、清洁美丽
D. 持久和平、普遍安全、公平正义、开放包容、清洁美丽
【单选题】
推动形成全面开放新格局,要以_____建设为重点,坚持引进来和走出去并重,遵循共商共建共享原则,加强创新能力开放合作,形成陆海内外联动、东西双向互济的开放格局。___
A. “金砖机制”
B. 自贸区
C. “一带一路”
D. 区域合作
【单选题】
党的十九大报告提出,赋予自由贸易试验区更大改革自主权,探索建设______。___
A. 自由贸易城
B. 自由贸易区
C. 自由贸易港
D. 自由贸易市