【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
推荐试题
【单选题】
下列护照中属于中华人民共和国普通护照的是___。
A. 发给出国的一般公民、国外侨民的护照
B. 发给派往国外从事文化,经济工作人员的护照
C. 发给政府高级官员的护照
D. 发给政治代表团人员、外交使节人员的护照
【单选题】
导游员在带团时要特别注意儿童的年龄或身高,如果儿童乘坐火车,身高超过___时应购买全价票。
A. 1.2 米
B. 1.3 米
C. 1.4 米
D. 1.5 米
【单选题】
导游人员最重要的基本功是 ___
A. 史地文化知识
B. 政策法规知识
C. 语言表达能力
D. 美学知识
【单选题】
在旅游途中如果有游客被毒蛇咬伤,导游员应该马上用绳、布带或其他植物纤维在伤口上方超过一个关节处结扎,为免组织坏死,每隔___需放松一次。
A. 10 分钟
B. 15 分钟
C. 20 分钟
D. 25 分钟
【单选题】
“山重水复疑无路,柳岸花明又一村”。该诗句所隐藏的观景方法是___。
A. 动态观赏
B. 静态观赏
C. 强调观赏时机
D. 重视观赏距离
【单选题】
巴黎位于东一区,北京为东八区,日本东京为东九区,当北京时间上午 10时,巴黎和东京时间分别是___。
A. 5 点和 11 点
B. 3 点和 11 点
C. 0 点和 9 点
D. 3 点和 9 点
【单选题】
入境游客可免税携带烟草制品的限量是___。
A. 香烟 200 支
B. 香烟 400 支
C. 雪茄 50 支
D. 烟丝 400 克
【单选题】
对出入境人员进行的___,不存在任何特殊免检对象。
A. 海关检查
B. 安全检查
C. 边防检查
D. 卫生检疫
【单选题】
一位 7 岁的小学生购买机票,可以按照同一航班成人普通票价的___购买儿童票。
A. 10%
B. 20%
C. 30%
D. 50%
【单选题】
根据国家民航局的规定,乘坐经济舱的旅客,其登机手提行李限额为___。
A. 不限制携带行李件数,限重 5 千克
B. 只能携带一件,不限重量
C. 只能携带一件,限重 5 千克
D. 可以携带两件,限重 5 千克
【单选题】
根据国家民航局的规定,旅客随身携带的手提行李尺寸不得超过___。
A. 20×30×45 厘米
B. 25×30×50 厘米
C. 20×40×55 厘米
D. 25×40×55 厘米
【单选题】
成年游客购买铁路旅客人身意外伤害保险的费用是 3 元,最高赔付额是___。
A. 5 万元
B. 10 万元
C. 20 万元
D. 30 万元
【单选题】
一张 500 元的火车票,在开车前一小时退票,应收取的退票款是___。
A. 25 元
B. 50 元
C. 75 元
D. 100 元
【单选题】
中国国际航空公司的英文代码是___。
A. MR
B. CZ
C. CA
D. MU
【单选题】
入住饭店后,客人反映电视机没有遥控器,地陪的正确做法是___。
A. 安慰客人,将就一晚,反正明天就离店
B. 告诉客人这种小问题可以找领队来解决
C. 立即报告旅行社,请示处理办法
D. 找楼层服务员解决
【单选题】
下列关于散客旅游者的描述中,不正确的是___。
A. 通常文化层次较高
B. 有较丰富的旅游经验
C. 对服务的要求不高
D. 自主旅游能力较强
【单选题】
送外国旅游团出境时,全陪和地陪可在___离开机场。
A. 旅游团所乘航班起飞后
B. 旅游团办理登记手续时
C. 与旅游团成员交接完行李后
D. 旅游团进入隔离区后
【单选题】
对出入境人员进行的___,不存在任何特殊免检对象。
A. 海关检查
B. 安全检查
C. 边防检查
D. 卫生检疫
【单选题】
一位 7 岁的小学生购买机票,可以按照同一航班成人普通票价的___购买儿童票。
A. 10%
B. 20%
C. 30%
D. 50%
【单选题】
根据国家民航局的规定,乘坐经济舱的旅客,其登机手提行李限额为___。
A. 不限制携带行李件数,限重 5 千克
B. 只能携带一件,不限重量
C. 只能携带一件,限重 5 千克
D. 可以携带两件,限重 5 千克
【单选题】
