【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
CD
解析
暂无解析
相关试题
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
推荐试题
【单选题】
下列资产负债表项目,需要根据相关总账所属明细账户的期末余额分析填列的是___。
A. 应收账款|
B. 应收票据|
C. 应付票据|
D. 应付职工薪酬|
【单选题】
在资产负债表中,应按几个总分类账户的余额计算填列的有___。
A. 货币资金|
B. 应付职工薪酬
C. 应交税费|
D. 应付股利|
【单选题】
资产负债表中,排列资产项目顺序的依据是___。
A. 项目的重要性|
B. 项目的流动性|
C. 项目的时间性|
D. 项目的货币性|
【单选题】
现金流量表中,现金的正确分类方法是___。
A. 经营活动、投资活动和筹资活动|
B. 现金流入、现金流出和非现金活动|
C. 直接现金流量及间接现金流量|
D. 营业活动现金流量和非营业活动现金流量
【单选题】
下列不符合现金流量表中“现金”概念的是___。
A. 金库中存放的现金|
B. 存在银行可以随时动用的银行存款|
C. 购入的三个月内到期的债券|
D. 存在银行的超过1年的理财产品
【单选题】
在填列资产负债表时,下列通过分析才能填列的项目是___。
A. 长期借款|
B. 长期股权投资|
C. 短期借款|
D. 在建工程
【单选题】
下列属于经营活动的是___。
A. 销售商品
B. 从银行借款|
C. 购买固定资产|
D. 分配股利
【单选题】
所有者权益变动表是___。
A. 主要报表且是年度报表|
B. 主要报表且是中期报表|
C. 利润表的附表|
D. 资产负债表的附表|
【单选题】
下列不属于企业主要报表的是___。
A. 资产负债表|
B. 利润表|
C. 现金流量表|
D. 利润分配表|
【单选题】
下列资料中,不属于会计档案的是___。
A. 原始凭证|
B. 汇总凭证|
C. 生产计划|
D. 记账凭证|
【单选题】
产品销售过程的广告费应计入___
A. 销售费用|
B. 生产成本|
C. 主营业务成本|
D. 管理费用
【单选题】
银行存款日记账由___根据审核无误的收.付款凭证逐日逐笔进行登记。
A. 会计主管入员|
B. 审核入员
C. 记账入员|
D. 出纳入员|
【单选题】
登记现金日记账时,误将记账凭证中的“200”抄成“2000”,应采用的错账更正方法是___。
A. 划线更正法|
B. 红字更正法|
C. 补充登记法|
D. 蓝字更正法|
【单选题】
记账后发现记账凭证账户正确,但所记金额小于应记金额,应采用的错账更正方法___。
A. 划线更正法|
B. 红字更正法|
C. 补充登记法|
D. 挖补更正法|
【单选题】
如果发现记账凭证所用的科目正确,只是所填金额大于应填金额,并已登记入账,应采用___更正。
A. 划线更正法|
B. 红字更正法|
C. 平行登记法|
D. 补充登记法
【单选题】
下列错账更正过程中,可采用划线更正法的是___。
A. 记账凭证正确,只是记账过程中,在账簿中将数字抄写错误|
B. 记账凭证不正确,但还没有记账|
C. 记账凭证中会计科目运用不正确,并且已记账|
D. 记账凭证中金额小于应记金额,并已登记入账|
【单选题】
银行存款余额调节表是___。
A. 对银行和本单位产生的未达账项进行余额试算平衡的表格|
B. 通知银行更正错误的依据|
C. 调整银行存款账簿记录的依据|
D. 更正本单位银行存款日记账记录的依据|
【单选题】
对于银行已经入账,本单位尚未入账的未达账项,企业应该___
A. 立即入眼|
B. 任意处理|
C. 等结算凭证到达后入账
D. 计入备查簿
【单选题】
作为中国共产党和社会主义事业指导思想的马克思主义是指 ___
A. 不仅指马克思恩格斯创立的基本理论、基本观点和学说的体系,也包括继承者对它的发展
B. 无产阶级争取自身解放和整个人类解放的学说体系
C. 关于无产阶级斗争的性质、目的和解放条件的学说
D. 列宁创立的基本理论、基本观点和基本方法构成的科学体系
【单选题】
马克思主义最重要的理论品质是 ___
A. 吐故纳新
B. 科学严谨
C. 博大精深
D. 与时俱进
【单选题】
马克思主义公开问世的标志是 ___
A. 《资本论》的发表
B. 《共产党宣言》的发表
C. 《哥达纲领批判》的发表
D. 《反杜林论》的发表
【单选题】
以人民为中心,一切为了人民,一切依靠人民,是马克思主义的 ___
A. 基本观点
B. 基本立场
C. 基本方法
D. 基本品质
【单选题】
以下不属于马克思主义基本观点的是 ___
A. 实践和认识辩证关系
B. 世界统一于物质
C. 社会意识决定社会存在
D. 人民群众创造历史
【单选题】
马克思主义是对自然、社会和人类思维发展本质和规律的正确反映,体现了马克思主义什么特征? ___
A. 科学性
B. 革命性
C. 实践性
D. 发展性
【单选题】
与时俱进的理论品质体现了马克思主义的什么特征? ___
A. 革命性
B. 实践性
C. 发展性
D. 人民性
【单选题】
马克思主义彻底的批判精神和鲜明的无产阶级立场体现了什么特征 ___
A. 科学性
B. 革命性
C. 实践性
D. 人民性
【单选题】
马克思主义基本原理体现了马克思主义的根本性质和整体特征,体现马克思主义 ___
A. 科学性和革命性的统一
B. 理论性和实践性的统一
C. 科学性和理论性的统一
D. 实践性和革命性的统一
【单选题】
科学社会主义的理论来源是 ___
A. 德国古典哲学
B. 英国古典政治经济学
C. 19世纪的三大科学发现
D. 英法空想社会主义
【单选题】
唯物主义的三种历史形态是 ___
A. 朴素唯物主义,机械唯物主义,庸俗唯物主义
B. 原子论唯物主义,气本体唯物主义,辩证唯物主义
C. 马克思的唯物主义,列宁的唯物主义,毛泽东的唯物主义
D. 朴素唯物主义,形而上学唯物主义,辩证唯物主义与历史唯物主义
【单选题】
下列属于客观唯心主义观点的是 ___
A. 理在事先,以理为本
B. 存在就是被感知
C. 意识是万物的本原
D. 心外无物
【单选题】
下面属于主观唯心主义观点的是 ___
A. 陆九渊的“吾心即是宇宙”
B. 黑格尔的“绝对精神”
C. 柏拉图的“理念世界”
D. 朱熹的“天理”
【单选题】
火是万物本原的观点是属于 ___
A. 唯心主义的观点
B. 机械唯物主义的观点
C. 自发的或朴素的唯物主义的观点
D. 主观唯心主义观点
【单选题】
把人等同于机器的观点是 ___
A. 朴素唯物主义的观点
B. 主观唯心主义的观点
C. 客观唯心主义的观点
D. 近代形而上学唯物主义的观点
【单选题】
下面属于辩证唯物主义哲学观点的是 ___
A. 物质第一性,意识第二性
B. 意识第一性,物质第二性
C. 物质和意识都是世界的本原
D. 物质和意识都不是世界的本原
【单选题】
恩格斯认为,全部哲学、特别是近代哲学的重大的基本问题是___
A. 哲学与人类生存活动之间的内在联系问题
B. 人与周围世界的基本联系问题
C. 思维和存在的关系问题
D. 关于人的本质问题
【单选题】
唯物主义一元论同唯心主义一元论对立的焦点在于___
A. 世界发展动力问题
B. 意识本质问题
C. 世界本原问题
D. 实践本质问题
【单选题】
唯物论和唯心论在世界统一性问题上的根本分歧是___
A. 统一于实践,还是认识
B. 统一于运动,还是静止
C. 统一于物质,还是精神
D. 统一于存在,还是非存在
【单选题】
马克思、恩格斯在创立自己哲学的过程中,对待黑格尔的辩证法和费尔巴哈的唯物主义采取了正确的科学的态度。这种态度是___
A. 全盘否定和抛弃
B. 全盘肯定和继承
C. 把二者结合起来
D. 批判地继承
【单选题】
把物质等同于物质的微观结构层次——原子,这种观点属于___
A. 古代朴素唯物主义的观点
B. 近代形而上学唯物主义的观点
C. 辩证唯物主义的观点
D. 历史唯物主义的观点
【单选题】
所谓物质,就是不依赖于人类的意识而存在,并能为人类的意识所反映的客观存在,这种观点属于___
A. 辩证唯物主义的观点
B. 近代形而上学唯物主义的观点
C. 主观唯心主义的观点
D. 客观唯心主义的观点