【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
推荐试题
【单选题】
血管相关性感染的预防措施不包括___
A. 采用各种导管应有明确指征
B. 选管合适,严格执行无菌技术
C. 插管部位感染需严密观察24小时后决定是否拔管
D. 配制液体及高营养液应在洁净环境中进行
E. 配制抗癌药及抗菌药应在生物洁净操作台上进行
【单选题】
根据领导生命周期理论,护士长对于刚参加工作的新护士应该采取的领导行为是___
A. 高工作低关系
B. 高关系高工作
C. 低工作高关系
D. 低工作低关系
E. 高工作高关系
【单选题】
张某,男,20岁,自己的父亲曾经吸过毒并且已经去世,母亲怕子女吸毒而对子女管教很严。张某中学毕业后,在做生意时认识了某些吸毒人员并在无意中染上毒瘾,张某的成瘾行为主要受到___
A. 遗传因素的影响
B. 环境因素的影响
C. 学习因素的影响
D. 个性因素的影响
E. 政治因素的影响
【单选题】
为防止被污染的利器刺伤,正确的做法是___
A. 小心处理用过的尖锐物品和设备
B. 使用后的针头重复使用需严格筛选
C. 用手去除针头时务必小心谨慎
D. 废弃的针头需立即复帽
E. 用后的针和手术刀应弃于黄色双层塑料袋内
【单选题】
下列属于开放式提问的问题是___
A. 您今天吃过药了吗?
B. 您是河北人吧?
C. 您是怎样看待自己的病情的
D. 您是在哪里做的检查?检查结果如何?
E. 睡了一晚上,您一定觉得好多了吧?
【单选题】
患者,女,30岁,病毒性感冒,护士对其进行健康指导,下列不正确的是___
A. 注意多休息
B. 多喝水
C. 外出戴口罩
D. 按疗程正确服用抗生素
E. 多食用新鲜的蔬菜水果
【单选题】
健康信息的特点是___
A. 新颖性、科学性、指导性、符号通用、易懂
B. 科学性、针对性、指导性、符号通用、易懂
C. 超前性、针对性、指导性、符号通用、易懂
D. 趣味性、新颖性、科学性、符号通用、易懂
E. 专业性、趣味性、科学性、符号通用、易懂
【单选题】
下列属于封闭式提问的问题是___
A. 经过这两天的治疗,您今天感觉好多了吧?
B. 您是河北人吧?
C. 悠为什么不愿意选择手术治疗呢
D. 您是在哪里做的检查?检查结果如何
E. 您愿意和我谈谈自己手术后的感受吗?
【单选题】
规划是指___
A. 时间一般在5年以上,由中层管理者制订
B. 时间一般在5年以上,由高层管理者制订
C. 时间一般在10年以上,由高层管理者制订
D. 时间一般在1~5年,由中层管理者制订
E. 时间一般在1~5年,由高层管理者制订
【单选题】
患者,男,63岁,糖尿病、高血脂,护士对其进行戒烟及减肥训练,这些健康教育的内容属于___
A. 一般卫生知识宣教
B. 心理卫生教育
C. 健康相关行为干预
D. 疾病防治知识宣教
E. 自我保健知识宣教
【单选题】
某社区医院口腔科准备在9月20日"全国爱牙日"这天进行一次关于正确刷牙方法的普及活动,以使所在社区居民了解并掌握科学刷牙方法,养成良好的刷牙习惯。在此次健康传播活动中,社区医院的医护人员是___
A. 传播者
B. 受传者
C. 既是传播者又是受传者
D. 信息的载体
E. 信息本身
【单选题】
青霉素类药物使用方法错误的是___
A. 可采用静脉滴注法
B. 静脉滴注时采用间歇给药的方法
C. 每次药物溶于100ml生理盐水中
D. 每次给药时间为1~2小时
E. 现用现配
【单选题】
关于实施教育计划的注意事项,以下表述错误的是___
A. 注重信息的双向传播
B. 适当重复重点内容
C. 采取多种教育方法和方式
D. 注重教育者的态度
E. 教育场所可依医务人员的方便而定
【单选题】
下列关于流行性出血热的叙述错误的是___
A. 主要传染源是患病的家畜
B. 可通过蚊子叮咬传播
C. 可经呼吸道传播
D. 可经消化道传播
E. 伤口接触感染动物的排泄物后也可感染
【单选题】
护士长在管理过程中,遇到问题时经常发动护士们共同讨论,共同商量,集思广益,然后决策,并要求病房护士每个人各尽所能,各施其长,分工合作,这种领导作风属于___
A. 专权型领导作风
B. 命令型领导作风
C. 权威型领导作风
D. 民主参与型领导作风
E. 自由放任型领导作风
【单选题】
下列叙述正确的是___
A. 为了防止术后感染,术前应给患者使用广谱抗生素,力图达到"绝对无菌"
B. 去污染是指人为地将外来致病菌部分或全部去除的方法
C. 排列
D. 选择性去污染治疗对使用大量免疫抑制剂患者疗效不佳
E. 全部去污染的术后感染率低于选择去污染
【单选题】
王某,男,78岁,患大叶性肺炎,高热昏迷10天,10天内给予大量广谱抗生素抗感染治疗。近日护士做口腔护理时发现其口腔黏膜破溃,创面上附着白色膜状物。该患者最可能发生___
A. 原位菌群一度失调
B. 原位菌群二度失调
C. 移位菌群失调
D. 菌群交替症
E. 无菌群失调
【单选题】
以下属于医院感染的是___
A. 患者皮肤黏膜开放性伤口有细菌定植,但尚未有炎症表现
B. 新生儿在院内经产道感染链球菌
C. 新生儿在院内经胎盘感染单纯疱疹
D. 新生儿在分娩过程中误吸未被污染的羊水形成肺炎
E. 术后三日内患者体温升高,三日后恢复正常
【单选题】
以下属于医院感染的是___
A. 患者皮肤黏膜开放性伤口有细菌定植,但尚未有炎症表现
B. 新生儿在院内经产道感染链球菌
C. 新生儿在院内经胎盘感染单纯疱疹
D. 新生儿在分娩过程中误吸未被污染的羊水形成肺炎
E. 术后三日内患者体温升高,三日后恢复正常
【单选题】
对于"大众传播"的描述,正确的是___
A. 是最基本的传播形式
B. 是建立人际关系的基础
C. 是非组织群体的传播活动
D. 以职业性传播机构为传播者
E. 是组织以外群体的传播活动
【单选题】
对传播的定义描述正确的是___
A. 传播是一种个人化传递信息的行为
B. 是个人之间交换传递、新闻、事实、意见的信息过程
C. 是集体之间交换传递、新闻、事实、意见的信息过程
D. 是个人与集体之间交换传递、新闻、事实、意见的信息过程
E. 是个人之间、集体之间以及个人与集体之间交换、传递新闻、事实、意见的信息过程