【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABC
解析
暂无解析
相关试题
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
推荐试题
【填空题】
97.发电机内充有氢气时,空侧氢油分离箱的___应连续运行。
【填空题】
98.密封油系统投入前,应先投入主机___系统。
【填空题】
99.在润滑油主油箱排油前,必须先将发电机内___置换完毕。
【填空题】
100.停机期间或正常运行中,若氢侧油泵故障需处理时,则允许___暂时退出运行,但应密切注意氢气纯度变化不低于___,故障消除后立即投运。
【填空题】
101.停机期间未排氢,发电机及其氢气管道附近___米内禁止明火。氢系统动火作业必须___后进行。
【填空题】
102.1号机密封油系统正常运行时保持氢压___MPa。
【填空题】
103.1号机密封油系统正常运行时氢油压差保持为___MPa。
【填空题】
104.1号机密封油系统正常运行时空侧、氢侧密封油供油压差在___Kpa范围之内。
【填空题】
105.1号机密封油系统正常运行时密封油冷却器出口油温应保持在___℃之间。
【填空题】
106.1号机空侧密封油正常工作油源由___提供,由主压差阀保证氢油压差___MPa。
【填空题】
107.1号机空侧密封油第一备用油源是由汽机___来的2.1MPa高压油,当主工作油源发生故障、氢油压差降到___MPa时,该油源由___压差调节器控制调节,维持氢油压差___MPa。
【填空题】
108.1号机空侧密封油第二备用油源是由汽机主油箱上的___油泵提供,当汽机转速低于2800r/min或发生故障且氢油压差降到___MPa时,则由___油泵提供密封油。该油源由备用压差调节器控制调节,维持油氢压差___MPa。
【填空题】
109.1号机空侧密封油第四备用油源是由___油泵提供,当氢油压差降到___MPa时,启动___油泵,使密封油压恢复并保证氢油压差___MPa。该油泵只允许运行___小时左右,如前两级油源短时间内不能恢复运行,应将氢气压力降到___MPa,以免直流油泵停运后引起漏氢。
【填空题】
110.1号机空侧密封油第三备用油源:由___系统供给,提供的油压较低,要求该油源在密封油装置入口处的油压不低于___MPa。该油源投入运行后,维持发电机内氢压___MPa 。
【填空题】
111.1号机电动阀试验前应对运行中___无影响,检修人员___,电动阀___正常。
【填空题】
112.必须在___停止运行,且发电机内置换为___后,才能停止密封油系统运行。
【填空题】
113.1号机正常运行时发电机漏氢量<___m3/日
【填空题】
114.1号机EH油再生泵根据___情况停止,当停机后EH油温低时,油箱中会发生___,停机时间超过一周时,应投入EH油再生泵运行___小时。
【填空题】
115.1号机EH油泵的启动条件有EH油箱油位不低于___mm,EH油温大于___℃,确认EH油系统阀门已检查处于___位置。
【填空题】
116.凝汽器真空降低时,容易过负荷的级段为___。
【填空题】
117.氢气冷却器局部故障停运,处理原则是当发电机满足额定氢压0.35Mpa的条件下,氢气冷却器有1/4台退出时,允许带___%额定负荷。.氢压降低现象是发电机氢压___,DCS发出“氢气压力低”___报警信号
【填空题】
118.定子水电导率增加的原因有___漏入水中,不纯净的___进入,___中的树脂接近使用寿命。
【填空题】
119.定子水电导率增加的现象有定子水电导率高___,就地电导率指示表读数___。
【填空题】
120.凝结水泵推力轴承温度、电动机推力轴承温度___℃报警,___℃时保护停泵,电动机线圈温度___℃报警,电动机轴承温度___℃报警。
【填空题】
121.凝结水泵汽化现象有___摆动,___不稳或到零,电流___并___,泵出口母管___,泵运行中___增大。
【填空题】
122.1号机开式冷却水系统有真空泵冷却器、___热交换器、___冷却器、定冷水冷却器、___冷却器.
【填空题】
123.1号机循环水冷却水塔的主要组成部分包括:___池、通风筒、人字柱、中央竖井、___槽、配水管、喷头、填料、除水器等。
【填空题】
124.凝汽器最佳真空___极限真空。
【填空题】
125.1号机闭式冷却水系统是由二台___容量的闭式冷却水泵,一个___ m3闭式稳压水箱和二台100%容量的闭式冷却水___组成。
【填空题】
126.1号机闭式冷却水系统主要是向汽泵前置泵___冷却器,电泵及前置泵机械密封冷却器,___润滑油冷却器,___润滑油站冷却器,EH油___,密封风机轴承,凝结水泵___等提供冷却水。
【填空题】
127.1号机闭式水泵出口母管压力低是由于运行泵工作___,系统___ ,及入口滤网___等原因造成的。
【填空题】
128.1号机辅助蒸汽系统向空预器___吹灰、除氧器启动___、暖风器、小汽机___及调试、汽机___、采暖等提供用汽。
【填空题】
129.当发生厂用电失去,机组故障停机,当排汽温度小于___时,方可投入凝汽器冷却水,若排汽温度超过___,需经领导同意,方可投入凝汽器冷却水___。
【填空题】
130.1号机设有两台___容量的水环式真空泵,在机组启动期间及夏季高背压工况两台泵可___运行,正常运行时一台运行一台备用。
【填空题】
131.1号机在确认___已经停止运行,方可以解除顶轴油泵___,停运顶轴油泵。
【填空题】
132.1号机润滑油系统由主油泵、___油泵、___油泵、___油泵、___装置、冷油器、___系统、主油箱、射油器、油净化装置等组成.
【填空题】
133.1号机油净化系统包括___装置及其与汽机___、___相连的有关管道系统。
【填空题】
134.汽轮机闭式水箱可以用 ___、___补水。
【填空题】
135.轴封供汽停运前应确认机组在___状态且汽封供汽来自___,主凝汽器真空完全消失,方可将轴封压力定值减至零,关闭轴封___。
【填空题】
136.1号机凝结水系统系统设两台100%容量的筒式___,四台___,一台轴封冷却器,一台___,一台___立方米的凝结水补水箱,和一台凝结水输送泵。