【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
BC
解析
暂无解析
相关试题
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
推荐试题
【单选题】
目前划分不同货币层次的依据是( )。___
A. 利率水平
B. 资产的流动性
C. 货币的国际化水平
D. 货币的材质
【单选题】
一般来说,通货膨胀的基本标志是( )。___
A. 货币供应量下降
B. 人均货币存量下降
C. 人均货币所得下降
D. 物价上涨
【单选题】
我国货币政策的目标是( )。___
A. 保持国家外汇储备的适度增长
B. 保持国内生产总值以较快的速度增长
C. 保持货币币值稳定,并以此促进经济增长
D. 保证充分就业
【单选题】
金融工具在金融市场上能够迅速地转化为现金而不致遭受损失的能力,是指金融工具的( )。___
A. 期限性
B. 流动性
C. 收益性
D. 风险性
【单选题】
在金融市场的主体中,最活跃的交易者是( )。___
A. 家庭
B. 企业
C. 政府
D. 金融机构
【单选题】
金融衍生品市场中允许进行保证金交易,这意味着投资者可以从事几倍甚至几十倍于自身拥有资金的交易,放大了交易的收益和损失。这体现了金融衍生品的( )特征。___
A. 杠杆比例高
B. 定价复杂
C. 高风险性
D. 全球化程度高
【单选题】
某投资者买入一只股票的看跌期权,当股票的市场价格低于执行价格时,该投资者正确的选择是( )。___
A. 行使期权,获得收益
B. 行使期权,全额亏损期权费
C. 放弃合约,亏损期权费
D. 放弃合约,获得收益
【单选题】
债券是资本市场重要的工具之一,其特征不包括( )。___
A. 流动性
B. 安全性
C. 收益性
D. 永久性
【单选题】
证券回购协议的实质是( )。___
A. 信用贷款
B. 证券买卖行为
C. 以证券为质押品的短期借款
D. 信用借款
【单选题】
公司以贴现方式出售给投资者的短期无担保的信用凭证是( )。___
A. 公司债券
B. 银行承兑汇票
C. 大额可转让定期存单
D. 商业票据
【单选题】
以下不属于金融衍生品特征的是( )。___
A. 跨期性
B. 杠杆性
C. 高风险性
D. 全球化程度低
【单选题】
在金融衍生品市场上,以风险对冲为主要交易目的的市场参与者是( )。___
A. 套期保值者
B. 投机者
C. 套利者
D. 经纪人
【单选题】
具有“准货币”特性的金融工具是( )。___
A. 货币市场工具
B. 资本市场工具
C. 金融衍生品
D. 外汇市场工具
【单选题】
按照利率的决定方式不同,可将利率分为( )。___
A. 固定利率和浮动利率
B. 市场利率和法定利率
C. 名义利率和实际利率
D. 基准利率和套算利率
【单选题】
下列风险中,可由不同的资产组合予以降低或消除的是( )。___
A. 经营风险
B. 国家经济政策的变化风险
C. 税制改革风险
D. 政治因素风险
【单选题】
2015年10月,我国对商业银行和农村合作金融机构等不再设置( )浮动上限,我国的利率管制时代宣告终结。___
A. 存款利率
B. 贷款利率
C. 债券市场利率
D. 银行间市场利率
【单选题】
古典利率理论认为,利率取决于( )。___
A. 储蓄和投资的相互作用
B. 公众的流动性偏好
C. 储蓄和可贷资金的需求
D. 中央银行的货币政策
【单选题】
流动性偏好理论认为,当流动性陷阱发生后,货币需求曲线是一条( )的直线。___
A. 平行于横坐标轴
B. 垂直于横坐标轴
C. 向左上方倾斜
D. 向右上方倾斜
【单选题】
若某笔贷款的名义利率是7%,同期的市场通货膨胀率是3%,则该笔贷款的实际利率是( )。___
A. 0.03
B. 0.04
C. 0.05
D. 0.1
【单选题】
一般来说,流动性差的债权工具的特点是( )。___
A. 风险相对较大、利率相对较高
B. 风险相对较大、利率相对较低
C. 风险相对较小、利率相对较高
D. 风险相对较小、利率相对较低
【单选题】
国债的发行价格低于面值,叫做( )发行。 ___
A. 折价
B. 平价
