【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
推荐试题
【填空题】
10.行车工作必须坚持集中领导、___、逐级负责的原则。J227
【填空题】
11.途中乘务人员换班时,应将调度命令内容___。J231
【填空题】
12.双机或多机牵引时,本务机车的职务由___机车担当。J256
【填空题】
13.回送机车,应挂于本务机车___。J257
【填空题】
14.单机挂车在区间被迫停车后,开车前应确认___和制动主管贯通状态是否良好。J258
【填空题】
15.机车改变司机室操纵时,应按规定对列车自动制动机进行___试验。J274
【填空题】
16.调车作业摘车时,必须停妥,按规定采取好___措施,方可摘开车钩。J295
【填空题】
17.使用自动闭塞法行车时,列车进入闭塞分区的行车凭证为___信号机显示的允许运行的信号。J314
【填空题】
18.自动闭塞区段,双线双向闭塞设备的车站,反方向发出列车,列车进入区间的行车凭证是出站信号机显示的允许运行的信号,还须发给司机双线反方向行车的___。J315
【填空题】
19.自动闭塞区间通过信号机显示停车信号___时,列车必须在该信号机前___。J316
【填空题】
20.天气恶劣无法辨认出站___信号机显示时,在列车具备发车条件后,司机凭车站值班员列车无线调度通信设备的发车通知起动列车,在确认出站___信号机___后,再行加速。J338
【填空题】
21.机车乘务组以外人员登乘机车时,除铁路机车运用管理规则指定的人员外,须凭___登乘。J346
【填空题】
22.列车退行的限制速度是___km/h。J347
【填空题】
23.列车在区间被迫停车不能继续运行时,司机应立即使用列车无线调度通信设备通知两端站___及车辆乘务员___,报告___和停车位置,根据需要迅速请求救援。J366
【填空题】
24.对已请求救援的列车,不得再行移动,并按规定对列车进行___。J366
【填空题】
25.向封锁区间开行救援列车时,司机接到救援命令后,必须认真确认,命令不清、___不明确时,不准动车。J374
【填空题】
26.信号是指示___及调车作业的命令,有关行车人员必须严格执行。J408
【填空题】
27.接车进路信号机的引导信号显示一个红色灯光及一个月白色灯光——准许列车在该信号机前方不停车,以不超过___km/h速度通过接车进路,并须准备随时停车。J416
【填空题】
28.发车信号在昼间的显示方式为展开的绿色信号旗上弧线向列车方面作___。J440
【填空题】
29.引导手信号在昼间的显示方式为展开的___信号旗高举头上左右摇动,表示准许列车进入车场或车站。J440
【填空题】
30.调车手信号中昼间指挥机车向显示人反方向稍行移动的信号——拢起的红色信号旗___,再用展开的绿色信号旗上下小动;夜间——绿色灯光上下小动。J441
【填空题】
31.联系用手信号在显示道岔开通信号时,昼间为拢起的___信号旗高举头上左右摇动,表示进路道岔准备妥当。J442
【填空题】
32.联系用手信号显示股道号码时,昼间右臂向上直伸,左臂下垂,表示股道开通___道。J442
【填空题】
33.联系用手信号显示股道号码时,昼间两臂交叉于头上,表示股道开通___道。 J442
【填空题】
34.联系用手信号显示股道号码时,昼间左臂向左下方,右臂向右下方各斜伸45°角,表示股道开通___道。J442
【填空题】
35.联系用手信号显示股道号码时,昼间右臂向上直伸,左臂向左平伸,表示股道开通___道。J442
【填空题】
36.联系用手信号显示十、五、三车距离信号中的“三车”___信号时,昼间的显示方式为展开的绿色信号旗单臂平伸下压 ___次。J442
【填空题】
37.联系用手信号显示十、五、三车距离信号时,昼间用展开的绿色信号旗单臂平伸,在距离停留车五车时连续下压两次,是表示距停留车约___。J442
【填空题】
38.听觉信号,长声为3s,短声为1s,音响间隔为___。J460
【填空题】
39.机车挂车后,司机发现制动关门车辆数超过规定时,发车前应持有___。C14
【填空题】
40.机务段直接行车有关人员、机车试运转有关人员,凭___可登乘本段机车。运31
【填空题】
41.柴油机启动时油水温度不得低于___。
【填空题】
42.柴油机正常停机时油水温度在___℃之间较好。
【填空题】
43.柴油机启动后,冷却水温上升很快的原因主要是主循环系统内___。
【填空题】
44.柴油机工作时,操纵台燃油压力应为___kPa。
【填空题】
45.柴油机工作时,操纵台增压器机油压力为___kPa。
【填空题】
46.牵引电动机环火,将使电机正负电刷___,使LJ动作,并且由于火花飞溅使接地继电器同时动作。
【填空题】
47.DJ置接地位时,DJ的一端是与共阳极元件联接,DJ能否工作,完全取决于DJ线圈两端___是否足够大。
【填空题】
48.蓄电池严重亏电时,启动柴油机后,应使用___,以略高于蓄电池端电压的电压向蓄电池充电,以利于提高蓄电池的容量。
【填空题】
49.更换4RD或5RD熔片时,应在启动发电机___后进行。