【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
推荐试题
【单选题】
当测试MTU值时所用的ping命令需要输入参数( )___
A. -l
B. -f
C. -t
D. -d
E.
F.
【单选题】
当出现线路故障的时候,需要使用以下那一类型的仪表进行故障点的判断?()___
A. 误码仪
B. OTDR
C. 频谱分析仪
D. 可变光衰减器
E.
F.
【单选题】
当触电伤员神志清醒时,应使( )___
A. 就地平躺观察
B. 人工呼吸
C. 心肺复舒
D. 送医院抢救
E.
F.
【单选题】
当电脑的MTU值设置为1500时,采用不拆包的拼包时,最大能够ping( )数值___
A. 1464
B. 1468
C. 1472
D. 1500
E.
F.
【单选题】
当二层交换网络中出现冗余路径时,用什么方法可以阻止环路的产生,提高网络的可靠性.( )___
A. 生成树协议
B. 水平分割
C. 毒性逆转
D. 最短路径树
E.
F.
【单选题】
当发生了交通事故,首先要做好事故现场的秩序维护、遇难人员营救、必要的公众隔离、保证交通畅通等,并拨打 电话。___
A. 122
B. 119
C. 110
D. 114
E.
F.
【单选题】
关于路由器Quidway AR2-31说法正确的是___
A. system灯常亮表明系统正常运行
B. B. ready模块正常指示灯,灯灭表示对应的槽位没有安装模块或模块工作不正常
C. C. active灯亮表示相应的槽位正在进行数据传输
D. D. LAN黄色表示接口正常
E.
F.
【单选题】
当负载发生短路时,UPS应能立即自动关闭(),同时发出声光告警___
A. 输入
B. 电压
C. 输出
D. 电流
E.
F.
【单选题】
当激光器的输入电流与阈值电流满足( )的关系,才能发出激光。___
A. 小于
B. 大于
C. 等于
D. 无关
E.
F.
【单选题】
当接收端检测到上游段缺陷时,回送 ()___
A. 全“1”码
B. 全“0”码
C. MS-RDI
D. MS-RFI
E.
F.
【单选题】
IS-IS 的IS 是( )的缩写.___
A. Internet System
B. Inter-domain System
C. Integrated System
D. Intermediate System
E.
F.
【单选题】
当近端4E1协议转换器2M线接好,远端设备未接,如线路指示灯长亮,表示___
A. 线路连通
B. 近端2M线路故障
C. 线路中有环
D. 远端2M线路故障
E.
F.
【单选题】
当路由器接收的IP报文的TTL值等于1时,采取的策略是___
A. 丢掉该分组
B. 将该分组分片
C. 转发该分组
D. 以上答案均不对
E.
F.
【单选题】
当前MDU线路模板的配置,gemport映射vlan规格最多不超过( )个___
A. 32
B. 64
C. 128
D. 8
E.
F.
【单选题】
当前MXU与IMS对接时,ptime值需要设置为多少 。___
A. 0
B. 30
C. 10
D. 20
E.
F.
【单选题】
当前OLT的每块GPBD业务板有几个PON口( )___
A. 2
B. 3
C. 4
D. 8
E.
F.
【单选题】
当前常见的集客专线主要的组网形式为?___
A. SDH(协转+光收)
B. PON
C. PTN
D. 裸纤
E.
F.
【单选题】
关于瑞斯康达RC953-FE4E1,下面说法错误的是()。___
A. LNK常亮绿灯表明连接正常
B. A、B、C、D、四路E1链路状态指示灯亮红色表明E1接口出现输入信号丢失
C. A、B、C、D、四路E1链路状态指示灯亮绿色表明连接正常
D. A、B、C、D、四路E1链路状态指示灯亮黄色表明连接正常
E.
F.
【单选题】
当前最流行的网络管理协议是( )___
A. TCP/IP
B. SNMP
C. SMTP
D. UDP
E.
F.
【单选题】
当身上衣服着火时,可立即 ( )。___
A. 就地打滚,压灭身上火苗
B. B.奔跑离开火场,灭掉身上火苗
C. C.用手或物品扑打身上火苗
D. D.脱下衣服
E.
F.
【单选题】
当受理投诉服务超出处理权限时应该怎么处理___
A. 及时上报
B. 及时上报并告知服务对象已经上报另行处理
C. 让服务对象另行投诉
D. 告知服务对象无法处理
E.
