【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
光辐射|_早期核武器
解析
暂无解析
相关试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
推荐试题
【判断题】
PING是DOS命令,一般用于检测网络通与不通 ,也叫时延,其值越大,速度越慢。
A. 对
B. 错
【判断题】
Ping向一个IP地址发送了一个ICMP回送命令,目的是确定是否存在到那个节点的网络连接。
A. 对
B. 错
【判断题】
PON不能承载传统的TDM业务,必须通过协议转换器实现
A. 对
B. 错
【判断题】
PON口的发光功率可以根据需求,通过命令调节发光功率大小,达到业务开通需求。
A. 对
B. 错
【判断题】
PON网络的建设中需要考虑分光器的供电方式。
A. 对
B. 错
【判断题】
QINQ与stacking 两种vlan 属性的在应用上是一样的,都是出去两层tag。
A. 对
B. 错
【判断题】
R307C01版本初始发货的默认支持的语音协议为H248,可以通过命令修改为SIP方式。
A. 对
B. 错
【判断题】
Radius+协议与Radius一样,采用Client/Server(客户机/服务器)结构,都通过UDP通讯,采用重传确认机制以确保接收
A. 对
B. 错
【判断题】
RARP协议的作用是寻找网络设备的硬件地址。
A. 对
B. 错
【判断题】
RC903-V35FE1的AIS红色闪烁表示远端E1接收到全“1”AIS告警(仅在E1成帧时有效)
A. 对
B. 错
【判断题】
RC903-V35FE1的LOS红色常亮表示远端E1接收信号丢失LOS告警(仅在E1成帧时有效)
A. 对
B. 错
【判断题】
RD4000 接收机可以直接储存测试数据
A. 对
B. 错
【判断题】
REG的作用是完成多条线路信号和多条支路信号的交叉。
A. 对
B. 错
【判断题】
R-LOS 告警与开销字节无关只是与输入的信号质量有关。
A. 对
B. 错
【判断题】
RTP是建立在TCP协议之上。
A. 对
B. 错
【判断题】
S8512交换机上在配置Y某些VLAN的透传时,本地无须创建需要透传的VLAN号,只要在端口上配置该vlan的透传数据即可
A. 对
B. 错
【判断题】
S9303在配置链路聚合时,如果本端配置手工负载分担模式,那么Y端设备也必须要配置手工负载分担模式
A. 对
B. 错
【判断题】
SC/PC(方口)光纤头插上单板时,没有方向性。
A. 对
B. 错
【判断题】
SDH采用了同步复用方式和灵活的映射结构,相比PDH设备节省了大量的复接/分接设备。
A. 对
B. 错
【判断题】
SDH传输设备中622M传输容量含有4个155M
A. 对
B. 错
【判断题】
SDH的传输产品TM、ADM、DXC,虽然各有特色,但均可组成自愈倒换环。
A. 对
B. 错
【判断题】
SDH的带宽利用率比PDH高。
A. 对
B. 错
【判断题】
SDH的帧速率是8000帧/秒,每个字节的速率也是8000帧/秒。
A. 对
B. 错
【判断题】
SDH光口信号码型是不加扰的NRZ码,采用世界统一的标准扰码。
A. 对
B. 错
【判断题】
SDH国标规定我国采用北美标准。
A. 对
B. 错
【判断题】
SDH国标规定我国采用欧洲标准。
A. 对
B. 错
【判断题】
SDH具有PDH无法比拟的优点,因而SDH不仅可以象PDH一样传输时钟信号,而且传送的质量更好。
A. 对
B. 错
【判断题】
SDH具有路由自动选择功能,上下电路方便,维护、控制、管理功能强,标准统一,便于传输更高速率的业务等优点
A. 对
B. 错
【判断题】
SDH全称叫做准同步数字传输体制
A. 对
B. 错
【判断题】
SDH设备的系统控制盘一旦被拔出会立即中断与网管的联系。
A. 对
B. 错
【判断题】
SDH网络通道保护是由双发选收功能实现的。
A. 对
B. 错
【判断题】
SDH线路码中有插入的冗余码。
A. 对
B. 错
【判断题】
SDH信号接入波分系统的时候需要经过波长转化。
A. 对
B. 错
【判断题】
SDH信号块状帧是以字节为单位的,每一字节是8bit。
A. 对
B. 错
【判断题】
SDH信号线路接口采用世界性统一标准规范
A. 对
B. 错
【判断题】
SDH自愈保护中,通常情况下通道倒换环使用共享保护,复用段倒换环使用专用保护。
A. 对
B. 错
【判断题】
SFU设备语音抓包命令为”#ont/system/net>mirror eth1 both 1”
A. 对
B. 错
【判断题】
SGSN和GGSN分开配置时,一个GGSN只能与一个SGSN连接。
A. 对
B. 错
【判断题】
SGSN与GGSN的功能既可以由一个物理节点全部实现,也可以在不同的物理节点上分别实现。
A. 对
B. 错
【判断题】
SmartClass 以太网测试仪,其功能包括了VLAN支持,以及QinQ支持等。
A. 对
B. 错