【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
CE
解析
暂无解析
相关试题
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
推荐试题
【单选题】
下面有关食管胃底静脉曲张破裂出血患者的饮食护理不妥的是___
A. 出血期间应禁食
B. 止血后即可渐进高热量、高蛋白质饮食
C. 避免粗糙、坚硬食物
D. 避免刺激性食物
E. 应细嚼慢咽
【单选题】
下列关于肝性脑病患者护理要点中避免诱发因素的措施中错误的是___
A. 避免便秘,保持大便通畅
B. 及时处理上消化道出血
C. 避免快速利尿和大量放腹水
D. 可用镇静安眠药和麻醉药给予抗生素
E. 出现感染症状时及时
【单选题】
患者,男性,35岁,主因"发热、尿黄3天",门诊以"病毒性肝炎(甲型)"收治入院。对于该患者应采取的隔离是___
A. 严密隔离
B. 消化道隔离
C. 体液隔离
D. 虫媒隔离
E. 接触隔离
【单选题】
患者男性,慢性左心衰竭,经休息、限盐、利尿、扩血管和使用洋地黄制剂后出现食欲下降、视物模糊、神情淡漠等表现,最可能的原因是___
A. 慢性脑部缺氧
B. 消化不良
C. 心衰加重
D. 电解质紊乱
E. 洋地黄中毒
【单选题】
对狂犬病的治疗和护理,下列措施正确的是___
A. 呼吸道隔离
B. 患者住单人房间,避免水、声、光、风的刺激
C. 咽肌和呼吸肌痉挛不能用镇静剂控制时,应使用面罩给氧
D. 医务人员接触患者时,戴口罩帽子,可不戴手套
E. 医务人员被狂犬病患者抓破皮肤者,应肌注破伤风疫苗
【单选题】
患者,75岁。患冠心病,出现全心衰,在治疗期间,出现恶心,视力模糊,黄绿视,应及时向医生报告,并考虑原因是___
A. 心衰加重,胃肠道淤血
B. 脑血管意外
C. 扩血管药物引起的低血压
D. 利尿药物引起的电解质紊乱
E. 以防损伤食管黏膜而出血
【单选题】
肝硬化病人禁食硬食、油炸、粗纤维食物是因为___
A. 减少肠道氨的吸收
B. 严格限制钠的摄入
C. 抑制假性神经递质
D. 减轻肝脏解毒功能
E. 以防损伤食管黏膜而出血
【单选题】
血气标本的采集方法,正确的是___
A. 大多取肘静脉血
B. 一般取0.5m1血
C. 选用1ml干燥注射器
D. 注射器需用肝素湿润
E. 将采集的血液标本注入试管中立即送检
【单选题】
下列消毒种类的描述哪项是错误的___
A. 消毒的种类有疫源地消毒
B. 消毒的种类有预防性消毒
C. 疫源地消毒包括随时消毒和终末消毒
D. 终末消毒是指预防性消毒
E. 预防性消毒是指对可能受病原体污染的场所和物品的消毒
【单选题】
肺心病呼衰时,严重缺氧及二氧化碳潴留,鼻导管供氧原则是___
A. 低流量(1-2L/min)间断给氧
B. 低流量持续给氧
C. 中流量间断给氧
D. 中流量持续给氧
E. 高流量(6L/min)持续给氧
【单选题】
某男性病人,因急性脑出血入院两天,连续睡眠19小时,期间呼之能醒,可进行简单对话,过后很快又入睡,此时病人处于___
A. 浅昏迷状态
B. 昏睡状态
C. 深昏迷状态
D. 嗜睡状态
E. 清醒状态
【单选题】
连女士,62岁,糖尿病患者,因高热卧床多日,为其进行护理活动时不恰当的是___
A. 鼓励常翻身
B. 受压发红处不可按摩
C. 骨隆突处可垫橡胶圈
D. 护理动作轻柔,避免损伤皮肤
