【单选题】
在TCP/IP模型中,提供端到端的通信的是() 。
A. :应用层
B. :传输层
C. :网络层
D. :网络接口层
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
计算机网络拓扑是通过网络中结点与通信线路之间的几何关系表示网络结构 ,它反映了网络中各实体之间的()。
A. :主从关系
B. :结构关系
C. :接口关系
D. :层次关系
【单选题】
一台需要与互联网通信的HTTP服务器放在以下的哪个位置最安全?()。
A. :在DMZ区的内部
B. :在内网中
C. :和防火墙在同一台计算机上
D. :在互联网防火墙之外
【单选题】
TCP/IP 是一组分层的通信协议。构成 TCP/IP 模型的四个层次是 ?
A. :网络接口层 ,网际层,传输层 ,应用层
B. :物理层,数据链路层,传输层,应用层
C. :数据链路层,传输层,会话层,应用层
D. :网络接口层 ,网络层,会话层,应用层
【单选题】
关于AH和ESP的区别说法正确的是?
A. :ESP要求使用高强度的加密算法
B. :AH要求使用高强度的加密算法
C. :在多数情况下,ESP开销较大
D. :以上选项均不正确
【单选题】
每个Web站点必须有一个主目录来发布信息,IIS默认的主目录为(),除了主目录外还可以采用 ()作为发布目录。
A. :\Website;父目录
B. :\Inetpub\wwwroot;虚拟目录
C. :\internet\website;虚拟目录
D. :\Inetpub\wwwroot;备份目录
【单选题】
TCP/IP协议是 ① 的,数据包在网络上通常是 ② ,容易被 ③ 。
A. :①公开发布; ② 明码传送; ③窃听和欺骗
B. :① 明码传送; ②密文传输; ③窃听和欺骗
C. :①公开发布; ②密文传输; ③ 窃听和欺骗
D. :①密文传输; ②明码传送; ③ 窃听和欺骗
【单选题】
关于SET协议,以下说法正确的是()。
A. :SET协议是针对非支付型电子商务而设计的安全规范
B. :SET协议是针对用卡支付的网上交易而设计的支付规范
C. :SET协议是针对电子钱包支付的网上交易而设计的支付规范
D. :SET协议是针对用电子支票支付的网上交易而设计的支付规范
【单选题】
关于安全电子交易SET要达到的主要目标,()是错误的。
A. :利用SSL协议保证数据不被黑客窃取
B. :隔离订单信息和个人账号信息
C. :持卡人和商家相互认证,确保交易各方的真实身份
D. :软件遵循相同协议和消息格式
【单选题】
目前的主要网络类型按通用网络划分标准可以把网络类型划分为( )。
A. :互联网,以太网,无线局域网
B. :局域网,城域网,广域网,互联网
C. :无线局域网,城域网,广域网,互联网
D. :局域网,广域网,ATM网
【单选题】
IPSec需要使用一个称为( )的信令协议来建立两台主机之间的逻辑连接。
A. :AH认证头部协议
B. :SA安全关联组协议
C. :PGP隐私
D. :TLS传输安全协议
【单选题】
当一个发往目的主机的IP包经过多个路由器转发时,以下哪种情况正确地描述了包内IP地址的变化?( )
A. :当IP包在每跳段中传输时,目的地址改为下个路由器的IP地址
B. :当一个路由器将IP包发送到广域网WAN时,目的IP地址经常变化
C. :目的IP地址将永远是第一个路由器的IP地址
D. :目的IP地址固定不变
【单选题】
OSI参考模型的数据链路层的功能包括( )。
A. :保证数据帧传输的正确顺序、无差错和完整性
B. :提供用户与传输网络之间的接口
C. :控制报文通过网络的路由选择
D. :处理信号通过物理介质的传输
【单选题】
对于一个组织,保障其信息安全并不能为其带来直接的经济效益,相反还会付出较大的成本,那么组织为什么需要信息安全?( )
A. :有多余的经费
B. :全社会都在重视信息安全,我们也应该关注
C. :上级或领导的要求
D. :组织自身业务需要和法律法规要求
【单选题】
在 IDS 中,将收集到的信息与数据库中已有的记录进行比较,从而发现违背安全策略的行为,这类操作方法称为( )。
A. :模式匹配
B. :统计分析
C. :完整性分析
D. :不确定
【单选题】
在基于 IEEE 802.1x 与 Radius 组成的认证系统中,Radius 服务器的功能不包括( )。
A. :验证用户身份的合法性
B. :授权用户访问网络资源
C. :对用户进行审计
D. :对客户端的 MAC 地址进行绑定
【单选题】
下面有关 SSL 的描述,不正确的是( )。
A. :目前大部分 Web 浏览器都内置了 SSL 协议
B. :SSL 协议分为 SSL 握手协议和 SSL 记录协议两部分
C. :SSL 协议中的数据压缩功能是可选的
D. :TLS 在功能和结构上与 SSL 完全相同
【单选题】
下面有关 MD5 的描述,不正确的是( )。
A. :是一种用于数字签名的算法
B. :得到的报文摘要长度为固定的 128 位
C. :输入以字节为单位
D. :用一个 8 字节的整数表示数据的原始长度
【单选题】
为保证计算机网络系统的正常运行,对机房内的三度有明确的要求。其三度是指( )。
A. :温度、湿度和洁净度
B. :照明度、湿度和洁净度
C. :照明度、温度和湿度
D. :温度、照明度和洁净度
【单选题】
为了提高电子设备的防电磁泄漏和抗干扰能力,可采取的主要措施是( )。
A. :对机房进行防潮处理
B. :对机房或电子设备进行电磁屏蔽处理
C. :对机房进行防静电处理
D. :对机房进行防尘处理
推荐试题
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto