【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
CE
解析
暂无解析
相关试题
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
推荐试题
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,按卧铺铺位核定: 卧铺客车的每个铺位核定 1 人,驾驶人座椅核定 1 人,乘客座椅(包括车组人员座椅)不核定乘坐人数
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,机动车标注的提示性文字应有中文
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,所有货车(多用途货车除外)和专项作业车(消防车除外)均应在驾驶室(区)两侧喷涂总质量(半挂牵引车为最大允许牵引质量)
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,冷藏车还应在外部两侧易见部位上喷涂或粘贴明显的“冷藏车” 字样和冷藏车类别的英文字母
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,总质量大于等于4500kg 的货车(半挂牵引车除外)和货车底盘改装的专项作业车(消防车除外).总质量大于 3500kg 的挂车,以及车长大于等于 6m 的客车均应在车厢后部喷涂或粘贴/放置放大的号牌号码,总质量大于等于 12000kg 的自卸车还应在车厢左右两侧喷涂放大的号牌号码
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,警车.消防车.救护车和工程救险车以外的机动车,不应喷涂和安装与警车.消防车.救护车和工程救险车相同或相类似的标志图案和灯具
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车高大于等于3.7m 的未设置乘客站立区的客车应装备电子稳定性控制系统,以保证对车辆的防侧翻控制
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,发动机应能起动, 怠速稳定,机油压力和温度正常。发动机功率应大于等于标牌(或产品使用说明书)标明的发动机功率的 70%
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,机动车在平坦.硬实.干燥和清洁的道路上行驶不应跑偏,其方向盘(或方向把)不应有摆振等异常现象
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,转向节及臂,转向横.直拉杆及球销应连接可靠,且不应有裂纹和损伤,并且转向球销不应松旷
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,对机动车进行改装或修理时横.直拉杆可以拼焊
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,驻车制动应作用在机动车(三轮汽车.拖拉机运输机组及总质量不大于 750kg 的挂车除外) 的所有车轮上
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,汽车(三轮汽车除外).摩托车(边三轮摩托车除外).挂车(总质量不大于 750kg 的挂车除外)的所有车轮应装备制动器
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,驻车制动操纵装置的安装位置应适当,操纵装置应有足够的储备行程(开关类操作装置除外),一般应在操纵装置全行程的三分之二以内产生规定的制动效能;驻车制动机构装有自动调节装置时允许在全行程的四分之三以内达到规定的制动效能
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长大于 6m 的客车(对专用校车为车长大于 8m).总质量大于等于 12000kg 的货车和专项作业车.总质量大于 3500kg 的危险货物运输货车,应装备缓速器或其他辅助制动装置
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,采用气压制动的机动车,当制动系统的气压低于起步气压时,报警装置应能间断向驾驶人发出容易听到或看到的报警信号
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,安装具有防抱制动装置的汽车,当防抱制动装置失效时,报警装置应能连续向驾驶人发出容易听到或看到的报警信号
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,机动车的灯具应安装牢靠.完好有效,不应由于机动车振动而松脱.损坏.失去作用或改变光照方向;所有灯光的开关应安装牢固.开关自如,不应由于机动车振动而自行开关。开关的位置应便于驾驶人操纵
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,用户可以对外部照明和信号装置进行改装,也不应加装强制性标准以外的外部照明和信号装置, 如货车和挂车向前行驶时向后方照射的灯具
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,宽度大于 2100mm 的机动车均应安装后反射器。
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,牵引杆挂车应在挂车前部的左右各装一只前红后白的牵引杆挂车标志灯,其高度应比牵引杆挂车的前栏板高出 300mm~400mm,距车厢外侧应小于 150mm
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,对称设置.功能相同的灯具的光色和亮度不应有明显差异
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,汽车(三轮汽车除外)和轮式拖拉机运输机组均应具有危险警告信号装置,其操纵装置不应受灯光总开关的控制
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,机动车装备的前照灯应有远.近光变换功能;当远光变为近光时,所有远光应能同时熄灭
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,同一辆机动车上的前照灯不应左.右的远.近光灯同时开亮
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,同一轴上的轮胎规格和花纹可以不同,轮胎规格应符合整车制造厂的规定
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,乘用车用轮胎应有胎面磨耗标志
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,乘用车备胎规格与该车其他轮胎不同时,应在备胎附近明显位置(或其他适当位置) 装置能永久保持的标识,以提醒驾驶人正确使用备胎
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,传动轴在运转时不应发生振抖和异响,中间轴承和万向节不应有裂纹和/或松旷现象
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,轮胎的胎面和胎壁上不应有长度超过 20mm 或深度足以暴露出轮胎帘布层的破裂和割伤
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,公路客车.旅游客车和危险货物运输货车及车长大于 12m 的其他客车.车长大于等于 6m 的旅居车应具有限速功能,否则应配备限速装置
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车身外部和内部乘员可能触及的任何部件.构件都不应有任何可能使人致伤的尖锐凸起物(如尖角.锐边等)
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长大于 12m 的公路客车和旅游客车及所有卧铺客车,车身应为全承载整体式框架结构
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长大于 7.5m 的客车和所有校车不应设置车外顶行李架。其他客车需设置车外顶行李架时, 行李架高度应小于等于 300mm.长度不应超过车长的二分之一
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车门和车窗应启闭轻便,不应有自行开启现象,门锁应牢固可靠。门窗应密封良好,无漏水现象
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,客车除驾驶人门和应急门外,不应在车身右侧开设车门
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,装有电动窗(包括电动天窗)的乘用车,其控制装置应确保车窗玻璃在运动过程中能在任意位置可靠停住或遇障碍可自动下降(缩回)
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长小于 6m 的乘用车(救护车.囚车除外)不应设置侧向座椅和后向座椅,但设计和制造上具有行动不便乘客(如轮椅乘坐者)乘坐设施的乘用车设置的后向座椅除外
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,机动车应设置能满足号牌安装要求的号牌板(架)。前号牌板(架)(摩托车除外)应设于前面的中部或右侧(按机动车前进方向),后号牌板(架)应设于后面的中部或右侧
A. 对
B. 错
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,乘用车应装有护轮板,总质量大于 7500kg 的货车.货车底盘改装的专项作业车及总质量大于 3500kg 的挂车应装有防飞溅系统,其他机动车的所有车轮均应有挡泥板
A. 对
B. 错