E. 保持皮肤,床褥清洁干燥
【单选题】
患者女性,25岁。经过装修工地后出现干咳、气急、胸闷、呼吸困难。经治疗后好转。对该患者的健康教育内容,错误的是___
A. 调整环境
B. 适当锻炼
C. 注意饮食
D. 饲养宠物
E. 免疫治疗
【单选题】
某慢性支气管炎并发肺气肿患者,于一阵剧咳后突感左上胸剧烈刺痛,出现明显的呼吸困难,不能平卧.听诊左肺呼吸音明显减弱,心率增快达130次/分。考虑发生了下列哪种情况___
A. 急性肺炎
B. 自发性气胸
C. 渗出性胸膜炎
D. 肺不张
E. 心肌梗死
【单选题】
在下列指导浸润性突眼病人减轻眼部症状的方法中,错误的是___
A. 0.5%氢化可的松溶液滴眼
B. 给予高枕卧位
C. 限制钠盐的摄入
D. 每日做眼球向上运动,锻炼眼肌
E. 甲基纤维素滴眼
【单选题】
女,25岁,腹泻9h,共20次,水样便,量多,无腹痛,无里急后重,无发热,伴反复腓肠肌痉挛性疼痛,体检:神志清,中度脱水,血压11/8kPa,腹软无压痛。诊断为霍乱,首要处理的是___
A. 毛花苷丙
B. 脱水剂应用
C. 镇静止挛药
D. 呼吸兴奋剂
E. 补充液体和电解质
【单选题】
女性,78岁,3小时前突发心悸、喘憋、不能平卧,既往高血压病史30余年,医生确诊为高血压心脏病,急性左心衰,给予病人强心、利尿、扩血管等药物治疗,关于药物护理不正确的是___
A. 严格记录出入量
B. 注意电解质是否紊乱
C. 硝普钠应每4小时重新配制一次
D. 加快输液速度以防止扩血管后发生低血压
E. 观察患者有无恶心、呕吐、心悸、头痛等反应
【单选题】
慢性肺源性心脏病患者发生呼吸衰竭,给予低浓度氧疗的依据是___
A. 便于应用呼吸兴奋剂
B. 慢性呼吸衰竭时,呼吸中枢对CO的刺激仍很敏感
C. 缺氧是维持病人的呼吸的重要刺激因子
D. 氧浓度大于30%易引起氧中毒
E. 高浓度氧疗容易使病人呼吸兴奋
【单选题】
某女性病人,因急性肾功能衰竭入院,测血压为130/80mmHg,T37℃,脉搏80次/分,呼吸16次/分,意识丧失,压迫眼眶有躲避反应,没有言语应答,无意识的自主动作,瞳孔对光反射、吞咽反射、角膜反射存在,此时病人处于___
A. 深昏迷状态
B. 浅昏迷状态
C. 嗜睡状态
D. 清醒状态
E. 昏睡状态
【单选题】
原发性肝癌疼痛护理哪项不正确___
A. 护理人员要给予心理支持
B. 创造舒适、安静的环境
C. 听录音机转移病人的注意力
D. 一般不限制止痛药的应用
E. 限制止痛药的应用
【单选题】
关于系统性红斑狼疮患者的护理,错误的是___
A. 嘱患者激素类药物不可擅自减药、停药
B. 脱发患者可戴假发适当遮掩
C. 多吃芹菜、无花果等利于疾病恢复
D. 禁忌日光浴
E. 急性期应卧床休息
【单选题】
男性,20岁,持续发热8d,伴食欲差,腹胀,便秘,体检:表情淡漠,心率76次/分,腹软,肝肋下1cm,脾肋下3cm,白细胞正常,嗜酸性细胞为零,血培养有伤寒杆菌生长.传染病的首要处理是___
A. 脱水剂应用
B. 纠正水代谢紊乱
C. 镇静止痉药
D. 呼吸兴奋剂
E. 抗病原治疗
【单选题】
下列对艾滋病患者的护理措施正确的是___
A. 给予高热量、高维生素、低蛋白饮食
B. 不能进食者补充液体、电解质等
C. 长期卧床患者应重点预防肌肉萎缩
D. 对服用AZT治疗的患者,应定期检查肝功能
E. 对无症状的病毒携带者,应嘱其每2个月做一次检查