【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
推荐试题
【判断题】
根据《商业银行授信工作尽职指引》,审慎监管的要求,客户资料如有变动商业银行应要求客户进行口头通知,进一步核实后在档案中重新记载
A. 对
B. 错
【判断题】
根据《商业银行授信工作尽职指引》,商业银行应根据各环节授信分析评价的结果,形成书面的分析评价报告。分析评价报告报出后,不得在原稿上作原则性更改;如需作原则性更改,应另附说明
A. 对
B. 错
【判断题】
根据《商业银行授信工作尽职指引》,商业银行对客户调查和客户资料的验证应以实地调查为主,间接调查为辅。必要时,可通过外部征信机构对客户资料的真实性进行核实
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》规定,商业银行可对用途为从事股票、期货、金融衍生产品等投资的业务进行授信
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,商业银行对客户调查和客户资料的验证应以实地调查为主,间接调查为辅。必要时,可通过外部征信机构对客户资料的真实性进行核实
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,授信业务部门授信工作人员和授信管理部门授信工作人员任何一方需对客户资料进行补充时,须通知另外一方,但原则上须由授信管理部门授信工作人员办理
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,商业银行应对第二还款来源进行分析评价,确认保证人的保证主体资格和代偿能力,以及抵押、质押的合法性、充分性和可实现性
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,商业银行应根据客户偿还能力和现金流量,对客户授信进行调整,包括展期,增加或缩减授信,要求借款人提前还款,并决定是否将该笔授信列入观察名单或划入问题授信
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,商业银行应支持授信工作尽职调查人员独立行使尽职调查职能,调查可采取现场或非现场的方式进行。必要时,可委托专业机构开展特定的授信尽职调查工作
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》的规定,商业银行持有的集团客户成员企业发行的公司债券、企业债券、短期融资券、中期票据等债券资产以及通过衍生产品等交易行为所产生的信用风险暴露不要纳入集团客户授信业务进行风险管理
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》的规定,根据审慎监管的要求,银行业监管机构不可调低单个商业银行单一集团客户授信余额与资本净额的比例
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》的规定,商业银行对跨国集团客户在境内机构授信时,除了要对其境内机构进行调查外,还要关注其境外公司的背景、信用评级、经营和财务、担保和重大诉讼等情况,并在调查报告中记录相关情况
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》,计算授信余额时,不应扣除客户提供的保证金存款及质押的银行存单和国债金额
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》,商业银行在给集团客户授信时,应当进行充分的资信尽职调查,要对照授信对象提供的资料,对重点内容或存在疑问的内容进行实地核查,并在授信调查报告中反映出来。调查人员应当对调查报告的真实性负责
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》,贷款对象出现重大兼并、收购重组等情况,贷款人认为可能影响到贷款安全的贷款人有权单方决定停止支付借款人尚未使用的贷款,并提前收回部分或全部贷款本息,并依法采取其他措施
A. 对
B. 错
【判断题】
根据审慎监管的要求,银行业监管机构不能调低单个商业银行单一集团客户授信余额与资本净额的比例
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》规定,商业银行给集团客户贷款时,贷款对象出现重大兼并、收购重组等情况,贷款人认为可能影响到贷款安全的,贷款人有权单方决定停止支付借款人尚未使用的贷款,并提前收回部分或全部贷款本息
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,在中华人民共和国境内依法设立的外商独资商业银行不适用指引要求
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,银行业监管机构根据审慎监管的要求可以调低单个商业银行单一集团客户授信余额与资本净额的比例
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,计算授信余额时,可扣除客户提供的保证金存款,但不可扣除客户质押的银行存单和国债金额
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,商业银行每两年应至少向银行业监督管理机构提交一次相关风险评估报告
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,各商业银行之间应当加强合作,相互征询集团客户的资信时,应当按商业原则依法提供必要的信息和查询协助
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》(银监办发[2014]40号)规定,商业银行应建立信贷人员专项考评体系,把防范违规放贷风险与个人薪酬等挂钩,职级变动不在挂钩范围
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,在贷款受理环节,为确保符合管理要求,可放宽客户准入资格审查
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,培育信贷合规文化包括:合规从高层做起、合规人人有责、合规创造价值
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,在贷款风险评价和审批阶段,为确保审批通过,可适当指导客户调整报表等相关信息
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,在贷款合同签订和发放阶段,为营销客户需要,允许先部分放款,再落实贷款条件
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,在贷后检查阶段,要加强对客户贷款使用的监督,及时跟踪客户经营状况,定期实地查看押品状态,严防贷款被挪用、资产被转移、担保被悬空
A. 对
B. 错
【判断题】
X银行为加强信贷流程控制,不断加强贷款精细化管理,重点关注客户还款意愿和第一还款来源,减少对抵质押品等第二还款来源的依赖。依据《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,该银行的上述行为,有效防止了银行信贷业务的“典当化”
A. 对
B. 错
【判断题】
2014年10月,X银行在对某分行信贷检查中发现一笔800万元的个人经营性贷款,该行分管信贷业务的副行长指使客户经理出具虚假调查报告,在贷款发放时提供虚假合同,2014年9月,该客户未按时归还贷款利息,并无法联系。依据《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,总行对于该副行长予以记大过处分,并对其他参与放贷人员一并严肃处理
A. 对
B. 错
【判断题】
按照《中国银监会关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》规定,可以办理续贷的小微企业条件之一为,原流动资金周转贷款风险分类为关注以上,且符合新发放流动资金周转贷款条件和标准
A. 对
B. 错
【判断题】
按照《中国银监会关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》规定,银行业机构同意续贷的,应当在原流动资金周转贷款到期前与小微企业签订新的借款合同,需要担保的签订新的担保合同,落实借款条件,通过新发放贷款结清已有贷款等形式,允许小微企业继续使用贷款资金
A. 对
B. 错
【判断题】
按照《中国银监会关于进一步做好小微企业金融服务工作的指导意见》规定,对流动资金周转贷款到期后仍有融资需求,又临时存在资金困难的小微企业,经其主动申请,银行业金融机构可以提前按新发放贷款的要求开展贷款调查和评审
A. 对
B. 错
【判断题】
对生产经营正常,但存在贷款欠息的小微企业,大新银行可通过新发放贷款结清已有贷款等形式,允许企业继续使用贷款资金。根据《关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》,上述表述是否正确?
A. 对
B. 错
【判断题】
大新银行为生产经营回款周期超过一年的小微企业统一按常规流动资金贷款管理,将融资期限设定为一年。根据《关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》,这种做法是否正确?
A. 对
B. 错
【判断题】
对在贷后检查中发现改变续贷贷款用途的小微企业,大新银行应及时进行风险评估和风险预警,必要时提前收回贷款资金。根据《关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》,上述表述是否正确?
A. 对
B. 错
【判断题】
按照《商业银行服务价格管理办法》的规定,商业银行服务价格均实行市场调节价
A. 对
B. 错
【判断题】
按照《商业银行服务价格管理办法》的规定,商业银行设立新的实行市场调节价的服务收费项目,应当至少实行前1个月按照本办法规定进行公示
A. 对
B. 错
【判断题】
除实行政府定价的服务价格以外,商业银行服务价格实行市场调节价
A. 对
B. 错
【判断题】
商业银行分支机构因地区性明显差异需要实行差别化服务价格的,应当由总行统一制定服务价格,并由总行按照本办法规定统一进行公示
A. 对
B. 错