根据国家民航局的规定,旅客随身携带的手提行李尺寸不得超过___。
A. 20×30×45 厘米
B. 25×30×50 厘米
C. 20×40×55 厘米
D. 25×40×55 厘米
【单选题】
成年游客购买铁路旅客人身意外伤害保险的费用是 3 元,最高赔付额是___。
A. 5 万元
B. 10 万元
C. 20 万元
D. 30 万元
【单选题】
一张 500 元的火车票,在开车前一小时退票,应收取的退票款是___。
A. 25 元
B. 50 元
C. 75 元
D. 100 元
【单选题】
中国国际航空公司的英文代码是___。
A. MF
B. CZ
C. CA
D. MU
【单选题】
入住饭店后,客人反映电视机没有遥控器,地陪的正确做法是___。
A. 安慰客人,将就一晚,反正明天就离店
B. 告诉客人这种小问题可以找领队来解决
C. 立即报告旅行社,请示处理办法
D. 找楼层服务员解决
【单选题】
下列关于散客旅游者的描述中,不正确的是___。
A. 通常文化层次较高
B. 有较丰富的旅游经验
C. 对服务的要求不高
D. 自主旅游能力较强
【单选题】
送外国旅游团出境时,全陪和地陪可在___离开机场。
A. 旅游团所乘航班起飞后
B. 旅游团办理登记手续时
C. 与旅游团成员交接完行李后
D. 旅游团进入隔离区后
【单选题】
游客心脏病摔发,导游人员错误的做法是 ___
A. 立即背患者去医院
B. 让患者平躺在地上,头略高
C. 让亲属或其他游客寻找备用药物
D. 找医生救治,病情稍稳后送医院
【单选题】
境外旅游团乘坐飞机离开本地时,登机牌应由___来分配。
A. 团长
B. 地陪
C. 领队
D. 全陪
【单选题】
某旅行团定于当日晚乘 21:00 起飞的航班离开桂林,晚餐后部分旅游者提出再看一下市容,地陪应___。
A. 提醒旅游者不要太晚回来,以免误机
B. 与全陪分头陪同前往
C. 劝阻旅游者不要前往
D. 告诉旅游者如误机,责任自负
【单选题】
旅游团因故推迟离开某市一天,该市地陪首先应___。
A. 适当延长该团在主要景点的游览时间
B. 酌情为该团增加游览景点
C. 及时将该团行程变化通知组团社
D. 为该团重新落实用餐、用房、用车事宜
【单选题】
导游人员既代表接待方旅行社的利益,又肩负着维护游客合法权益的责任,这体现的是导游服务纽带作用中的___方面。
A. 沟通上下
B. 协调左右
C. 联结内外
D. 标志信息
【单选题】
导游员看到道路两边的树木,在向游客介绍树种及特色时,还向游客介绍了我国的植树节。此时导游员运用的讲解方法是___。
A. 突出重点法
B. 分段讲解法
C. 制造悬念法
D. 由点及面法
【单选题】
旅客持全价票乘坐国内航班商务舱,可免费托运的行李是___。
A. 20 千克
B. 30 千克
C. 40 千克
D. 50 千克
【单选题】
在公共场合活动时,应讲究公德、善解人意,遵守___ 的原则。
A. 不妨碍他人
B. 女士优先
C. 克勤克俭
D. 维护个人隐私
【单选题】
地陪接待一个来自新加坡的 VIP 团,接待社的领导随同前往机场迎接。当宾主双方见面时,地陪正确的介绍方式是___。
A. 先自我介绍再将接待方领导介绍给客人
B. 先自我介绍再将客人介绍给接待方领导
C. 先将领导介绍给客人再自我介绍
D. 先将客人介绍给领导再自我介绍
【单选题】
在一地游览安排中,若发现活动内容与上几站有明显的重复和雷同,全陪首先应该___。
A. 向组团社反映情况
B. 与地接社交涉
C. 向地陪建议进行调整
D. 把情况通告游客
【单选题】
导游员在讲解西湖夏天荷花景色时,用“接天连叶无穷碧,映日荷花别样红”来描述。这种讲解法叫___。
A. 画龙点睛法
B. 联想法
C. 点面结合法
D. 引用名句法
【单选题】
下列事故中,属于完全因导游员的工作失误造成的是___。
A. 旅游者在游览中走失
B. 旅游者丢失行李
C. 错接
D. 空接
【多选题】
导游平等服务原则需要导游___。
A. 平均分配和游客交流的时间
B. 对游客一视同仁,保持平等距离
C. 对游客不能有亲疏贵贱之分
D. 与游客平等交流
E. 对任何游客不能有超常服务