【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
推荐试题
【填空题】
10.党的十九大提出了分两步走在本世纪中叶建成富强民主文明和谐美丽的社会主义现代化强国的战略安排。这一战略安排把原来我们发展战略中基本实现社会主义现代化的时间提前了15年,这是因为___
【填空题】
1.全面建成小康社会新的目标要求经济保持中高速增长,到2020年比2010年翻一番的是国内生产总值和工业增加值。___
【填空题】
2.中国梦是人民的梦,也是世界的梦,与世界的梦息息相通。___
【填空题】
3.依法治国得到全面落实,科学立法、严格执法、公正司法、全民守法的局面已经形成。___
【填空题】
4.中国梦和社会主义核心价值观深入人心,爱国主义、集体主义、社会主义思想广泛弘扬,全体人民的文化自信、文化自觉和文化凝聚力不断提高。 ___
【填空题】
5.作为负责任的大国,中国决不会称霸,决不搞扩张,中国越发展,对世界和平与发展就越有利。___
【填空题】
6.经过全党全国各族人民共同努力,我们先后提前实现了第一步、第二步战略目标,党的十七大正式宣布人民生活总体达到小康水平。 ___
【填空题】
7.改革开放40年来,我国经济持续较快发展,工业化现代化快速推进,各项事业全面进步,国家面貌发生了前所未有的巨大变化。___
【填空题】
8.国家富强,是指我国综合国力进一步增强,中国特色社会主义事业进一步发展和完善。___
【填空题】
9.民族振兴,是通过自身的不断发展与强大,继承并创造中华民族的优秀文化以及先进的文明成果,进而使中华民族再次处于世界领先地位,再次以高昂的姿态屹立于世界民族之林。___
【填空题】
10.人民幸福,就是人民权利保障更加充分、人人得享共同发展,生活在伟大祖国和伟大时代的中国人民,共同享有人生出彩的机会,共同享有梦想成真的机会,共同享有同祖国和时代一起成长与进步的机会。 ___
【填空题】
1. 面对全面建成小康社会决胜阶段复杂的国内外形势,面对经济社会发展的新趋势、新机遇和新矛盾、新挑战,党的十八届五中全会坚持以人民为中心的发展思想,鲜明提出了___的新发展理念。
【填空题】
2.贯彻新发展理念、建设现代化经济体系,要坚持质量第一、效益优先,以___为主线,推动经济发展质量变革、效率变革、动力变革,提高全要素生产率。
【填空题】
3. 中国社会主义民主政治的特有形式和独特优势是___
【填空题】
4. 从中华民族整体利益把握两岸关系大局,最根本的、最核心的是___。
【填空题】
5. 构建中国特色哲学社会科学,是掌握意识形态工作领导权的内在要求,首要的是___。
【填空题】
7. 民生是人民幸福之基、社会和谐之本。带领人民群众创造幸福生活,要顺应人民群众对美好生活的向往,坚持___的发展思想,以___为重点,发展各项社会事业。
【填空题】
8.自2016年起,每年4月15日,是我国的___。 
【填空题】
9. “万物各得其和以生,各得其养以成。”生态文明的核心应该是___。
【填空题】
10. 建设生态文明是一场涉及生产方式、生活方式、思维方式和价值观念的革命性变革。要实现这样的根本性变革,必须___
【填空题】
11.面对全面建成小康社会决胜阶段复杂的国内外形势,面对当前经济社会发展新趋势、新机遇和新矛盾、新挑战,中共十八届五中全会坚持以人民为中心的发展思想,鲜明地提出了创新、协调、绿色、开放、共享的发展理念。其中,开放是___
【填空题】
12.伴随着中国特色社会主义进入新时代,我国经济已由高速增长阶段转向高质量发展阶段,正处在转变发展方式、优化经济结构、转换增长动力的攻关期。我国发展的战略目标和跨越关口的迫切要求是___
【填空题】
13.中国特色社会主义进入新时代,我国正处在转变发展方式、优化经济结构、转换增长动力的攻关期。经济已经由___
【填空题】
14.中华人民共和国成立以来,中国共产党领导的多党合作和政治协商制度的重要性不断增强。实践证明,这一制度能够在中国特色社会主义共同目标下把中国共产党领导和多党派合作有机结合起来,实现广泛参与与集中领导、社会进步与国家稳定、充满活力与富有效率的统一。在这一制度中,多党合作的首要前提和根本保证是___
【填空题】
15.解决台湾问题、实现祖国完全统一,是全体中华儿女共同愿望,是中华民族根本利益所在。中共十八大以来,在以习近平同志为核心的党中央的坚强领导下,在两岸同胞共同努力下,两岸关系取得了重要成果。两岸关系和平发展的政治基础是___
【填空题】
16.随着经济的快速发展和物质生活水平的提高,人们的精神文化需求日益增长,迫切要求通过深化文化体制改革,激发文化发展的活力,为人民群众提供更多更好的文化产品和文化服务,保障人民的基本文化权益。保障人民基本文化权益的主要途径是___
【填空题】
17.深化文化体制改革,要坚持公益性文化事业和经营性文化产业协调发展。发展经营性文化产业的根本任务是___
【填空题】
18.面对资源约束趋紧、环境污染严重、生态系统退化的严峻形势,必须树立尊重自然、顺应自然、保护自然的生态文明理念。其中,人与自然相处时应秉持的首要态度是___
【填空题】
19.习近平指出,生态文明建设是关系中华民族永续发展的根本大计。当前,生态文明建设正处于压力叠加、负重前行的关键期。生态文明的核心是___
【填空题】
20.我国社会主义民主政治的特有形式和独特优势,也是党的群众路线在政治领域的重要体现的是___
【填空题】
21.民族区域自治是我们党解决民族问题的基本政策,是国家的一项基本政治制度。民族区域自治是在统一而不可分离的国家领导下,在各少数民族聚居的地方设立自治机关,行使自治权,实行区域自治。民族区域自治的核心是___
【填空题】
22.党的十九大报告指出,只有社会主义才能救中国,只有改革开放才能发展中国、发展社会主义、发展马克思主义。必须坚持和完善中国特色社会主义制度,坚决破除一切不合时宜的思想观念和体制机制弊端。全面深化改革总目标是___
【填空题】
25.2017年2月5日,中共中央国务院印发了《中共中央、国务院关于深入推进农业供给侧结构性改革加快培育农业农村发展新动能的若干意见》。民主党派发挥智力优势,把深入推进农业供给侧结构性改革作为新的历史阶段农业农村工作主线。这一来自民主党派的建议获得了中共中央的充分肯定。这充分表明我国的政党制度___
【填空题】
26.各地政府在干部选拔任用中,积极探索运用“网上述职”“暗访式考察”等考核方法,充分吸收民意,这使得公民在政治生活中有了更多的合法渠道参与___
【填空题】
27.建设社会主义文化强国,要大力发展文化事业和文化产业。没有文化事业和文化产业的发展,文化资源就不可能转变为现实的文化力量。发展文化事业,要坚持___
【填空题】
28.建设社会主义文化强国的关键是___
【填空题】
29.我国加强保护环境和生态文明建设的根本原因来自于___
【填空题】
30.党的十八大首次提出社会主义核心价值观,其中立足社会层面的要求是___
【填空题】
31.改革开放和社会主义现代化建设的根本目的是___
【填空题】
32.十三届全国人大一次会议高票通过了宪法修正案。这体现了作为发展社会主义民主政治的首要战略任务是___