【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
推荐试题
【单选题】
当事人不服地方人民法院第一审判决的,有权在判决书送达之日起()日内向上一级人民法院提起上诉。___
A. 15
B. 90
C. 180
D. 365
【单选题】
根据《中华人民共和国票据法》的规定,票据金额以中文大写与数码同时记载,两者不一致的,()。___
A. 票据无效
B. 以中文大写为准
C. 以数码为准
D. 以金额较小的为准
【单选题】
根据《中华人民共和国票据法》的规定,票据记载事项中()均不得更改,更改的票据无效。___
A. 付款人名称
B. 票据用途
C. 票据金额、付款人名称、收款人名称
D. 票据金额、日期、收款人名称
【单选题】
根据《中华人民共和国票据法》的规定,以背书转让的汇票,()应当对其()背书的真实性负责。___
A. 后手,所有前手
B. 所有前手,后手
C. 后手,直接前手
D. 直接前手,后手
【单选题】
根据《中华人民共和国票据法》的规定,下列不属于支票绝对应记载事项的是()。___
A. 付款人名称
B. 确定的金额
C. 无条件支付的“委托”
D. 付款日期
【单选题】
根据《中华人民共和国合同法》,有以下()情形的,当事人一方有权请求人民法院或者仲裁机构变更或者撤销合同。___
A. 一方以欺诈、胁迫的手段订立合同,损害国家利益
B. 合同损害社会公共利益
C. 在订立合同时显失公平的
D. 合同违反法律、行政法规的强制性规定
【单选题】
在贷款期限内每月只还贷款利息,贷款到期时一次性归还贷款本金的还款法是( )。___
A. 等额累进还款法
B. 组合还款法
C. 按月还息、到期一次性还本还款法
D. 等额本金还款法
【单选题】
个人贷款是指贷款人向符合条件的( )发放的用于个人消费、生产经营等用途的本外币贷款。___
A. 法人
B. 自然人
C. 企事业
D. 国家
【单选题】
抵押担保是指借款人或第三人( )对法定财产的占有,将该财产作为贷款的担保。___
A. 转移
B. 暂时转移
C. 不转移
D. 可以转移可以不转移
【单选题】
( )不能为个人贷款作保证担保。___
A. 具有代位清偿债务能力的法人
B. 获得企业法人授权的企业分支机构
C. 具有完全民事行为能力的自然人
D. 以公益为目的的事业单位
【单选题】
下列不属于商业银行的合作机构风险的是( )。___
A. 房地产商欺诈风险
B. 民营担保公司的担保风险
C. 房屋评估机构的价值评估风险
D. 银行的流动性风险
【单选题】
通过( )渠道发放低风险质押贷款的,贷款人至少应当采取有效措施确定借款人真实身份。___
A. 电子银行
B. 电话银行
C. 现场咨询
D. 窗口咨询
【单选题】
社会公众对合作机构的信任和认可程度是指( )。___
A. 合作机构的信用状况
B. 合作机构的偿债能力
C. 合作机构的管理水平
D. 合作机构的业界声誉
【单选题】
关于个人贷款的贷后管理,下列说法错误的是( )。___
A. 贷款人应定期跟踪分析评估借款人履行借款合同约定内容的情况
B. 经贷款人同意,个人贷款可以展期
C. 一年以上的个人贷款,展期期限累计不得超过原贷款期限
D. 对于未按照借款合同约定偿还的贷款,贷款人应采取措施进行清收,或者协议重组
【单选题】
反映商业银行对贷款损失的弥补能力和对贷款风险的防范能力的关键风险指标是( )。___
A. 不良资产率
B. 不良贷款拨备覆盖率
C. 贷款迁徙率
D. 风险运营效率
【单选题】
贷款调查应以( )为主、( )为辅,采取现场核实、电话查问以及信息咨询等途径和方法。___
A. 实地调查;间接调查
B. 直接调查;间接调查
C. 间接调查;实地调查
D. 实地调查;间卷调查
【单选题】
贷款受理和调查中的风险不包括( )。___
A. 借款申请人的主体资格不符合银行相关规定
B. 借款申请人所提交的材料不真实、不合法
C. 借款申请人的担保措施不足额或无效
D. 审批人对借款人的资格审查不严
【单选题】
贷款审查和审批中的主要风险点不包括( )。___
A. 未按独立公正原则审批
B. 不按权限审批贷款
C. 未履行法定提示义务
D. 审批人员对审查内容审查不严
【单选题】
贷款人应要求借款人以( )提出个人贷款申请,并要求借款人提供能够证明其符合贷款条件的相关资料。___
A. 公开形式
B. 书面形式
C. 口头形式
D. 正式形式
【单选题】
贷款管理的完整业务流程,应该包括( )个环节。___
A. 9
B. 8
C. 7
D. 6
【单选题】
贷款风险评价应以分析借款人( )为基础,采取定量和定性分析方法,全面、动态地进行贷款审查和风险评估。___
A. 现金收入
B. 诚信状况
C. 抵押比率
D. 担保情况
【单选题】
从策略理论来讲,银行常用的个人贷款营销策略不包括( )。___
A. 产品策略
B. 定价策略
C. 促销策略
D. 合作策略
【单选题】
对于一手个人住房贷款,商业银行最主要的合作单位是( )。___
A. 房地产经纪公司
B. 保险经纪公司
C. 公积金管理中心
D. 房地产开发商
【单选题】
市场细分是银行营销战略的重要组成部分,其作用不包括( )。___
A. 有利于选择目标市场和制定营销策略
B. 有利于发掘市场机会,开拓新市场
C. 有利于提高银行的经济效益
D. 有利于规避风险
【单选题】
下列不属于银行市场定位原则的是( )。___
A. 发挥优势
B. 经营绩效
C. 围绕目标
D. 突出特色
【单选题】
下列选项中,不符合个人经营贷款借款人条件的是( )。___
A. 具有稳定的收入来源和按时足额偿还贷款本息的能力
B. 能提供贷款人认可的合法、有效、可靠的贷款担保
C. 借款人在银行开立个人结算账户
D. 借款人的年龄在 18~65 岁之间
【单选题】
农户贷款期限的确定应根据的因素不包括( )。___
A. 项目生产周期
B. 综合还款能力
C. 项目的利润率
D. 销售周期
【单选题】
农村金融机构应当建立贷款档案管理制度,及时汇集更新客户信息及贷款情况,确保农户贷款档案资料的( )。___
A. 完整性、有效性、连续性
B. 及时性、有效性、连续性
C. 及时性、完整性、连续性
D. 谨慎性、有效性、完整性
【单选题】
借款人变更还款方式,( )条件是不需要满足的。___
A. 应向银行提交还款方式变更申请书
B. 借款人的贷款账户中没有拖欠本息及其他费用
C. 借款人在变更还款方式前已还清所有贷款利息
D. 借款人在变更还款方式前应归还当期的贷款本息
【单选题】
个人商用房贷款期限最长不超过( )年。___
A. 1
B. 3
C. 5
D. 10
【单选题】
个人经营贷款信用风险的主要内容不包括( )。___
A. 借款人所控制企业经营情况发生变化
B. 抵押物价值发生变化
C. 借款人还款能力发生变化
D. 贷款人贷款能力发生变化
【单选题】
贷款人应根据( ),完善授权管理制度,规范审批操作流程,明确贷款审批权限,实行审贷分离和授权审批,确保贷款审批人按照授权独立审批贷款。___
A. 可靠性原则
B. 相关性原则
C. 准确性原则
D. 审慎性原则
【单选题】
( )是指借款人按借款合同约定的还款计划、还款方式及时、足额地偿还贷款本息。___
A. 贷款的提前偿还
B. 贷款的发放
C. 贷款的回收
D. 贷款的缴存
【单选题】
贷款支付管理中的风险不包括( )。___
A. 贷款资金发放前,未审核借款人相关交易资料和凭证
B. 业务不合规,业务风险和效益不匹配
C. 直接将贷款资金发放至借款人账户
D. 在未接到借款人支付申请和支付委托的情况下,直接将贷款资金支付给汽车经销商
【单选题】
( )不属于个人征信系统的社会功能。___
A. 随着该系统的建设和完善,通过对个人重要经济活动的影响和规范,逐步形成诚实守信、遵纪守法、重合同讲信用的社会风气
B. 推动社会信用体系建设
C. 提高社会诚信水平,促进文明社会建设
D. 帮助商业银行等金融机构控制信用风险
【单选题】
是征信机构把依法采集的信息,依法进行加工整理,最后依法向合法的信息查询人提供的个人信用历史记录。___
A. 个人信用征信
B. 个人征信系统
C. 个人信用报告
D. 个人征信报告
【单选题】
个人基础数据库信用信息查询主体不包括( )。___
A. 个人
B. 企业
C. 商业银行
D. 政府机构
【单选题】
一手个人住房交易时,在借款人购买的房屋办好抵押登记之前,由( )提供阶段性或全程担保。___
A. 经纪公司
B. 有担保能力的第三人
C. 开发商
D. 借款人
【单选题】
对开发商及楼盘项目本身的审查内容不包括( )。___
A. 项目资料的完整性审查
B. 项目合法性审查
C. 项目工程进度审查
D. 项目实地考察
【单选题】
关于个人住房贷款信用风险防范的说法,正确的是( )。___
A. 保持“重抵押物、轻还款能力”的审批思路
B. 可靠的证明材料包括至少过去 3 个月的工资单、工资卡或存折入账流水等
C. 借款人收入审核是指审核借款人的工资收入和租金收入两个方面
D. 由于自雇人士收入水平高.在审核此类个人住房贷款申请时,可放松其收入证明审核