【单选题】
以下哪个响应码表示服务器不支持代理功能( )。___
A. 5.01
B. 5.03
C. 5.05
D. 5.07
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
eDRX周期最大为( )小时。___
A. 2.21
B. 2.56
C. 2.92
D. 3.15
【单选题】
以下哪个报文需要可靠传输( )。___
A. CON
B. NON
C. ACK
D. RST
【单选题】
以下哪种组织结构同时具备了职能型和项目型的特点。___
A. 职能型组织
B. 矩阵型组织
C. 项目型组织
D. 紧密型组织
【单选题】
挣值管理综合考虑项目的( )指标。___
A. 范围、进展、资源绩效
B. 范围、进度、项目绩效
C. 范围、进展、项目绩效
D. 范围、进度、资源绩效
【单选题】
如果一个工作的动作估计花费成本1,500美元,这个工作今天结束,但是却花费了1,350美元而且只完成了三分之二,那么成本偏离是( )。___
A. +150美元
B. -150美元
C. -350美元
D. -500美元
【单选题】
你项目的一项较大的范围变更改变了经你核准通过的成本基线。下一步你应该怎么做。___
A. 评估范围变更的幅度
B. 发布更新的预算
C. 制作学到的经验教训的说明文件
D. 执行得到通过的范围变更
【单选题】
产品分析技术不包括( )。___
A. 价值工程
B. 价值分析
C. 系统分析
D. 物料分析
【多选题】
ASON网络一般支持的业务连接等级包括___
A. 专用连接(1+1和1:1)
B. 共享保护(1:N和M:N)
C. 不保护(在主用电路上传送)
D. 不保护业务(在保护电路上传送)
【多选题】
以下属于SDH紧急告警的是___
A. LOS
B. LOF
C. TU-AIS
D. AU-AIS
【多选题】
目前GPON技术可以承载哪些业务?___
A. TDM
B. Ethernet
C. FDDI
D. ATM
【多选题】
对于OTN系统,开销包括以下哪___种
A. TCMi
B. ODUK
C. OTUK
D. B1
【多选题】
OTN系统定义了3层网络结构,他们是___
A. OCH
B. OMS
C. OTS
D. OTM
【多选题】
烽火OTN系列目前有哪几种型号的设备___
A. FONST 3000
B. FONST 4000
C. FONST 5000
D. FONST 6000
【多选题】
目前PON网络主要由___组成
A. OLT
B. ONU
C. ODN
D. ODT
【多选题】
请选择误码产生的原因___
A. 各种噪声源;
B. 色散引起的码间干扰;
C. 定位抖动产生的误码;
D. SDH设备本身产生的误码;
【多选题】
ONU主要完成的功能有___
A. 选择接收OLT发送的广播数据
B. 响应OLT发出的测距及功率控制命令,并作相应的调整
C. 对用户的以太网数据进行缓存,并在OLT分配的发送窗口中向上行方向发送
D. 其它相关的以太网功能
【多选题】
以下哪种情况会造成PON下的所有ONU故障:___。
A. PON口至分光器的光缆中断;
B. PON口下某个分光器至ONU的光缆中断;
C. PON口下的某个ONU长发光;
D. PON所在单板故障;
【多选题】
GPON的三大优势是什么___
A. 分光特性
B. 更高的带宽:对每用户下行2.5G/上行1.25G
C. 更高的带宽:对每用户下行1.25G/上行1.25G
D. 更远的传输距离:采用光纤传输,接入层的覆盖半径20KM.
【多选题】
造成PON口下所有ONU 都无法上线的原因有___
A. (主干)光纤存在较大弯曲。
B. (主干)光纤使用了多模光纤。
C. (主干)光纤存在不同类型光纤接头对接。
D. (主干)光纤连接器端口脏。
【多选题】
EPON的特点有___
A. 点对多点的结构
B. 可以同时提供宽带业务和语音业务
C. 采用单纤波分复用技术
D. 局端与用户之间仅有光纤、光分路器等光无源器件
【多选题】
OLT GPON用CVLANLEARN模式的SVLAN时,根据以下___要素进行寻址转发
A. SVLAN
B. CVLAN
C. PBIT
D. MAC
【多选题】
目前中国移动对PON接入网络主要定位于___客户?