C. 溢价
D. 竞价
【单选题】
政策性金融机构与商业性金融机构之间最根本的区别在于( )。___
A. 是否以政府的政策旨意发放贷款
B. 不以盈利为目的
C. 是否为政府出资
D. 是否自主选择贷款对象
【单选题】
目前,我国商业银行最主要的组织制度是( )。___
A. 单一银行制度
B. 分支银行制度
C. 持股公司制度
D. 连锁银行制度
【单选题】
存款性金融机构是吸收个人或机构存款,并发放贷款的金融机构。下列金融机构中,属于存款性金融机构的是( )。___
A. 养老基金
B. 投资银行
C. 保险公司
D. 信用合作社
【单选题】
在我国,负责对期货市场进行监管的机构是( )。___
A. 中国人民银行
B. 中国银行业协会
C. 中国证券监督管理委员会
D. 中国银行业监督管理委员会
【单选题】
按照监管目标的不同,将一项或几项监管目标赋予统一监管机构进行监管的模式是( )。___
A. 分业监管
B. 统一监管
C. 超级监管
D. 混业监管
【单选题】
经批准在中华人民共和国境内设立的,不吸收公众存款,以小额、分散为原则,为中国境内居民个人提供以消费为目的的贷款的是( )。___
A. 财务公司
B. 金融租赁公司
C. 消费金融公司
D. 汽车金融公司
【单选题】
与其他金融机构相比,商业银行的一个最明显特征是( )。___
A. 以盈利为目的
B. 提供金融服务
C. 吸收活期存款,创造信用货币
D. 执行国家金融政策
【单选题】
通过负债业务,动员和集中社会闲散货币资金属于金融机构的( )职能。___
A. 便利支付结算
B. 促进资金融通
C. 降低交易成本
D. 转移和管理风险
【单选题】
中国人民银行作为我国的中央银行,享有货币发行的垄断权,因此它是( )。___
A. 政府的银行
B. 垄断的银行
C. 银行的银行
D. 发行的银行
【单选题】
我国承担最后贷款人职能的金融机构是( )。___
A. 国家开发银行
B. 中国进出口银行
C. 中国人民银行
D. 中国银行业证监管理委员协会
【单选题】
在我国,为证券交易提供清算、交收和过户服务的法人机构是( )。___
A. 财务公司
B. 投资银行
C. 证券登记结算公司
D. 金融资产管理公司
【单选题】
直接金融市场和间接金融市场的差别在于( )。___
A. 是否有中介机构参与
B. 中介机构在交易中的地位和性质
C. 中介机构在交易中的盈利模式
D. 中介机构的不同交易行为
【单选题】
下列关于信用经纪业务的说法错误的是( )。___
A. 信用经纪业务的对象必须是委托投资银行代理证券交易的客户
B. 投资银行对所提供的信用资金承担交易风险
C. 投资银行提供信用的目的是吸引客户以获得更多的佣金
D. 有融资和融券两种类型
【单选题】
证券经纪商接受客户委托,按照客户委托指令,尽可能以最有利的价格代理客户买卖股票,证券经纪商( )。___
A. 承担交易中的价格风险
B. 不承担交易中的价格风险
C. 承担交易中的利率风险
D. 不承担交易中的操作风险
【单选题】
客户卖出证券时,投资银行以自有、客户抵押或借入的证券,为客户代垫部分或者全部证券以完成交易,以后由客户归还的证券业务称为( )。___
A. 融资
B. 融券
C. 买空
D. 交割
【单选题】
发生在同一产业、生产或经营同类产品的企业之间的并购是( )并购。___
A. 纵向
B. 横向
C. 混合
D. 垂直
【单选题】
2009年3月1日,宝钢集团公司与杭州钢铁集团公司签约,宝钢集团收购宁波钢铁公司,可以获得其400万吨热轧板卷的产能。这是宝钢集团又一次实现跨地区重组的重大举措。按并购前企业间的市场关系,此次并购属于( )。___
A. 纵向并购
B. 横向并购
C. 混合并购
D. 垂直并购
【单选题】
在投资银行的主要业务中,把资金投向蕴藏着较大失败风险的高技术开发领域,以期成功后取得高资本收益的一种商业投资行为称为( )。___
A. 风险投资
B. 项目融资
C. 资产证券化
D. 兼并收购
【单选题】
下列关于证券私募发行的优点不正确的是( )。___
A. 简化了发行手续
B. 节省发行费用
C. 较少受到法律法规约束
D. 发行价格和交易价格会比较高