【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AC
解析
暂无解析
相关试题
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
推荐试题
【判断题】
某部门颁布的制度中规定“信息报送应遵循准确、及时、全面、有效的原则,各部门、单位应及时按照相关规定报送本部门、单位的工作完成情况”,该规定满足风险体系规范化要求。
A. 对
B. 错
【判断题】
为防止消防器材的丢失,对灭火器箱可以加锁。
A. 对
B. 错
【判断题】
定期对员工进行体检只是企业的一种福利。
A. 对
B. 错
【判断题】
人机工效问题不可能导致事故的发生,因此在事故分析时不应将其作为原因之一。
A. 对
B. 错
【判断题】
如果未遂/违章、职业病和职业危害、污染、相关方投诉等并未构成事故,就不必进行报告和调查处理。
A. 对
B. 错
【判断题】
在风险评估中,对于可接受的风险是企业可以容忍的风险。
A. 对
B. 错
【判断题】
当作业方式、新技术、新工艺应用引起的变化时,企业应识别可能带来的风险。
A. 对
B. 错
【判断题】
当组织机构和资源配置发生变化时,企业应修订管理或控制流程,流程应体现闭环管理。
A. 对
B. 错
【判断题】
安全科技成果在应用前必须进行风险评估与分析,并制定其风险的控制措施。
A. 对
B. 错
【判断题】
对于客户投诉、规程、规章和标准的问题不宜纳入纠正和预防系统。
A. 对
B. 错
【判断题】
风险评估结果应文件化,但应注意保密,防止员工产生恐慌的情绪。
A. 对
B. 错
【判断题】
企业的风险概述可应用于指导员工培训。
A. 对
B. 错
【判断题】
在安全工器具与个人防护用品发放使用前,应首先做好需求的识别。
A. 对
B. 错
【判断题】
对持有驾驶证的员工均可以发放准驾证。
A. 对
B. 错
【判断题】
企业已开展了作业风险评估,故员工在进行电气操作时可直接操作、不必进行操作前的风险分析。
A. 对
B. 错
【判断题】
企业应基于风险评估的结果,认定应急事件,制定应急预案。
A. 对
B. 错
【判断题】
危险化学品使用人员、管理人员及废料处理承包商均应掌握并熟悉在库的危险化学品的MSDS资料。
A. 对
B. 错
【判断题】
企业通过识别及评估安全生产过程中的风险,制定风险控制措施,实现风险的超前控制,把风险降低到可接受的程度。
A. 对
B. 错
【判断题】
某一个特定的危害只会导致一种风险。
A. 对
B. 错
【判断题】
进行任务观察的目的之一是开展现场督察。
A. 对
B. 错
【判断题】
要降低承包商带来的安全生产风险,从系统化思维考虑,关键是要选用综合素质较高的承包商,并且对承包商要有严厉的处罚措施,不需要承包商也开展安全生产风险管理体系建设。
A. 对
B. 错
【判断题】
安全科技项目应以降低企业风险为目的。
A. 对
B. 错
【判断题】
企业没有义务为进入变电站的参观人员提供个人防护用品(PPE)。
A. 对
B. 错
【判断题】
员工选聘与培训是控制因人员因素造成的风险。通过员工选聘,确保人员能满足安全生产基本需要。通过培训,确保人员的知识、能力与岗位相匹配,为企业的安全生产管理提供人员能力保障。
A. 对
B. 错
【判断题】
保障生产用具本身的安全状态和控制使用中的风险,是控制作业风险的重要环节。
A. 对
B. 错
【判断题】
“一事一标准”是指在一个单位层面,每一管理事务只有一个管理的制度标准。
A. 对
B. 错
【判断题】
某部门以正式文件下发通知,由于上级的要求变更,要求涉及的部门、单位从下月初开始使用新的表格报送信息,原制度中的表格不再使用(通知内容无其他事项要求),说明该部门对该项业务进行了规范管理。
A. 对
B. 错
【单选题】
行政处罚实施机关行使行政处罚裁量权时,应当严格按照公布的行政处罚裁量基准执行,并遵循____,保障行政管理相对人的合法权益。___
A. 法定程序
B. 法定事由
C. 法律规定
D. 法定情节
【单选题】
医师注册后受刑事处罚的,其所在的医疗、预防、保健机构应当在____内报告准予注册的卫生行政部门,卫生行政部门应当注销注册,收回医师执业证书。___
A. 十五日
B. 三十日
C. 六十日
D. 九十日
【单选题】
医疗机构的医务人员违反《献血法》规定,将____的血液用于患者的,由县级以上地方人民政府卫生行政部门责令改正;给患者健康造成损害的,应当依法赔偿,对直接负责的主管人员和其他直接责任人员,依法给予行政处分;构成犯罪的,依法追究刑事责任。___
A. 不符合国家卫生行政部门规定标准
B. 不符合国家药品监督管理部门规定标准
C. 不符合国家规定标准
D. 以上都不是
【单选题】
学校应当合理安排学生的学习时间。学生每日学习时间(包括自习),小学、中学、大学分别不超过____小时。___
A. 4,6,8
B. 6,8,10
C. 4,8,10
D. 6,8,10
【单选题】
根据《医疗机构管理条例》,应受处罚的行为不包括______ 。___
A. 未取得《医疗机构执业许可证》擅自执业
B. 逾期不校验《医疗机构执业许可证》又不停止诊疗活动
C. 复印、备份《医疗机构执业许可证》
D. 诊疗活动超出登记范围
【单选题】
因抢救急危患者,未能及时书写病历的,有关医务人员应当在抢救结束后____内补记,并加以注明。___
A. 6小时
B. 12小时
C. 24小时
D. 36小时
【单选题】
国务院卫生行政部门根据传染病暴发、流行情况和危害程度,可以决定增加、减少或者调整的传染病病种是____。___
A. 甲类和乙类传染病
B. 甲类和丙类传染病
C. 乙类和丙类传染病
D. 以上均是
【单选题】
申请个体行医的执业医师,须经注册后在医疗预防保健机构中执业满____年,方可按国家有关规定办理审批手续。___
A. 5
B. 3
C. 2
D. 1
【单选题】
可以运输医疗废物的途径是____。___
A. 铁路
B. 水路
C. 航空
D. 邮寄
【单选题】
血站对献血者每次采集血液量一般为____。___
A. 200毫升
B. 250毫升
C. 400毫升
D. 600毫升
【单选题】
某地区因饮水水质问题出现地方性甲状腺肿,造成这一病症的原因是饮水中____。___
A. 氯含量过高
B. 氯含量过低
C. 碘含量过高
D. 碘含量过低
【单选题】
山东省疾病预防控制中心拟将一批初检为传染性非典型肺炎的样本送国家疾病预防控制中心进行鉴定确认,需经____批准后方可运输。___
A. 山东省人民政府
B. 北京市人民政府
C. 北京市人民政府卫生主管部门
D. 国务院卫生主管部门
【单选题】
无《医疗机构执业许可证》擅自开展职业健康检查的,由县级以上地方____依据《医疗机构管理条例》第四十四条的规定进行处理。___
A. 安全生产监督管理部门
B. 卫生计生行政部门
C. 劳动和社会保障部门
D. 公安部门