【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
推荐试题
【填空题】
32.单机挂车在区间被迫停车后,开车前应确认___和制动主管贯通状态是否良好。J258
【填空题】
33.货物列车中因装载的货物规定需停止制动作用的车辆,自动制动机临时发生故障的车辆,准许关闭___。J262
【填空题】
34.机车改变司机室操纵时,应按规定对列车自动制动机进行___试验。J274
【填空题】
35.无列检作业的始发列车发车前,应按规定对列车自动制动机进行___试验。J274
【填空题】
36.调车工作要固定作业区域、线路使用、调车机车、人员、班次、交接班___、交接班地点、工具数量及其存放地点。J280
【填空题】
37.调车工作要固定___、线路使用、调车机车、人员、班次、交接班时间、交接班地点、工具数量及其存放地点。J280
【填空题】
38.无线调车灯显设备发生故障时,改用___作业。J282
【填空题】
39.司机在调车作业中应时刻注意确认信号,不间断地进行瞭望,认真执行呼唤应答制,正确及时地执行信号显示___和___的要求,没有信号___不准动车,信号___不清立即停车。J287
【填空题】
40.司机在调车作业中应时刻注意确认信号,没有信号___不准动车,信号___不清___。 J287
【填空题】
41.司机在调车作业中应组织机车乘务人员___地完成调车任务。J287
【填空题】
42.调车指挥人应根据调车作业计划制定具体作业方法,连同___,亲自向司机交递和传达。J288
【填空题】
43.调车作业时,调车人员必须正确及时地显示信号;机车乘务人员要认真确认信号,并___。J291
【填空题】
44.推送车辆时,要先___。车列前部应有人瞭望,及时显示信号。J291
【填空题】
45.调车作业摘车时,必须停妥,按规定采取好___措施,方可摘开车钩。
【填空题】
46.临时变更走行线时,应通知司机经路___,司机按___或扳道员显示的允许运行的信号行车。 J304
【填空题】
47.列车运行是以车站、线路所所划分的区间及自动闭塞区间的通过信号机所划分的___作间隔。J308
【填空题】
48.自动闭塞、自动站间闭塞、半自动闭塞故障时均使用___。J309
【填空题】
49.使用自动闭塞法行车时,列车进入闭塞分区的行车凭证为___信号机显示的允许运行的信号。J314
【填空题】
50.自动闭塞区段,发车进路信号机发生故障时发出列车,列车进入闭塞分区的行车凭证为___。J315
【填空题】
51.自动闭塞区段,双线双向闭塞设备的车站,反方向发出列车,列车进入区间的行车凭证是出站信号机显示的允许运行的信号,还须发给司机双线反方向行车的___。J315
【填空题】
52.自动闭塞区间通过信号机显示停车信号___时,列车必须在该信号机前___。J316
【填空题】
53.司机发现通过信号机故障时,应将故障信号机的___通知前方站___。J316
【填空题】
54.使用自动站间闭塞法行车时,列车凭出站信号机或线路所通过信号机显示的___的信号进入区间。J317
【填空题】
55.使用半自动闭塞法行车时,列车凭出站信号机或___通过信号机显示的允许运行的信号进入区间。J319
【填空题】
56.列车是指编成的车列并挂有机车及规定的___。J331
【填空题】
57.司机在列车运行中,遇有信号显示不明或危及行车和人身安全时,应立即采取___措施。J335
【填空题】
58.列车运行途中,遇列尾装置、___、列车运行监控装置发生故障时,司机应立即使用列车无线调度通信设备报告车站值班员或列车调度员,并根据实际情况掌握速度运行。J335
【填空题】
59.司机在列车运行中,应随时检查机车总风缸、___的压力。J335
【填空题】
60.装备机车综合无线通信设备的机车,开车前司机要选定机车综合无线通信设备通信模式和___。J335
【填空题】
61.在GSM-R区段运行时,机车综合无线通信设备、GSM-R手持终端按规定注册___,并确认正确。J335
【填空题】
62.司机在列车运行中,应彻底瞭望,确认信号,执行___制度,严格按信号显示要求行车,确保列车安全正点。J335
【填空题】
63.机车信号、列车无线调度通信设备、列车运行监控装置和列尾装置必须全程运转,严禁擅自___。J335
【填空题】
64.列车在区间使用紧急制动阀停车后再开车时,司机必须检查试验列车制动主管的___状态,确认列车完整,具备开车条件后,方可起动列车。J335
【填空题】
65.等会列车时,不准关闭空气压缩机,并应按规定显示___。J335
【填空题】
66.改按天气恶劣难以辨认信号的办法行车时,列车按___的显示运行。J338
【填空题】
67.改按天气恶劣难以辨认信号的办法行车,当接近地面信号机时,司机应确认地面信号,遇地面信号与机车信号显示不一致时,应立即采取___措施。J338
【填空题】
68.天气恶劣无法辨认出站___信号机显示时,在列车具备发车条件后,司机凭车站值班员列车无线调度通信设备的发车通知起动列车,在确认出站___信号机___后,再行加速。J338
【填空题】
69.列尾装置故障时,车辆乘务员在列车___、停车站进站前和出站后,应按规定与司机核对列车尾部风压。J340
【填空题】
70.旅客列车改为单管供风跨局运行时,由铁路总公司发布调度命令通知有关铁路局,按单管供风办理,直至___。J342
【填空题】
71.机车乘务组以外人员登乘机车时,除铁路机车运用管理规则指定的人员外,须凭___登乘。J346