F.
【单选题】
当数据在网络层时,我们称之为以下哪一项( )?___
A. 段
B. 包
C. 位
D. 帧
E.
F.
【单选题】
IS-IS 路由协议的接口开销采用Narrow 方式时,接口开销的取值范围是( )___
A. 0~63
B. 0~64
C. 0~1023
D. 0~1024
E.
F.
【单选题】
当双绞线仅用作数据传输时,只用到8根线缆中的4根,那么用到的是哪4根___
A. 1,2,3,4
B. 1,2,3,6
C. 1,2,5,6
D. 1,3,5,6
E.
F.
【单选题】
当网管出现TEMP_OVER时,处理方法不包括( )___
A. 清洗防护网
B. 检查空调制冷设备
C. 检查风扇
D. 拔插单板
E.
F.
【单选题】
当网管数据和网元数据不一致时,通常进行( )操作___
A. 数据上载
B. 数据下载
C. 不予理会
D. 进行数据库比较,具体情况具体分析
E.
F.
【单选题】
当线路传递功率一定时,线路损耗与功率因数的关系是___
A. 成正比
B. 成反比
C. 无关
D. 与用户用电要求有关
E.
F.
【单选题】
当用ftp方式传送非文本文件时必须用( )格式传送___
A. Binary mode
B. 十六进制
C. ASCII码
D. 十进制
E.
F.
【单选题】
关于生成树的描述正确的是 ___
A. RSTP 不能实现STP 的功能
B. MSTP 可以实现不同的VLAN 创建不同的生成树
C. MSTP 不需要选择根桥
D. RSTP 只有防止环路的功能,没有链路备份的功能
E.
F.
【单选题】
当用户业务不能使用,故障原因已确认是由我方原因造成,用户追问确切原因时,应如何回答( )___
A. 对不起,我们负责的这段网络是好的,是其它部门负责的网络有问题,你们可以向他们询问故障原因。
B. 故障原因我们正在分析中,稍后将通过客户经理/故障受理台向您提交详细的故障原因。
C. 对客户询问不做回答
D. 对不起,由于我方原因,使您的业务不能正常使用,我们深表歉意
E.
F.
【单选题】
当在单元格中直接输入数字并按回车键确认输入后,默认采用()对齐方式。___
A. 居中
B. 左
C. 右
D. 不动
E.
F.
【单选题】
当直接启动Excel而不打开一个已有的工作簿文件时,Excel主窗口中( )___
A. 没有任何工作簿窗口
B. 自动打开最近一次处理过的工作簿
C. 自动打开一个空工作簿
D. 询问是否打开最近一次处理的工作簿
E.
F.
【单选题】
导体中电流和电压的关系___
A. 成正比
B. 成反比
C. 平方关系
D. 没关系
E.
F.
【单选题】
到达客户所在地时,如无人应答且与客户联系不上,应做些什么?___
A. 应与物业或邻居说明方可离去
B. 应在留下到访留言后方可离去
C. 应一直等到客户为止
D. 立即离去
E.
F.
【单选题】
ISIS协议报文承载在OSI模型中的( )上的。___
A. 物理层
B. 链路层
C. 网络层
D. 传输层
E.
F.
【单选题】
登陆5506-07onu的交换芯片时,串口的波特率为( )___
A. 2400
B. 4800
C. 9600
D. 115200
E.
F.
【单选题】
登陆第13槽位第3个pon口第30个的5506-07的数据部分私网ip为( )___
A. 10.98.113.30
B. 10.98.113.158
C. 10.98.133.30
D. 10.98.111.158
E.
F.
【单选题】
低压熔断器的温升应该低于()℃。___
A. 100
B. 90
C. 70
D. 80
E.
F.
【单选题】
第二十四条 维护人员负责有线宽带用户投诉故障的现场处理,上门修障时间为早08:00-晚( )___
A. 0.75
B. 0.791666666666667
C. 0.833333333333333
D. 0.875
E.
F.
【单选题】
电缆等各种贯穿物穿越墙壁或楼板,施工尚未结束时,应如何处理( )___
A. 用防火泥封堵洞口
B. 用木材或者泡沫封堵洞口
C. 用临时防火封堵材料封堵洞口
D. 暂时不做处理
E.
F.