【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
推荐试题
【填空题】
人们经常爱说:哲学的任务不仅是要认识世界,还要改造世界。对于建筑设计师来说,“认识世界”就是___,“改造世界”就是___。
【填空题】
在地域主义中,建筑师试图___,而并非一定是来自于___。
【填空题】
总的来说,类型学涉及建筑的分类,以___为基础。
【填空题】
在文学领域,象征和比喻是一种表现手法;在语言学领域,则是一种修辞手法。象征和比喻的建筑设计手法按其表述模式可以划分为两种类型:___的建筑设计手法和___的建筑设计手法。
【填空题】
建筑功能往往会对___、___、___、___产生直接影响,另外,各类建筑的建筑功能随着社会发展和物质文化水平提高也会有不同的要求。
【填空题】
隐喻将___的相类说成相同,借助表示具体事物的词语表达抽象概念,以此代彼,含蓄内敛。
【填空题】
表现技法训练重在手头功夫的训练,而创作想法训练重在思维能力的训练。建筑设计过程中注重创作想法,也就是注重___的培养和训练就更为重要。
【填空题】
建筑师在方案设计阶段使用的图示语言模式,其中包括:设计方案的徒手草图表达模式、___表达模式、最终___表达模式以及___表达模式。
【填空题】
社会生活中人们的心理、行为规律是建筑空间组织的重要依据。各类建筑设计中,不论居住建筑还是众多类型的公共建筑的设计都是以___为出发点的。
【填空题】
场地条件分析有一套比较完整的分类方法,主要包括四个方面:___、___、___以及___。
【填空题】
20世纪90年代,随着建筑技术的发展与高科技材料的介入,赫尔佐格与德·梅隆已经开始有意识地___并取得卓越成果。
【填空题】
建筑设计除了受外界诸因素影响之外,重要的是综合解决建筑功能、技术、经济及建筑美观的问题,其中首要的是___的问题。
【填空题】
建筑设计的构思是建立在___的基础上,所有的客观设计要素,如___或任何与设计项目有关的因素,都可能因此而激发出建筑师的设计灵感。
【填空题】
1993年___的建筑研究从解构主义的空间主题引向建筑的围护结构,用仿生学语言来说就是建筑的表皮。
【填空题】
由亨宁·拉森事务所设计的波浪公寓,矗立于丹麦的连体创意住宅群,外观采用波浪元素,以一种___,结合海边的环境用有机形态拉近人与自然的距离。
【填空题】
1997年10月18日,西班牙毕尔巴鄂的___的竣工标志着博物馆设计概念的重新审视,这座世纪建筑超越所有人的期望,为该城带来巨大的旅游收益,成为建筑复兴的符号。
【填空题】
宁波博物馆,采用大面积瓦片墙作为建筑外墙装饰,将宁波___,与现代建筑形式和工艺融为一体,建成后的宁波博物馆成为宁波标志性建筑。
【填空题】
格拉茨艺术馆立面复杂的双曲面数字化建筑表皮构成一个低分辨率亮度色标展示屏,可以放映简单的信息、动画和电影剪辑,用以“交流展示”,堪称21世纪的___。
【填空题】
美国华盛顿特区越战纪念碑由___设计,以其大胆而极少主义的设计手法,空间布局开阔,形态一气呵成,平面呈现狭长的V形裂痕隐喻战争的伤痕,完美传达纪念性建筑的精神内涵与形式需要。
【填空题】
1929年,巴塞罗那世界博览会的德国馆为密斯提供了一个充分展示其建筑观念 和___建筑思想的舞台,将自由平面和流动空间构思提炼、完善、升华并付诸实施,使德国馆的建筑空间和设计手法臻于完美。
【填空题】
___,又称黄金分割数列,该数学家以兔子繁殖为例而引入,故又称为“兔子数列”,指的是这样一个数列:1、1、2、3、5、8、13、21、34、……
【填空题】
贝聿铭的美国国家美术馆东馆的设计构思建立了新馆与老馆的轴线关系,建立了二者的视觉形态关联性和延续性,也催生了因此而形成的___),创造了独居一格的建筑形态和建筑空间。
【填空题】
2019年3月6日,有着“建筑界诺贝尔奖”之称的普利兹克建筑奖授予了日本著名建筑师、城市规划师与建筑学者___。
【填空题】
安藤忠雄被誉为“清水混凝土诗人”,1976年的成名作为___,建筑中运用几何形体之间组合,利用中庭形成向心式空间,创造出极具特色的建筑语言。
【填空题】
___是意大利理性主义建筑运动的代表人物,代表作科莫法西斯宫是理性主义和功能主义的精彩杰作,是欧洲现代建筑的里程碑。
【填空题】
___撰写于公元前32-22年间,是现存最古老且最有影响的建筑学专著,书中关于城市规划、建筑设计基本原理和建筑构图原理的论述,总结了古希腊建筑经验和当时罗马建筑的经验。
【填空题】
___被誉为高技派建筑风格的代表,新作苹果飞碟总部使用100%的再生能源,展现技术与生态的完美融合。
【填空题】
被弗兰克·劳埃徳·赖特称之为“我们时代最敏锐的建筑评论家”的意大利学者 布鲁诺·赛维,其著作___提出了建筑设计的非对称性和不协调性
【填空题】
弗兰克·盖里是一位特立独行的___建筑师,代表作是毕尔巴鄂古根海姆博物馆。
【填空题】
___是墙、柱、梁、板、门、窗等物质要素和各类空间要素,通过一定的设计原则及结构规则而建成空间和建筑物,即场所、环境。
【填空题】
___设计的阿拉伯文化中心建筑立面上的钢制眼状孔可以根据捕捉到的光的强度来打开或关闭。
【填空题】
流水别墅是赖特使用___的第一件住宅建筑作品,现代建筑技术使之得以充分体系其现代主义建筑时空观。
【填空题】
位于伦敦的瑞士保险公司大楼“小黄瓜”由英国建筑师___ 设计,建筑外形是综合了对生态气候的考虑和减少热损失的想法。
【单选题】
最早提出"马克思主义中国化"这个命题的人是___
A. 李大钊
B. 陈独秀
C. 毛泽东
D. 刘少奇
【单选题】
毛泽东思想在哪个时期走向成熟___
A. 土地革命战争
B. 抗日战争
C. 解放战争
D. 中华人民共和国成立后
【单选题】
毛泽东思想在哪次会议上成为党的指导思想___
A. 党的一大
B. 八七会议
C. 遵义会议
D. 党的七大
【单选题】
()一声炮响,给中国送来了马克思列宁主义.___
A. 法国大革命
B. 十月革命
C. 辛亥革命
D. 北伐战争
【单选题】
中国革命最基本的动力是___
A. 无产阶级
B. 农民阶级
C. 城市小资产阶级
D. 民族资产阶级
【单选题】
中国革命的首要对象是___
A. 帝国主义
B. 封建主义
C. 官僚资本主义
D. 资本主义
【单选题】
哪次会议确立了毛泽东在全党的实际领导地位___
A. 党的一大
B. 八七会议
C. 遵义会议
D. 党的七大