【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
D
解析
暂无解析
相关试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
推荐试题
【多选题】
下列关于质物、质押权利合法性的说法,正确的有( )。___
A. 所有权、使用权不明或有争议的动产,法律规定禁止流通的动产不得作为质物
B. 凡出质人以权利凭证出质的,必须对出质人提交的权利凭证的真实性、合法性和有效性进行确认
C. 凡发现质押权利凭证有伪造、变造迹象的,应重新确认
D. 以海关监管期内的动产作质押的,需由负责监管的海关出具同意质押的证明文件
E. 非流通股可设定质押
【多选题】
下列财产中不得抵押的有( )。___
A. 土地所有权
B. 抵押人所有的房屋和其他地上定着物
C. 耕地、宅基地、自留地、自留山
D. 学校、幼儿园、医院的教育设施、医疗卫生设施
E. 抵押人依法承包并经发包方同意抵押的荒山、荒沟、荒滩等荒地
【多选题】
根据我国《担保法》对保证人资格的明确规定,以下说法中,正确的有( )。___
A. 《担保法》规定企业法人的分支机构或职能部门在任何情况下都不能做保证人
B. 《担保法》规定医院、学校等以公共利益为目的的事业单位、社会团体不得作保证人
C. 《担保法》规定企业法人的分支机构或职能部门不能做保证人,企业法人的分支机构有该法人书面授权的,可以在授权范围内提供保证
D. 《担保法》规定政府及其所属部门不得为他人提供担保
E. 金融机构具有较强代为清偿能力的,可以接受为保证人
【多选题】
根据我国《担保法》的规定,保证人( )。___
A. 必须具有民事行为能力
B. 必须具有代为履行主债务的资力
C. 不得为医院、学校等以公共利益为目的的事业单位
D. 不可以为自然人
E. 不得为企业法人的职能部门
【多选题】
对于企业管理水平的分析,主要包括( )。___
A. 管理人员的业务素质
B. 机构的设置及合理性
C. 经营管理方面的主要业绩
D. 企业的劳动力结构和层次
E. 已实施投资项目的管理情况
【多选题】
贷款质押是物的担保的一种重要形式,一般商业银行不可接受的财产质押包括( ).___
A. 依法可以转让的基金份额、股权
B. 汇票、支票、本票、债券
C. 珠宝、首饰
D. 租用的财产
E. 字画、文物
【多选题】
贷款期限的审定要点有( )。___
A. 贷款期限应与借款人资产转换周期相匹配
B. 贷款期限应符合相应授信品种有关期限的规定
C. 贷款期限一般应控制在借款人相应经营的有效期限内
D. 贷款期限应与借款人的风险状况及风险控制要求相匹配
E. 贷款期限应与其他特定还款来源的到账时间相匹配
【多选题】
在满足借款合同用款前提条件的情况下,无正当理由或借款人没有违约,( )。___
A. 银行必须按借款合同的约定按时发放贷款
B. 银行不按时发放贷款是违约行为
C. 银行不按时发放贷款,自身不会遭受任何损失
D. 银行不按时发放贷款,可能影响借款人的生产经营计划
E. 银行不按时发放贷款,可能影响贷款的正常收回
【多选题】
银行在进行贷款发放的审查时,应审查借款人提交的借款凭证是否完全符合要求,确认( )正确无误。___
A. 贷款用途
B. 提款账号
C. 提款日期
D. 提款金额
E. 预留印鉴
【多选题】
银行可以对借款人采取终止提款措施的情况包括( )。___
A. 挪用贷款
B. 未按合同规定清偿贷款本息
C. 违反国家政策法规,使用贷款进行非法经营
D. 其他影响企业偿债能力的违约情况
E. 用于临时周转的款项
【多选题】
商业银行在坚持“区别对待,择优扶植”的原则时,要做到( )。___
A. 贷款的发放和使用应当符合相关的法律法规
B. 贷款的投向应当突出重点
C. 根据企业的经营管理和经济效益选择贷款对象
D. 严格区分企业的优劣
E. 接程序办理贷款
【多选题】
挪用贷款的情况一般包括( )。___
A. 用贷款进行股本权益性投资
B. 用贷款进行有价证券、期货等投机经营
C. 未依法取得经营房地产资格的借款人使用贷款经营房地产业务
D. 套取贷款,相互借贷以获取非法收人
E. 借款企业挪用流动资金进行基本建设或用于财政性开支或用于弥补企业亏损
【多选题】
加强合同管理的实施要点有( )。___
A. 修订和完善贷款合同等协议文件
B. 建立完善有效的贷款合同管理制度
C. 加强贷款合同规范性审查管理
D. 实施履行监督、归档、检查等管理措施
E. 做好有关配套和支持工作
【多选题】
贷款人出现任何违约事件,银行有权分别或同时采取下列哪些措施?( )。___
A. 要求借款人限期纠正违约事件
B. 停止借款人提款或取消借款人尚未提用的借款额度
C. 宣布贷款合同项下的借款本息全部立即到期,根据合同约定立即从借款人在银行开立的存款账户中扣款用于偿还被银行宣布提前到期的所欠全部债务
D. 宣布借款人在与银行签订的其他贷款合同项下的借款本息立即到期,要求借款人立即偿还贷款本息及费用
