【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
DEF
解析
暂无解析
相关试题
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
推荐试题
【判断题】
第401题:破乳剂应密封保存,防止混入杂质,保持通风,避免暴晒,禁止烟火
A. 对
B. 错
【判断题】
第402题:应急预案是针对可能发生的事故,为迅速、有序地开展应急行动而预先制定的管理规定
A. 对
B. 错
【判断题】
第403题:达到总量控制目标,应从降低污染物浓度,减少污染物排放看手
A. 对
B. 错
【判断题】
第404题:实际生产运行过程中,裂解气压缩机各段吸入罐液面的高低不用严格控制
A. 对
B. 错
【判断题】
第405题:裂解炉炉管渗碳深度大于管壁厚的50%时,需立即更换辐射段护管
A. 对
B. 错
【判断题】
第406题:乙炔气瓶使用时应安装阻火器
A. 对
B. 错
【判断题】
第407题:任何单位和个人不得编造、传播有关突发事件事态发展,或者应急处置工作的虚假信息
A. 对
B. 错
【判断题】
第408题:裂解炉紧急停车,有可能造成辐射段炉管焦层破裂,焦层碎片会引起辐射段炉管堵塞
A. 对
B. 错
【判断题】
第409题:碳二加氢反应器运转时,必须严格控制床层温升,防止床层温度过高导致反应器飞温
A. 对
B. 错
【判断题】
第410题:燃烧产生的废气是石化行业污染的主要来源之一
A. 对
B. 错
【判断题】
第411题:众所周知重金属对人体会造成中毒,而轻金属则不会。因此我们可以放心地使用铝等轻金属制作的餐具
A. 对
B. 错
【判断题】
第412题:裂解炉看火门作用是用来观察辐射室内燃烧器燃烧的火焰颜色、形状及长短
A. 对
B. 错
【判断题】
第413题:安全生产监督管理部门在生产经营单位现场检查时,发现现场作业人员未有按照要求佩戴、使用劳动防护用品的情况,应当依法给予行政拘留
A. 对
B. 错
【判断题】
第414题:防治固废物污染应力求使固废物减量化、无害化、资源化
A. 对
B. 错
【判断题】
第415题:深冷物料泵停泵后,不需要排液
A. 对
B. 错
【判断题】
第416题:裂解气压缩机等大型机组的用油要坚持定期分析化验制度。经化验后的油品不符合使用要求时,要及时更换润滑油脂
A. 对
B. 错
【判断题】
第417题:乙烯装置烃类物料管线高频振动,造成管材出现疲劳裂纹,泄露烃物料易引起火灾
A. 对
B. 错
【判断题】
第418题:发生液体物料发生泄漏,应立即设置围堰,以避免造成二次污染
A. 对
B. 错
【判断题】
第419题:泵轴承冷却水量减少或中断均会导致轴承温度升高
A. 对
B. 错
【判断题】
第420题:丙烯制冷压缩机在低、中速暖机期间,如果排蒸汽温度过高,可通过降速或调整真空度来调整
A. 对
B. 错
【判断题】
第421题:生产经营单位风险种类多、可能发生多种事故类型的,可以不用编制本单位的综合应急预案
A. 对
B. 错
【判断题】
第422题:防护用品必须严格保证质量、安全可靠、但可以不用舒适和方便
A. 对
B. 错
【判断题】
第423题:裂解炉在正常运行过程中,要防止炉管温度的大幅度波动,炉管温度的大幅度波动会使炉管表面的焦块松动脱落
A. 对
B. 错
【判断题】
第424题:报废设备测爆合格就可以出厂
A. 对
B. 错
【判断题】
第425题:裂解炉高压蒸汽温度过高主要危害为,超过高压蒸汽管线最高耐温,破坏管线
A. 对
B. 错
【判断题】
第426题:因特殊情况需要进行电、气焊等明火作业的动火部门和人员应当按照单位的用火管理制度办理审批手续,落实现场监护人,在确认无火灾、爆炸危险后方可动火施工
A. 对
B. 错
【判断题】
第427题:急冷油温度低会造成稀释蒸汽发生量减少,补入中压蒸汽加大,排污量的增大对环境造成影响
A. 对
B. 错
【判断题】
第428题:改进工艺、加强通风、密闭操作、水式作业等都是防尘的有效方法
A. 对
B. 错
【判断题】
第429题:火灾扑灭后,起火单位应当保护现场,接受事故调查,如实提供火灾事故的情况,协助公安消防机构调查火灾原因
A. 对
B. 错
【判断题】
第430题:在工厂临时参观的时候可以不必穿戴防护服装
A. 对
B. 错
【判断题】
第431题:汽油气提塔和凝液气提塔在检修中清理出来的低聚物要及时转运或者用水不间断地冲洗降温,防止自燃
A. 对
B. 错
【判断题】
第432题:在铝炉给水中加入磷酸钠的目的是为了避免汽包和废热锅炉列管的结垢
A. 对
B. 错
【判断题】
第433题:综合演练通常成立演练领导小组,下设策划组、执行组、保障组、评估组等专业工作组。相据演练规模大小,其组织机构可进行调整
A. 对
B. 错
【判断题】
第434题:裂解炉区着火后,消防水与燃烧物接触汽化形成的“蒸汽幕”,具有隔离、窒熄作用
A. 对
B. 错
【判断题】
第435题:在生产过程中,控制尘毒危害的最重要的方法是使用个人防护用品
A. 对
B. 错
【判断题】
第436题:石化生产中存在诸多不安全因素,事故多,损失大
A. 对
B. 错
【判断题】
第437题:碳二、碳三加氢催化剂,在打开反应器前,不需要进行氧化处理,便可以确保安全
A. 对
B. 错
【判断题】
第438题:防止静电累计消除静电危害,采用静电接地时简易可行,十分有效的方法
A. 对
B. 错
【判断题】
第439题:脱丁烷塔塔釜液位过高或过低,都会造成再沸器容易结焦而使运行周期缩短
A. 对
B. 错
【判断题】
第440题:二氧化碳的伤害途径为呼吸道吸入
A. 对
B. 错