【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
推荐试题
【单选题】
财政部向发行国债,会增加基础货币___
A. 公众
B. 企业
C. 商业银行
D. 中央银行
【单选题】
商业银行将获得的贴现票据向其他商业银行或者其他贴现机构进行贴现的行为叫做___
A. 再贴现
B. 转贴现
C. 背书转让
D. 承兑
【单选题】
关于期权和到期日,下列表述正确的是___
A. 对于到期日确定的期权来说,在其他条件不变时,随着时间的流逝,其时间价值的减少是递增的
B. 对于到期日确定的期权来说,在其他条件不变时,随着时间的流逝,其时间价值的减少是递减的
C. 对于到期日确定的期权来说,在其他条件不变时,随着时间的流逝,其时间价值的减少是不变的
D. 当时间流逝同样的长度,在其他条件不变时,期限长的期权时间价值的减少幅度将大于期限短的期权时间价值的减小幅度
【单选题】
周期性不平衡是由_______造成的。___
A. 汇率的变动
B. 国民收入的增减
C. 经济结构不合理
D. 经济周期的更替
【单选题】
下列不属于商业银行资产管理理论的是___
A. 商业性贷款理论
B. 资产可转换性理论
C. 预期收入理论
D. 资产组合理论
【单选题】
格雷欣法则开始于以下哪种货币制度___
A. 平行本位制
B. 双本位制
C. 跛行本位制
D. 单本位制
【单选题】
以下不属于金融监管三道防线的是___
A. 预防性风险管理
B. 市场约束
C. 存款保险制度
D. 最后贷款制度
【单选题】
产品价格上升和下降20%,对实际货币存量的影响是___
A. 下降和上升20%
B. 上升20%和下降20%
C. 下降16.7%和上升25%
D. 不变
【单选题】
一国国际收支逆差会使__________
A. 外国对该国货币需求增加,该国货币汇率上升
B. 外国对该国货币需求减少,该国货币汇率下跌
C. 外国对该国货币需求增加,该国货币汇率下跌
D. 外国对该国货币需求减少,该国货币汇率上升
【单选题】
下列属于信用创造工具的是___
A. 货币互换交易
B. 大额可转让定期存单
C. 票据发行便利
D. 可转债
【单选题】
米德冲突分析的是___
A. 固定汇率制下,失业与经常账户逆差并存或通货膨胀与经常账户顺差并存两种经济状况下的政策困境
B. 固定汇率制下,失业与经常账户逆差并存或通货膨胀与经常账户逆差并存两种经济状况下的政策困境
C. 浮动汇率制下,资本自由流动和货币政策自主性之间的政策冲突
D. 固定汇率制下,资本自由流动和货币政策自主性之间的政策冲突
【单选题】
属于选择性货币政策工具的是___
A. 法定存款准备金政策
B. 再贴现政策
C. 公开市场业务
D. 证券市场信用控制
【单选题】
银团贷款的组织者或安排者称为________    ___
A. 代理行     
B. 参加行      
C. 牵头行         
D. 经理行
【单选题】
用________计算的GDP可以反映一国或地区的经济发展规模___
A. 不变价格
B. 现行价格
C. 单位价格
D. 计划价格
【单选题】
货币政策中介变量发生变化后到目标变量发生变化之间的所经历的时间叫做___
A. 操作时滞
B. 内部时滞
C. 市场时滞
D. 决策时滞
【单选题】
所谓均衡价格,是指___
A. 供给和需求相等时的价格
B. 不会变动的价格
C. 供给量和需求量相等时的价格
D. 成交价格
【单选题】
一种商品的需求曲线向右移动的原因可能是___
A. 替代品价格上升,或互补品价格下降
B. 替代品或者互补品的价格上升
C. 替代品价格下降,或互补品价格上升
D. 替代品或者互补品
【单选题】
当一国中央银行在公开市场上买入外币债券时,在资产组合分析法下,会导致本币利率和汇率发生以下变化__________
A. 下降/升值
B. 下降/贬值
C. 上升/不变
D. 上升/贬值
【单选题】
垄断企业在利润最大化时,其价格___
A. 一定小于边际成本
B. 一定等于边际成本
C. 一定大于边际成本
D. 可能等于或小于但是不会大于边际成本
【单选题】
生产函数可以告诉我们的是,企业___
A. 生产既定产量的费用是什么
B. 利润最大化产量
C. 使货币成本最低的要素组合
D. 生产既定产量的生产要素的各种组合