E. 向人民法院提起诉讼
【多选题】
在抵押期间,银行经办人员对抵押物检查时应( )。___
A. 定期检查抵押物的存续状况、占有、使用、转让、出租等处置行为
B. 发现抵押物价值非正常减少,应及时查明原因并采取有效措施
C. 如发现抵押人的行为将造成抵押物价值减少,应要求抵押人停止担保
D. 如抵押人行为已造成抵押物价值减少,应要求抵押人恢复抵押物的价值
E. 如抵押人无法完全恢复抵押物的价值,应要求抵押人停止担保
【多选题】
同一财产向两个以上债权人抵押的,拍卖、变卖抵押财产所得的价款按照规定清偿。下列说法正确的是( )。___
A. 登记顺序不同的,按照债权比例清偿
B. 抵押权已登记的先于未登记的受偿
C. 抵押权已登记的,按照登记的先后顺序清偿
D. 登记顺序相同的,按照债权比例清偿
E. 抵押权未登记的,按照债权比例清偿
【多选题】
根据《商业银行授信工作尽职指引》,影响客户资信的重大事项包括( )。___
A. 外部政策变动
B. 客户组织结构、股权或主要领导人发生变动
C. 客户的担保超过所设定的担保警戒线
D. 客户财务收支能力发生重大变化
E. 客户涉及重大诉讼
【多选题】
以下属于可疑类贷款的特征有( )。___
A. 借款人处于停产、半停产状态
B. 固定资产贷款项目处于停缓状态
C. 银行已诉诸法律来回收贷款
D. 贷款经过了重组仍然逾期,或仍然不能正常归还本息,还款状况没有得到明显改善
E. 借款人已彻底停止经营活动
【多选题】
以下属于次级类贷款的特征有( )。___
A. 借款人不能偿还对其他债权人的债务
B. 借款人采取隐瞒事实等不正当手段套取贷款
C. 借款人内部管理问题未解决,妨碍债务的及时足额清偿
D. 借款人支付出现困难,并且难以按市场条件获得新的资金
E. 固定资产贷款项目停止时间很长,复工无望
【多选题】
下列关于基本信贷分析的说法,正确的有( )。___
A. 需分析目前的还款来源,进而分析可用于偿还贷款的还款来源风险
B. 不需关注贷款的目的
C. 要对贷款使用过程中的周期性分析
D. 贷款期限的确定要符合资本循环的转换
E. 还款记录对贷款分类的确定有特殊的作用
【多选题】
下列关于还款能力分析的说法中正确的是( )。___
A. 评估借款人偿还能力的一个重要的方式就是对借款人进行财务分析,借款人的偿债能力与其盈利能力、营运能力、资本结构和现金净流量等密切相关
B. 贷款风险分类最核心的内容就是款项是否充足
C. 现金流量是偿还贷款的主要还款来源,还款能力的主要标志就是借款人的现金流量是否充足
D. 通过财务报表和数据的分析与预测,可以考察借款人过去和现在的收入水平、资产状况及其构成、所有者权益状况及其构成、偿债能力等
E. 分析借款人现金流量是否充足,其主要目的是分析借款人经营活动产生的现金流量是否足以偿还贷款本息
【多选题】
下列关于贷款损失准备金计提原则的说法中,正确的是( )。___
A. 审慎会计原则的核心内容是对利润的估计和记载要谨慎或保守,对损失的估价和记载要充分,同时要保持充足的准备金以弥补损失
B. 审慎会计原则是指对具有估计性的会计事项,应当谨慎从事,应当合理预计可能发生的损失和费用,不预计或少预计可能带来的利润
C. 按照审慎会计原则,对估计损失的记载应选择就高不就低,对利润的记载和反映要选择就低而不就高
D. 贷款损失准备金的计提应当符合审慎会计原则的要求
E. 充足性原则是指商业银行应当随时保持足够弥补贷款内在损失的准备金
【多选题】
通过贷款分类应达到以下( )目标。___
A. 揭示贷款的实际价值和风险程度,真实、全面、动态地反映贷款质量
B. 及时发现信贷管理过程中存在的问题,加强贷款管理
C. 为判断贷款损失准备金是否充足提供依据
D. 变化调整分类结果
E. 适度调整分类等级
【多选题】
商业银行对贷款进行分类,以下哪些因素在主要考虑的范围内?( )。___
A. 借款人的偿还能力
B. 借款人的还款记录
C. 借款人的还款意愿
D. 贷款项目的盈利能力
E. 贷款的担保
【多选题】
下列哪些贷款至少归为关注类?( )。___
A. 借新还旧,或者需通过其他融资方式偿还
B. 改变贷款用途
C. 本金或利息逾期
D. 同一借款人对本行或其他银行的部分债务已经不良
E. 违反国家有关法律和法规发放的贷款
【多选题】
符合公司类贷款展期条件的有()。___
A. 公司类客户营业执照组织机构代码证和贷款卡按规定进行了年检。个人客户身体健康职业稳定家庭状况良好
B. 生产经营正常具有偿付贷款本息的能力。
C. 还贷意愿好,积极配合贷后检查,无逃废债务或恶意欠息等不良信用记录。
D. 贷款风险分类应为次级及以上的。
E. 除信用贷款外,能提供符合联社要求的贷款担保。
【多选题】
对公客户基本情况的日常检查包括()。___
A. 检查营业执照是否经工商行政管理部门或主管部门年检合格
B. 客户是否正常纳税
C. 客户的名称公章财务专用章法人代表是否变更或准备变更
D. 客户经营组织形式是否变更或准备变更