【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
推荐试题
【单选题】
参与公司系统所承担电气工作的外单位或外来工作人员应熟悉本规程,经考试合格,并经( )认可,方可参加工作。___
A. 相关单位分管领导
B. 设备运维管理单位
C. 安全监督管理部门
D. 调度控制中心
【单选题】
任何人发现有违反本规程的情况,应( ),经纠正后才能恢复作业。___
A. 批评教育
B. 严肃指出
C. 立即制止
D. 立即汇报
【单选题】
待用间隔(母线连接排、引线已接上母线的备用间隔)应有( ),并列入调度控制中心管辖范围。___
A. 名称
B. 编号
C. 名称、编号
D. 名称、序号
【单选题】
运行中的高压设备,其中性点接地系统的中性点应视作( )。___
A. 带电体
B. 停电设备
C. 检修设备
D. 试验设备
【单选题】
在高压设备上工作,应至少由( )进行,并完成保证安全的组织措施和技术措施。___
A. 一人
B. 两人
C. 三人
D. 四人
【单选题】
工作票若至预定时间,一部分工作尚未完成,需继续工作而不妨碍送电者,在送电前,应按照送电后现场设备带电情况,(),布置好安全措施后,方可继续工作。 ___
A. 办理新的工作票
B. 修改原工作票
C. 交待现场安全注意事项
D. 向工作班成员告知危险点
【单选题】
雨雪天气时不得进行( )验电。___
A. 室外直接
B. 室内直接
C. 室外间接
D. 室内间接
【单选题】
与停电设备有关的变压器和电压互感器,应将设备( )断开,防止向停电检修设备反送电。___
A. 各侧
B. 高压侧
C. 低压侧
D. 带电侧
【单选题】
对于因平行或邻近带电设备导致检修设备可能产生感应电压时,应加装( )。___
A. 标示牌
B. 围栏
C. 隔离挡板
D. 工作接地线或使用个人保安线
【单选题】
装、拆接地线时,人体不得( )接地线或未接地的导线,以防止触电。___
A. 靠近
B. 碰触
C. 临近
D. 贴近
【单选题】
绝缘斗臂车作业接近和离开带电部位时,应由()操作,但下部操作人员不准离开操作台。___
A. 专职司机
B. 斗臂中人员
C. 下部操作人员
D. 工作负责人
【单选题】
工作人员进入SF6配电装置室,入口处若无SF6气体含量显示器,应先通风()min,并用检漏仪测量SF6气体。___
A. 8
B. 10
C. 12
D. 15
【单选题】
SF6设备解体检修,检修人员需穿着()并根据需要佩戴防毒面具或正压式空气呼吸器。___
A. 防电弧服
B. 防护服
C. 工作服
D. 防静电服
【单选题】
在低压配电装置和低压导线上工作中,对于低压电动机和在不可能触及高压设备、二次系统的照明回路上的工作可(),该工作至少由两人进行。___
A. 不填用工作票,但应做好相应记录
B. 填用变电站(发电厂)第一种工作票
C. 填用变电站(发电厂)第二种工作票
D. 填用变电站(发电厂)带电作业工作票
【单选题】
在低压配电装置和低压导线上工作,作业前,应先分清相线、零线,选好工作位置。断开导线时,应()。搭接导线时,顺序应相反。___
A. 先断开相线,后断开零线
B. 先断开零线,后断开相线
C. 同时断开相线和零线
D. 先断开中相,后断开边相
【单选题】
在同一电气连接部分,许可高压试验工作票前,应先将已许可的检修工作票(),禁止再许可第二张工作票。___
A. 办理终结手续
B. 让班组自行留存
C. 存档
D. 收回
【单选题】
变更接线或试验结束时,应首先断开试验电源、放电,并将升压设备的高压部分()。___
A. 放电
B. 短路接地
C. 放电、短路
D. 放电、短路接地
【单选题】
电缆直埋敷设施工前应先查清(),再开挖足够数量的样洞和样沟,摸清地下管线分布情况,以确定电缆敷设位置及确保不损坏行电缆和其他地下管线。___
A. 图纸
B. 电缆运行记录
C. 历史资料
D. 电缆出厂资料
【单选题】
在10KV跌落式熔断器与10KV电缆头之间,宜加装()装置,使工作时能与跌落式熔断器上桩头有电部分保持安全距离。___
