【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AD
解析
暂无解析
相关试题
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
推荐试题
【多选题】
(7)乙公司2017年度借款费用计入当期损益的金额为___万元。
A. 161.6
B. 162.6
C. 163.6
D. 0
【多选题】
(8)乙公司2018年度借款费用计入当期损益的金额为___万元。
A. 110
B. 111
C. 112
D. 113
【多选题】
(9)乙公司累计资本化的专门借款费用是___万元。
A. 178.5
B. 180.5
C. 182.5
D. 184.5
【多选题】
(10)乙公司累计费用化的专门借款费用是___万元。
A. 113
B. 115
C. 115.5
D. 117
【多选题】
(1)大海公司对售出的甲产品可能发生的维修费用按照甲产品销售收入的___%预计。
A. 3
B. 4
C. 5
D. 8
【多选题】
(2)大海公司2017年度销售收入为___万元。
A. 1000
B. 1800
C. 3000
D. 3600
【多选题】
(3)大海公司2017年对甲产品应计提预计负债___万元。
A. 142
B. 144
C. 146
D. 148
【多选题】
(5)大海公司2017年发生的维修费用中耗用原材料___万元。
A. 41
B. 42
C. 43
D. 44
【多选题】
(6)大海公司2017年发生的维修费用中耗用人工成本___万元。
A. 30
B. 28
C. 29
D. 27
【多选题】
(7)大海公司2017年用银行存款支付的维修费用为___万元。
A. 0
B. 2
C. 4
D. 6
【多选题】
(10)2017年12月31日预计负债的账面余额为___万元。
A. 98
B. 99
C. 100
D. 101
【判断题】
在非货币性资产交换中,如果按换出资产账面价值为基础计量换入资产成本的,无论是否收付补价,对换出资产公允价值与账面价值的差额均不确认损益
A. 对
B. 错
【判断题】
换入资产和换出资产公允价值均能够可靠计量的,在具有商业实质的情况下,必须以换出资产的公允价值作为确定换入资产成本的基础,但有确凿证据表明换入资产的公允价值更加可靠的除外
A. 对
B. 错
【判断题】
非货币性资产交换具有商业实质且公允价值能够可靠计量的,在发生补价的情况下,支付补价方,应当以换入资产的公允价值和应支付的相关税费,作为换入资产的成本
A. 对
B. 错
【判断题】
多项非货币性资产交换具有商业实质,且换入资产的公允价值能够可靠计量的,应当按照换入资产的公允价值作为换入资产的入账价值
A. 对
B. 错
【判断题】
政府无偿提供非货币性资产给企业,按非货币性资产交换处理
A. 对
B. 错
【判断题】
具有商业实质的非货币性资产交换按照公允价值计量的,假定不考虑补价和相关税费等因素,应当将换入资产的公允价值和换出资产的账面价值之间的差额计入当期损益
A. 对
B. 错
【判断题】
具有商业实质的非货币性资产交换按照公允价值计量的,换出投资性房地产的,应当按照公允价值确认收入,同时按照账面价值结转成本
A. 对
B. 错
【判断题】
涉及或有事项时,需要考虑处置相关资产可能形成的利得或损
A. 对
B. 错
【判断题】
预付款项属于非货币性资产
A. 对
B. 错
【判断题】
认定涉及少量货币性资产的交换为非货币性资产交换,通常以补价占整个资产交换金额的比例高于25%作为参考
A. 对
B. 错
【判断题】
未同时满足准则规定的两个条件的非货币性资产交换,即(1)该项交换具有商业实质;(2)换入资产或换出资产的公允价值能够可靠地计量。应当以换出资产的账面价值和为换入资产应支付的相关税费作为换入资产的成本,不确认损益
A. 对
B. 错
【判断题】
货币性资产,是指企业持有的货币资金和将以固定或可确定的金额收取的资产
A. 对
B. 错
【判断题】
将债务转为资本的债务重组中,债务人应将股份的公允价值总额与股本(或实收资本)之间的差额确认为投资收益
A. 对
B. 错
【判断题】
在延期付款清偿债务并附或有支出条件的情况下,债权人应当将修改其他债务条件后的债权将来应收金额作为重组后债权的账面价值。重组债权的账面价值与重组后债权的入账价值之间的差额,计入当期损益
A. 对
B. 错
【判断题】
准备持有至到期的债券投资属于非货币性资产
A. 对
B. 错
【判断题】
债务重组中,债权人一定会由于债务重组而确认营业外支出
A. 对
B. 错
【判断题】
固定资产属于货币性资产
A. 对
B. 错
【判断题】
债务人根据转换协议,将应付可转换公司债券转为资本不属于债务重组
A. 对
B. 错
【判断题】
应收账款属于非货币性资产
A. 对
B. 错
【判断题】
债务重组中以现金清偿债务的,债权人应当将重组债权的账面余额与收到的现金之间的差额,计入营业外支出
A. 对
B. 错
【判断题】
可供出售金融资产属于非货币性资产
A. 对
B. 错
【判断题】
修改其他债务条件涉及的或有应收金额,在债权人方面,或有应收金额属于或有资产,债权人应确认或有应收金额
A. 对
B. 错
【判断题】
银行存款属于货币性资产
A. 对
B. 错
【判断题】
对于附或有应付条件的债务重组,债务重组利得为重组债务的账面价值与重组后债务的入账价值和预计负债金额之和的差额,这部分利得应计入当期损益(营业外收入)
A. 对
B. 错
【判断题】
务重组,是指在债务人发生财务困难的情况下,债权人按照其与债务人达成的协议或者法院的裁定作出让步的事项
A. 对
B. 错
【判断题】
在混合重组方式下,债权人依次以收到的现金、接受的非现金资产公允价值、债权人享有股份的公允价值冲减重组债权的账面余额
A. 对
B. 错
【判断题】
以非现金资产清偿债务的,债务人应当将重组债务的账面价值与转让的非现金资产公允价值之间的差额,计入当期损益。转让的非现金资产公允价值与其账面价值之间的差额,计入当期损益
A. 对
B. 错
【判断题】
修改后的债务条款中涉及或有应收金额的,债权人不应当确认或有应收金额,不得将其计入重组后债权的账面价值。只有在或有应收金额实际发生时,才计入当期损益
A. 对
B. 错
【判断题】
债务重组以现金清偿债务、非现金资产清偿债务、债务转为资本、修改其他债务条件等方式的组合进行的,债务人应当以支付的现金、转让的非现金资产公允价值、债权人享有股份的公允价值冲减重组债务的账面价值,再按照债务人修改其他债务条件的规定进行会计处理
A. 对
B. 错