【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
推荐试题
【单选题】
《党章》规定,党组织对党员作出处分决定,应当实事求是地查清事实。处分决定所依据的事实材料和处分决定______同本人见面,听取本人说明情况和申辩。___
A. 可以
B. 必须
C. 不用
D. 视情况而定
【单选题】
党的最高领导机关是______。___
A. 党的全国代表大会和它所产生的中央委员会
B. 党的全国代表大会和党的地方各级代表大会
C. 党的中央政治局及其常务委员会
D. 党的全国代表会议
【单选题】
预备党员预备期满后,党组织经过考察认为其不履行党员义务,不具备党员条件的,应当______。___
A. 留党察看
B. 延长预备期
C. 取消预备党员资格
D. 给予警告
【单选题】
企业、农村、机关、学校、科研院所、街道社区、社会组织、人民解放军连队和其他基层单位,凡是有正式党员______人以上的,都应当成立党的基层组织。___
A. 2
B. 3
C. 4
D. 5
【单选题】
“三会一课”制度的内容是______。___
A. 支部党员大会,党支部委员会,党小组会,党课
B. 支部党员大会,全体人员会,领导班子会,党课
C. 民主生活会,党支部委员会,党小组会,党课
D. 支部党员大会,党支部委员会,组织生活会,党课
【单选题】
党的地方各级委员会全体会议,每年至少召开______次。___
A. 一
B. 两
C. 三
D. 四
【单选题】
党的中央委员会认为有必要,或者有______以上的省一级组织提出要求,全国代表大会可以提前举行;如无非常情况,不得延期举行。___
A. 四分之一
B. 三分之一
C. 二分之一
D. 三分之二
【单选题】
______负责军队中党的工作和政治工作,对军队中党的组织体制和机构作出规定。___
A. 中央军事委员会
B. 中央军事委员的政治工作机关
C. 中国人民解放军总政治部
D. 中央军事委员会总政治部
【单选题】
党的各级领导干部必须模范地履行党员的各项义务,并且必须具备以下的基本条件______。___
A. 信念坚定、为民务实、忠诚干净、敢于担当
B. 信念坚定、勤政务实、敢于担当、清政廉洁
C. 对党忠诚、信念坚定、敢于担当、治企有方
D. 对党忠诚、为民务实、忠诚干净、敢于担当
【单选题】
党组的成员,由______的党组织决定。___
A. 批准成立党组
B. 本单位推荐
C. 当地党委
D. 上级党委
【单选题】
中国共产党党员是______。___
A. 中国工人阶级的先锋战士
B. 中国工人阶级的有共产主义觉悟的先锋战士
C. 中国工人阶级的先锋队
D. 中国工人阶级的先进代表
【单选题】
中国共产党党员永远是劳动人民的______。 ___
A. 普通一员
B. 重要一员
C. 其中一员
D. 特殊一员
【单选题】
中国共产党员要自觉遵守党的纪律,首先是党的______和______,模范遵守国家的法律法规,严格保守党和国家的秘密,执行党的决定,服从组织分配,积极完成党的任务。 ___
A. 组织纪律政治规矩
B. 政治纪律 政治规矩
C. 组织制度政治规矩
D. 规章制度 政治制度
【单选题】
发展党员,必须把______放在首位,经过党的支部,坚持个别吸收的原则。 ___
A. 道德标准
B. 政治标准
C. 行为标准
D. 法律标准
【单选题】
预备党员预备期满,党的支部应当及时讨论他能否转为正式党员。认真履行党员义务,具备党员条件的,应当按期转为正式党员;需要继续考察和教育的,可以延长预备期,但不能超过______。___
A. 半年
B. 一年
C. 两年
D. 三年
【单选题】
党的最高领导机关是______。 ___
A. 党的全国代表大会
B. 党的全国代表大会和它所产生的中央委员会
C. 党的全国代表大会产生的中央委员会
D. 党的地方各级代表大会和它们所产生的委员会
【单选题】
党的各级代表大会的代表和委员会的产生,要体现______的意志。 ___
A. 国家
B. 人民
C. 选举人
D. 群众
【单选题】
《中国共产党廉洁自律准则》的施行日期为______。___
A. 2015年10月19日
B. 2015年12月30日
C. 2016年1月1日
D. 2016年1月30日
【单选题】
《中国共产党廉洁自律准则》对全体党员和各级党员领导干部提出了______的要求。___
A. “三个必须”
B. “四个必须”
C. “五个必须”
D. “六个必须”
【单选题】
《中国共产党廉洁自律准则》对全体党员提出了______条廉洁自律规范。___
A. 3
B. 4
C. 5
D. 6
【单选题】
《中国共产党廉洁自律准则》要求党员领导干部廉洁修身,______。___
A. 自觉维护人民根本利益
B. 自觉保持人民公仆本色
C. 自觉提升思想道德境界
D. 自觉带头树立良好家风
【单选题】
《中国共产党廉洁自律准则》要求党员领导干部廉洁用权,______。 ___
A. 自觉维护人民根本利益
B. 自觉保持人民公仆本色
C. 自觉提升思想道德境界
D. 自觉带头树立良好家风
【单选题】
《中国共产党廉洁自律准则》要求党员领导干部廉洁从政,______。___
A. 自觉维护人民根本利益
B. 自觉保持人民公仆本色
C. 自觉提升思想道德境界
D. 自觉带头树立良好家风
【单选题】
《中国共产党廉洁自律准则》要求党员领导干部廉洁齐家,______。___
A. 自觉维护人民根本利益
B. 自觉保持人民公仆本色
C. 自觉提升思想道德境界
D. 自觉带头树立良好家风
【单选题】
《中国共产党廉洁自律准则》分为两部分:一是党员廉洁自律规范;二是______。___
A. 领导廉洁从政规范
B. 领导干部廉洁自律规范
C. 党员领导干部廉洁自律规范
D. 领导干部廉洁从政规范
【单选题】
《中国共产党廉洁自律准则》第四条,坚持吃苦在前、享受在后、甘于奉献,反映了廉洁的______。___
A. 界线
B. 底线
C. 防线
D. 高线
【单选题】
《中国共产党廉洁自律准则》坚持______。___
A. 依法治国与以德治党相结合
B. 依规治党与以德治党相结合
C. 依规治党与以德治国相结合
D. 高标准与守底线相结合
【单选题】
《中国共产党廉洁自律准则》第二条,坚持崇廉拒腐,清白做人,干净做事,反映了廉洁的______。___
A. 界线
B. 底线
C. 防线
D. 高线
【单选题】
《中国共产党廉洁自律准则》是对党章关于廉洁自律要求的______。___
A. 系统化
B. 可操作化
C. 具体化
D. 科学化
【单选题】
《中国共产党廉洁自律准则》的主题是______。___
A. 自省
B. 自觉
C. 自律
【单选题】
《中国共产党廉洁自律准则》第四条,坚持吃苦在前、享受在后、甘于奉献,反映了廉洁的______。___
A. 界线
B. 底线
C. 防线
D. 高线
【单选题】
《中国共产党廉洁自律准则》坚持______。___
A. 依法治国与以德治党相结合
B. 依规治党与以德治党相结合
C. 依规治党与以德治国相结合
D. 高标准与守底线相结合
【单选题】
《中国共产党廉洁自律准则》第二条,坚持崇廉拒腐,清白做人,干净做事,反映了廉洁的______。___
A. 界线
B. 底线
C. 防线
D. 高线
【单选题】
《中国共产党廉洁自律准则》是规范党员领导干部从政行为的______。___
A. 根本性党内法规
B. 重要基础性党内法规
C. 党的重要法规
【单选题】
《中国共产党廉洁自律准则》第一条,坚持公私分明、先公后私、克己奉公,反映了廉洁的______。___
A. 界线
B. 底线
C. 防线
D. 高线
【单选题】
《中国共产党廉洁自律准则》第三条,坚持尚俭戒奢、艰苦朴素、勤俭节约,反映了廉洁的______。___
A. 界线
B. 底线
C. 防线
D. 高线
【单选题】
《中国共产党廉洁自律准则》要求全体党员和各级党员领导干部努力弘扬中华民族传统美德,廉洁自律,接受监督,永葆党的______。___
A. 先进性和纯洁性
B. 高度集中统一
C. 风清气正
D. 政治生态绝对纯净
【单选题】
《关于新形势下党内政治生活的若干准则》在______上通过。___
A. 党的十八届六中全会
B. 十八届中央纪委六次全会
C. 庆祝党成立95周年大会
D. 党的十八届五中全会
【单选题】
新形势下加强和规范党内政治生活,重点是______,关键是高级干部特别是中央委员会、中央政治局、中央政治局常务委员会的组成人员。___
A. 党的各级代表大会代表
B. 各级领导干部
C. 各级领导机关和领导干部
D. 各级领导机关
【单选题】
全党必须聚精会神抓好发展这个党执政兴国的第一要务,坚持以______为中心的发展思想,统筹推进“五位一体”总体布局和协调推进“四个全面”战略布局。___
A. 经济建设
B. 人民
C. 改革
D. 创新