A. 家庭客户
B. 2G/3G基站
C. 对QoS要求不高的普通集团客户
D. 大中型企业客户
【多选题】
华为PON产品MA5616可以提供___ 的接入
A. VDSL
B. 宽带
C. 语音或POTS
D. ADSL
【多选题】
CM-IMS接入设备主要包括___
A. IAD
B. AG
C. IPPBX
D. SIP GW
【多选题】
在MPLS VPN组网中,以下标签分发协议能够为“私网”信息分配标签的是___。
A. BGPv4
B. BGP+
C. MBGP
D. LDP
【多选题】
关于MPLS二层VPN下列说法正确的是___。
A. CCC方式的MPLS标签是采用LDP分发
B. SVC方式的MPLS标签是采用MBGP分发
C. Martini方式的MPLS标签是采用LDP分发
D. Kompella方式的MPLS标签是采用MBGP分发
【多选题】
对于 OLT 与业务接入控制层设备的对接,可采用如下原则___。
A. 当 OLT 采用 10GE 口上连时,建议 OLT 直连 BRAS/SR
B. OLT 直连 BRAS/SR时,跨机房链路优选 WDM,同机房链路采用光纤直连
C. 当 OLT 采用 GE 口上连时,通过汇聚交换机或 PTN 进行汇聚后接入 BRAS/SR
D. 汇聚交换机与 BRAS/SR 的连接优先采用 WDM,同机房链路采用光纤直连
【多选题】
OTN网络子网交叉分分层包括以下哪些选项___
A. OCH光通道
B. ODUK通道
C. 子业务
D. OTS
【多选题】
某OTN网络FONST3000设备业务支路盘8TDGS与线路盘LMS2E进行业务配置,当需要创建一条GE业务时,8TDGS盘port口业务类型不可以选用___
A. OTU1_ODU0
B. OTU1
C. X.OTU1_OPTS
D. ODU0
【多选题】
SDH设备可配置成TM网元,它的特点是___
A. 所有光方向到TM的业务必须落地;
B. 只能有一个光方向;
C. 不同光方向的业务不能通过光板直接穿通;不同光方向的业务
D. 光板的最高速率必须低于622M。
【多选题】
IP承载网规定,PE-CE间可以采用___路由协议
A. OSPF路由协议
B. EBGP路由协议
C. 静态路由协议
D. IS-IS路由协议
【多选题】
以下不属于公有地址的网段是___
A. 10.0.0.0/8
B. 172.16.0.0/12
C. 192.168.0.0/16
D. 127.0.0.0/8
【多选题】
在ASON中,控制平面具有的功能包括___。
A. 邻居发现
B. 路由(拓朴发现)
C. 信令
D. 本地资源管理
【多选题】
关于PWE3技术,说法正确的是___
A. 端到端的业务仿真技术
B. 该技术在PSN网络上能够完美再现各种电信网络业务的特点
C. 在包交换网络中搭建一个“通道”以实现业务的仿真及传送
D. 主要用来承载语音业务
【多选题】
目前PTN技术采用的两大技术标准是___
A. PBB
B. PBT
C. MPLS
D. T-MPLS\MPLS-TP
【多选题】
SDN的典型架构分为哪三层?___
A. 应用层
B. 控制层
C. 基础设施层
D. 网络层
【多选题】
IP访问控制列表有哪两项途径?___
A. ACL可控制主机对莫一网络或者另一台主机的访问
B. 标准ACL可限制对特定应用程序和端口的访问
C. ACL提供基本的网络访问安全性
D. ACL只可应用于一个接口
【多选题】
一个网段150.25.0.0的子网掩码是255.255.224.0,___是有效的主机地址
A. 150.25.0.0
B. 150.25.16.255
C. 150.25.2.24
D. 150.15..30
【多选题】
同一个备份组内 活动路由器,备份路由器各为多少?___
A. 活动路由器 1 个,备份路由器1个
B. 活动路由器 多个,备份路由器 多个
C. 活动路由器 1 个,备份路由器多个
D. 活动路由器多个,备份路由器多个
【多选题】
短信专线开通测试中,短信下发端到端成功率应___,彩信下发端到端成功率应( )
A. ≥80%
B. ≥90%
C. ≥95%
D. ≥99%
推荐试题
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports