【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
推荐试题
【单选题】
___建设社会主义精神文明,实行依法治国和以德治国相结合,提高全民族的思想道德素质和科学文化素质,为改革开放和社会主义现代化建设提供强大的思想保证、精神动力和智力支持,建设______。
A. 社会主义道德强国
B. 社会主义文化强国
C. 社会主义科学强国
D. 社会主义智库强国
【单选题】
___中国共产党领导人民发展社会主义先进文化,弘扬以爱国主义为核心的民族精神和以______为核心的时代精神。
A. 诚信友善
B. 爱岗敬业
C. 改革创新
D. 创新创业
【单选题】
___中国共产党领导人民发展社会主义民主政治。广开言路,建立健全民主选举、民主决策、______、民主监督的制度和程序。
A. 民主参与
B. 民主管理
C. 民主测评
D. 民主建言
【单选题】
___坚持和完善人民代表大会制度、中国共产党领导的多党合作和政治协商制度、民族区域自治制度以及______。
A. 村民代表大会制度
B. 民主集中制
C. 基层群众自治制度
D. 一国两制
【单选题】
___牢牢掌握意识形态工作领导权,不断巩固_____在意识形态领域的指导地位,巩固全党24全国人民团结奋斗的_____。
A. 社会主义核心价值观 共同动力来源
B. 马克思主义 共同思想基础
C. 中华文化 共同发展基础
D. 中国特色社会主义 共同思想基础
【单选题】
___大力发展教育、科学、文化事业,推动_____创造性转化、创新性发展,继承_____,发展社会主义先进文化,提高国家文化软实力。
A. 中华传统文化 中华优良传统
B. 革命文化 中华优秀国学文化
C. 中华优秀传统文化 革命文化
D. 中国传统文化 红色文化
【单选题】
___坚持节约优先、_____的方针,坚持生产发展、生活富裕、生态良好的文明发展道路。
A. 发展优先、合理保护为主
B. 保护优先、人工恢复为主
C. 保护优先、自然恢复为主
D. 发展优先、适度开发为主
【单选题】
___我国最广泛的爱国统一战线是由全体社会主义劳动者、社会主义事业的建设者、拥护社会主义的爱国者、拥护祖国统一和_____组成的。
A. 致力于弘扬传统文化的爱国者
B. 致力于中华民族伟大复兴的爱国者
C. 维护总体国家安全的爱国者
D. 拥挤中国共产党领导的爱国者
【单选题】
___中国共产党坚持_____的和平外交政策,坚持_____道路,坚持_____的开放战略,统筹国内国际两个大局,积极发展对外关系,努力为我国的改革开放和现代化建设争取有利的国际环境。
A. 亲诚惠容 以我为主 互利共赢
B. 共建共享 和平发展 友好往来
C. 独立自主 和平发展 互利共赢
D. 独立自主 和平发展 互助助利
【单选题】
___在国际事务中,维护世界和平,促进人类进步,推动构建_____,推动建设持久和平、共同繁荣的和谐世界。
A. 人类命运共同体
B. 地球村
C. 人类发展共同体
D. 国际命运共同体
【单选题】
___中国共产党主张在_____、互不侵犯、互不干涉内政、平等互利、和平共处五项原则的基础上,发展我国同世界各国的关系。
A. 互相尊重主权和领土完整
B. 互相尊重人权和国内事务
C. 互相尊重本国人民选择自己的发展道路
D. 互不干涉内部事务
【单选题】
___中国共产党按照_____的原则,发展我党同各国共产党和其他政党的关系。
A. 互相尊重主权和领土完整、互不侵犯、互不干涉内政、平等互利、和平共处
B. 独立自主、完全平等、互相尊重、互不干涉内部事务
C. 长期共存、互相监督、肝胆相照、荣辱与共
D. 互相尊重、平等互利、互不干涉内部事务
【单选题】
___中国共产党要领导全国各族人民实现“两个一百年”奋斗目标、实现中华民族伟大复兴的中国梦,必须紧密围绕党的基本路线,坚持_____。
A. 党要管党、全面从严治党
B. 党要管党、从严治党
C. 从严管党、从严治党
D. 从严管党、依法治党
【单选题】
___坚持全面从严治党必须以党章为根本遵循,把_____摆在首位,思想建党和制度治党同向发力,统筹推进党的各项建设。
A. 党的政治建设
B. 党的作风建设
C. 党的组织建设
D. 党的思想建设
【单选题】
___加强各级领导班子建设,培养选拔党和人民需要的好干部,培养和造就千百万社会主义事业接班人,从组织上保证党的基本理论、基本路线、_____的贯彻落实。
A. 基本经验
B. 基本方略
C. 基本政策
D. 基本方法
【单选题】
___必须实行正确的集中,牢固树立政治意识、大局意识、核心意识、看齐意识,坚定维护_____,保证全党的团结统一和行动一致,保证党的决定得到迅速有效的贯彻执行。
A. 党组织集中统一领导
B. 党的中央组织的权威
C. 以习近平同志为核心的党中央权威和集中统一领导
D. 党的中央组织的统一领导
【单选题】
___深入推进党风廉政建设和反腐败斗争,以零容忍态度惩治腐败,构建_____的有效机制。
A. 不让腐、不能腐、不敢腐
B. 不能腐、不敢腐、不易腐
C. 不敢腐、不能腐、不想腐
D. 不想腐、不能腐、不让腐
【单选题】
___习近平强调,全面贯彻落实总体国家安全观,必须坚持统筹_____两件大事,既要善于运用发展成果夯实国家安全的实力基础,又要善于塑造有利于经济社会发展的安全环境。
A. 经济和安全
B. 发展和安全
C. 社会和安全
D. 环境和安全
【单选题】
___习近平总书强调,_____,事关国家安全、发展全局、人民财产安全,是实现高质量发展必须跨越的重大关口。
A. 防范化解金融风险
B. 精准脱贫
C. 污染防治
D. 环境问题
【单选题】
___十九大修订的党章将党的建设必须坚决实现的基本要求由四项改为五项,增写的一项是_____。
A. 坚持民主集中制
B. 坚持从严管党治党
C. 坚持党的基本路线
D. 坚持全心全意为人民服务
【单选题】
___党的民主集中制的基本原则之一是“四个服从”, 即党员个人服从党的组织, _____ ,下级组织服从上级组织,全党各个组织和全体党员服从党的全国代表大会和中央委员会。
A. 党委委员服从党委书记
B. 少数服从多数
C. 普通党员服从党组织书记
D. 普通党员服从党员干部29