【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
推荐试题
【填空题】
根据《公路工程建设项目概算预算编制办法》<JTG3830-2018>规定,建设期贷款利息系指工程项目使用的贷款部分在建设期内应计取的贷款利息,包括各种___、建设债券和外汇贷款等利息。
【填空题】
依据《关于安全生产费提取和使用管理办法》铁建设[2012]245号文,2012年2月14日<含>之后完成的建筑安装工程,按其建筑安装工程费的0.5% 补列安全生产费,由此增加的费用在___中解决,由建设单位按规定履行报批手续。
【填空题】
根据《铁路基本建设项目投资管理办法》铁总计统[2017]179号文的规定,实施中重大标准、工期、规模变化等引起投资增加超出批复可行性研究投资___时,应按原可行性研究审批程序办理调整审批。
【填空题】
依据《铁路征地拆迁及费用管理的指导意见》铁总计统[2017]177号文的规定,新开工铁路建设项目按征地拆迁费用___组织实施,由建设单位与地方政府签订实施协议,协议内容原则上不予调整,如因国家重大政策变化确需调整的,由总公司与省级地方政府协商确定。
【填空题】
《执行新颁布铁路工程造价标准的指导意见》铁总建设[2017]171号文 规定,自2017年7月1日起,铁路项目初步设计未批复项目的设计概算按___执行,初步设计已批复、施工图设计尚未审核或部分未审核的项目,其施工图预算按初步设计概算编制原则。
【填空题】
《关于加强铁路建设项目保证金管理的通知》的规定,对于质量保证金,建设单位在拨付工程进度款时,按批准的验工计价额的5%预留质量保证金,工程___一年后,建设单位应于3个月内不计息按规定返还。
【填空题】
根据《铁路基本建设项目投资管理办法》铁总计统[2017]179号文的规定,总公司批复的变更设计增加费用应控制在___费用额度内,特殊情况应由原审查单位组织建设、勘察设计单位对项目投资规模进行梳理,重新确定投资控制规模,经总公司同意后在规模内进行变更设计批复和组织建设。
【填空题】
《关于铁路建设项目实施阶段材料价差调整的指导意见》铁建设[2009]46号文规定,铁路项目施工企业自购料价差一般按照经规院下发的《铁路工程建设主要材料价格信息》当期信息价与___之差计算材料价差。
【填空题】
《关于铁路建设项目实施阶段材料价差调整的指导意见》铁建设[2009]46号文的规定,建设单位招标采购材料价格超过概算价的,按规定程序报批,材料价差按___费用进行结算,并相应调整合同额和验工计价。
【填空题】
依据《铁路征地拆迁及费用管理的指导意见》铁总计统[2017]177号文的规定,三电迁改项目一般处理原则:按照合同约定和铁总相关规定,此类费用可以在经___的情况下,据实进行调整。
【填空题】
根据《铁路基本建设项目投资管理办法》铁总计统[2017]179号文的规定,建设单位应将施工图优化设计纳入勘察设计、施工图审核合同管理,并约定相应的考核条件。施工图设计优化核减的工程投资作为项目___由建设单位管理使用。
【填空题】
根据《铁路基本建设项目投资管理办法》铁总计统[2017]179号文的规定,铁路项目在决策审查期间,建设单位在现场踏勘的基础上组织相关业务部门、咨询单位<可邀请有关专家>对项目可行性研究报告进行初审并出具初审意见报___。
【填空题】
《关于印发铁路工程混凝土结构高强钢筋设计规定》铁总建设[2015]343号文 规定,使用通用参考图的混凝土工程,在采用HRB400钢筋的通用参考图发布前,暂按___的原则用HRB400钢筋代换图中的HRB335钢筋。
【填空题】
《关于铁路建设项目实施阶段材料价差调整的指导意见》铁建设[2009]46号文规定,铁路项目实施中,建设单位要根据材料调差批复,履行决策程序,与施工单位签订___,依据合同约定和已完工程数量等,与施工单位办理材料价差结算。
【填空题】
《关于铁路建设项目实施阶段材料价差调整的指导意见》铁建设[2009]46号文规定,铁路项目施工合同有风险包干费的,概算内材料价格变化幅度<以批准编制期概算为准>在___以内部分由施工企业承担,超出部分纳入概算并由建设单位承担。
【填空题】
《关于公布<铁路路基工程预算定额>等二十九项定额标准的通知》铁总建设[2016]359号文等现行定额中的其他材料费乘以___的系数,其他机械使用费乘以___的系数,其他消耗量按原定额执行。
【填空题】
《关于转发财政部、税务总局调整增值税税率等5个文件的通知》铁总办财[2018]58号文要求,自2018年5月1日起,铁路项目各单位必须按照___方式签订各类采购合同,增值税税率按财税[2018]32号文件执行;对已签订但尚未执行的购买合同,各单位必须按财税文件[2018]32号文规定增值税税率,对价格和合同条款进行调整。
【填空题】
《关于转发财政部、税务总局调整增值税税率等5个文件的通知》铁总办财[2018]58号文要求,自2018年5月1日起,已签订建设项目合同的建设项目,采用一般计税方法的,建设单位应于施工单位按照价税分离的原则签订补充合同,约定剩余建筑安装工程费税金与设备购置费税金按10%的税率计算,并相应调整合同额,减少投资纳入项目___管理。
【填空题】
依据《铁路建设项目验工计价办法》的通知,铁路建设工程验工计价报表应由施工承包单位编制、监理单位审核、建设单位核准,其他验工计价报表由___编制、建设单位核准,并由各单位负责人签字、加盖单位印章。