【单选题】
假定其他条件不变,需求弹性(绝对值)越大,则___
A. 消费者负担的税收越多
B. 生产者负担的税收越多
C. 生产者收益越大
D. 税收负担可能增加也可能减少,要看对谁课税
【单选题】
今年美国在华公司的销售收入增加,那么以下情形不成立的是___
A. 美国的GDP增加
B. 中国的GDP增加
C. 美国的GNP增加
D. 美国的消费增加
【单选题】
如果美联储旨在使用货币政策将失业率降低2个百分点,那么___
A. 潜在GDP会增加
B. 投资会下降
C. 居民消费会下降
D. 短期通货膨胀会发生
【单选题】
商业周期中会出现___
A. 利率下降
B. 基本生活费下降
C. 潜在GDP下降
D. 摩擦失业增加
【单选题】
财政政策的失效表现在___
A. 居民改变消费倾向
B. 私人投资减少
C. 公共投资减少
D. 居民储蓄减少
【单选题】
在新古典增长理论中___
A. 没有技术进步,资本深化将停止
B. 资本转化不变
C. 劳动与资本不能互相替代
D. 资本与劳动决定经济增长
【单选题】
第一还款来源是指________     ___
A. 借款人的资产变现收入
B. 借款人的正常经营收入 
C. 借款人的担保变现收入
D. 借款人的对外筹资
【单选题】
在固定汇率制度下___
A. 利率上升不会引起国外资本流入
B. 货币政策未必有效
C. 财政政策未必有效
D. 利率与国际收支无关
【单选题】
下列说法哪一个是正确的?(Ⅰ)风险厌恶投资者拒绝公平游戏的投资(Ⅱ)风险中性的投资者只通过预期收益来评价风险资产(Ⅲ)风险厌恶的投资者只通过风险来评价风险资产(Ⅳ)风险喜好者不参与公平游戏___
A. 只有(Ⅰ)
B. 只有(Ⅱ)
C. 只有(Ⅰ)和(Ⅱ)
D. 只有(Ⅱ)和(Ⅲ)
【单选题】
当发生下列哪种情况时,债券会打折出售?___
A. 息票利率高于现行收益率,现行收益率高于到期收益率
B. 息票利率高于到期收益率
C. 息票利率低于现行收益率,现行收益率高于到期收益率
D. 息票利率低于现行收益率,现行收益率低于到期收益率
【单选题】
债券的久期一般都随的增加而增加___
A. 到期收益率
B. 息票率
C. 到期时间
D. 以上各项均正确
【单选题】
根据看跌期权与看涨期权评价理论,一张无红利分派股票的欧式看跌期权的价值等于___
A. 看涨期权价格加上当前的执行价格加上股价
B. 看涨期权价格加上当前的执行价格减去股价
C. 当前股价减去执行价格减去看涨期权价格
D. 当前股价加上执行价格减去看涨期权价格
【单选题】
假定中国资本市场开放,人民币可以自由兑换。如果利率提高,导致人民币相对美元升值,那么___
A. 中国采取的是固定汇率制度
B. 中国采取的是自由汇率制度
C. 中国的出口会增加
D. 中国的进口会增加
【单选题】
银行通过下列哪种活动创造货币?___
A. 减少超额准备
B. 从央行购买政府债券
C. 从贷款中获得收益
D. 为客户提供转帐服务
【单选题】
从一个中国企业的角度看,下列情况中,哪一种没有外汇风险?___
A. 有100万美元的应收账款
B. 买入3个月期10亿日元,用于支付3个月后到期的进口信贷
C. 一笔价值200万欧元的贷款
D. 一笔6个月到期、价值1000万美元的存款,和一笔同样期限、价值500万美元的应付账款
【单选题】
下列机构中不属于世界银行集团的是___
A. 国际复兴开发银行
B. 国际开发协会
C. 国际金融公司
D. 国际清算银行
【单选题】
经济周期有三种类型,其中现实生活人们最关注的是___________
A. 短周期
B. 长周期
C. 中周期
D. 全周期
【单选题】
消费者选择提前消费或延迟消费,与无直接关系.___
A. 消费者偏好
B. 消费者剩余
C. 消费者对未来的预期收入
D. 市场利率状况
【单选题】
资本流出是指本国资本流到外国,它表示_______,因此应记入国际收支平衡表的__________
A. 外国对本国的负债减少/借方
B. 本国对外国的负债增加/借方
C. 外国在本国的资产增加/贷方
D. 外国在本国的资产减少/贷方
【单选题】
国际储备的币种管理应遵循的主要原则是__________
A. 流动性、方便性、普遍接受性
B. 可得性、流动性、普遍接受性
C. 自由兑换性、普遍接受性、可偿性
D. 可得性、自由兑换性、保值性