A. 过渡连接
B. 接地
C. 绝缘
D. 灭弧
【单选题】
工作场所的照明,应该保证足够的亮度。照明灯具的悬挂高度应不低于()m,并不得任意挪动。___
A. 1.0
B. 1.5
C. 2.0
D. 2.5
【单选题】
长期停用或新领用的电动工具应用()的绝缘电阻表测量其绝缘电阻。___
A. 250V
B. 500V
C. 1000V
D. 2500V
【单选题】
钢丝绳(起重用)的检查周期是(),试验周期是()。___
A. 2月,1年
B. 1月,半年
C. 1月,1年
D. 3月,1年
【单选题】
链条葫芦(起重用)的检查周期是(),试验周期是。___
A. 2月,1年
B. 1月,1年
C. 1月,半年
D. 3月,1年
【单选题】
触电急救应分秒必争,一经明确心跳、呼吸停止的,立即就地迅速用( )进行抢救,并坚持不断地进行。___
A. 心脏按压法;
B. 口对口呼吸法;
C. 口对鼻呼吸法;
D. 心肺复苏法
【单选题】
事故紧急抢修应填用工作票或( )。___
A. 第一种;
B. 第二种;
C. 事故应急抢修单;
D. 事故紧急抢修单
【单选题】
经常有人工作的场所及施工车辆上宜配备急救箱,存放( ),并应指定专人经常检查、补充或更换。___
A. 劳保用品;
B. 医用绷带;
C. 创可贴;
D. 急救用品
【单选题】
伤员脱离电源后,判断伤员有无意识应在( )s以内完成。___
A. 5
B. 10
C. 30
D. 60
【单选题】
各类作业人员应被告知其作业现场和工作岗位存在的危险因素、防范措施及( )。___
A. 事故紧急处理措施;
B. 紧急救护措施;
【单选题】
作业人员的基本条件之一:经( )鉴定,作业人员无妨碍工作的病症。___
A. 体检;
B. 医疗机构;
C. 医师;
D. 专业机构
【单选题】
触电急救,在医务人员( )前,不得放弃现场抢救,更不能只根据没有呼吸或脉搏的表现,擅自判定伤员死亡,放弃抢救。___
A. 未到达
B. 未接替救治
C. 作出死亡诊断
D. 判断呼吸或脉搏表现
【单选题】
触电急救应分秒必争,一经明确心跳、呼吸停止的,立即就地迅速用( )进行抢救,并坚持不断地进行,同时及早与医疗急救中心(医疗部门)联系,争取医务人员接替救治。___
A. 心脏按压法
B. 口对口呼吸法
C. 口对鼻呼吸法
D. 心肺复苏法
【单选题】
触电急救脱离电源,就是要把触电者接触的那一部分带电设备的( )断路器(开关)、隔离开关(刀闸)或其他断路设备断开;或设法将触电者与带电设备脱离开。 ___
A. 有关
B. 所有
C. 高压
D. 低压
【单选题】
作业人员的基本条件规定,作业人员的体格检查每( )至少一次。___
A. 四年;
B. 三年;
C. 两年;
D. 一年
【单选题】
《安规》要求作业人员,具备必要的安全生产知识,学会紧急救护法,特别要学会( )。___
A. 创伤急救;
B. 触电急救;
【单选题】
各类作业人员应接受相应的安全生产教育和( )培训,经考试合格上岗。 ___
A. 生产技术;
B. 实际操作;
C. 岗位技能;
D. 操作能力
【单选题】
作业人员对《安规》应( )考试一次。___
A. 每六个月;
B. 每年;
C. 每两年;
D. 每三年
【单选题】
新参加电气工作的人员、实习人员和临时参加劳动的人员(管理人员、非全日制用工等),应经过( )后,方可到现场参加指定的工作,并且不得单独工作。___
A. 学习培训;
B. 安全知识教育;
C. 考试合格;
D. 电气知识培训
【单选题】
紧急救护时,发现伤员意识不清、瞳孔扩大无反应、呼吸、心跳停止时,应立即在现场就地抢救,用( )支持呼吸和循环,对脑、心重要脏器供氧。___
A. 心脏按压法
B. 口对口呼吸法
C. 口对鼻呼吸法
D. 心肺复苏法
【单选题】
触电伤员脱离电源后,正确的抢救体位是( )。___
A. 左侧卧位
B. 右侧卧位
C. 仰卧位
D. 俯卧位
【单选题】
道德是一种。___
A. 要求
B. 态度
C. 特殊的行为规范
D. 契约