【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
推荐试题
【判断题】
水生动物疫病传播途径包括水平传播和垂直传播。
A. 对
B. 错
【判断题】
细胞培养方法是从动物体内取出细胞或组织,模拟体内生理环境,在无菌、适温和丰富的营养条件下,使离体细胞或组织生存、生长并维持结构和功能的一门检测技术。
A. 对
B. 错
【判断题】
可通过观察水生动物典型临床症状,对水生动物疫病进行确诊。
A. 对
B. 错
【判断题】
很多动物病原感染都具有一定的靶器官,即病原在动物体内并非均匀分布。因此,采样要根据不同病原的靶器官或组织,有针对性地取样。
A. 对
B. 错
【判断题】
很多动物传染病都有季节性,尤其是水生动物,是否感染发病与水温密切相关,即只有在一定温度条件下才能检测到病原。因此,采样要选择合适的季节。
A. 对
B. 错
【判断题】
很多病原对动物具有明显的选择性,即只感染某种或某些动物。因此,要检测某种病原,需要选择特定的动物,即该病原的易感动物。
A. 对
B. 错
【判断题】
进境运输工具检疫时发现有我国规定禁止进境的动植物产品的,应予没收。
A. 对
B. 错
【判断题】
进境船舶在国内航行期间,可以启封动用海关在船上封存的物品。
A. 对
B. 错
【判断题】
进境的车辆,不论是否来自动植物疫区,均在入境口岸由口岸海关作防疫消毒处理。
A. 对
B. 错
【判断题】
对过境植物、动植物产品和其他检疫物,口岸海关检查运输工具或者包装,经检疫合格的,准予过境。
A. 对
B. 错
【判断题】
按照《进出境动植物检疫法》规定,进境供拆解用的废旧船舶,由口岸海关实施动植物检疫。
A. 对
B. 错
【判断题】
过境动物运达进境口岸时,进境口岸海关只需对动物进行临床检疫,经检疫合格的,准予过境。
A. 对
B. 错
【判断题】
装载过境植物、动植物产品和其他检疫物的运输工具或者包装物、装载容器有可能造成途中散漏,且无法采取密封措施的,不准过境。
A. 对
B. 错
【判断题】
口岸海关对来自动植物疫区的船舶、飞机、火车,可以登船、登机、登车实施现场检疫。
A. 对
B. 错
【判断题】
来自动植物疫区的船舶、飞机、火车,经检疫发现禁止进境的动植物、动植物产品和其他检疫物的,必须作熏蒸、消毒或者其他除害处理。
A. 对
B. 错
【判断题】
装载进境动植物、动植物产品和其他检疫物的车辆,经检疫发现病虫害的,其装载的货物无需一并作除害处理。
A. 对
B. 错
【判断题】
进境、过境运输工具在中国境内停留期间,交通员工和其他人员需要将所装载的动植物、动植物产品和其他检疫物带离运输工具,应当向口岸海关申报。
A. 对
B. 错
【判断题】
装载植物、动植物产品和其他检疫物出境的运输工具,装载前应当在口岸海关监督下进行消毒处理。
A. 对
B. 错
【判断题】
装运供应香港、澳门地区的蔬菜的回空车辆,无需作防疫消毒处理。
A. 对
B. 错
【判断题】
口岸海关对来自动植物疫区的船舶和船舶装载的动植物、动植物产品及其他检疫物,可以在锚地实施检疫。
A. 对
B. 错
【判断题】
《进出境动植物检疫法》里的进出境运输工具,是指用以载运人员、货物、物品进出境的各种船舶、车辆、航空器和驮畜。
A. 对
B. 错
【判断题】
我国淘汰的用于拆解的国际航行船舶(中国国籍)无需实施动植物检疫。
A. 对
B. 错
【判断题】
从事运输工具检疫除害处理业务的人员,须经直属海关核准。
A. 对
B. 错
【判断题】
口岸海关无权对来访的军舰登轮实施动植物检疫。
A. 对
B. 错
【判断题】
未装载动植物、动植物产品和其他检疫物的来自动植物疫区的运输工具,无需实施检疫。
A. 对
B. 错
【判断题】
在进境邮轮停靠期间,旅客下船游玩时可以携带水果等自用食品。
A. 对
B. 错
【判断题】
来自动植物疫区的船舶、飞机、火车,经检疫发现有禁止进境的动植物、动植物产品和其他检疫物的,海关必须进行封存或者销毁处理。
A. 对
B. 错
【判断题】
来自动植物疫区的进境运输工具经检疫或者经消毒处理合格后,运输工具负责人或者其代理人要求出证的,由海关签发《运输工具检疫证书》或者《运输工具消毒证书》。
A. 对
B. 错
【判断题】
享有外交、领事特权与豁免的外国机构和人员公用或者自用的动植物、动植物产品和其他检疫物进境,海关不予实施动植物检疫。
A. 对
B. 错
【判断题】
海关总署对向中国输出动植物产品的国外生产、加工、存放单位,实行注册登记制度。
A. 对
B. 错
【判断题】
输入动物产品和其他检疫物经检疫不合格的,由海关签发《检疫处理通知单》,通知货主或者其代理人作除害、退回或者销毁处理。经除害处理合格的,准予进境。
A. 对
B. 错
【判断题】
检疫证书是指动植物检疫机关出具的关于动植物、动植物产品和其他检疫物健康或者卫生状况的具有法律效力的文件,如《动物检疫证书》、《植物检疫证书》、《动物健康证书》、《兽医卫生证书》、《熏蒸/消毒证书》等。
A. 对
B. 错
【判断题】
入境的动植物及其产品报检时,在提供贸易合同、发票、产地证书的同时,还必须提供输出国家或地区官方的检疫证书;需办理入境检疫审批手续的,还应提供入境动植物检疫许可证。
A. 对
B. 错
【判断题】
输出动植物、动植物产品和其他检疫物的检疫依据包括输入国家或者地区和中国有关动植物检疫规定、双边检疫协定及贸易合同中订明的检疫要求等。
A. 对
B. 错
【判断题】
输出动物,出境前需经隔离检疫的,须在口岸海关指定的隔离场所检疫。
A. 对
B. 错
【判断题】
装载过境动物的运输工具、装载容器、饲料和铺垫材料,必须符合中国动植物检疫的规定。
A. 对
B. 错
【判断题】
《中华人民共和国进出境动植物检疫法》规定的"其它检疫物"的范围包括:动物疫苗、血清、诊断液、动植物性废弃物、动物精液等。
A. 对
B. 错
【判断题】
来自动植物疫区的船舶、飞机、火车,经检疫发现有禁止进境的动植物、动植物产品和其他检疫物的,海关必须进行封存或者销毁处理。
A. 对
B. 错
【判断题】
输出动植物、动植物产品和其他检疫物,由海关实施检疫,经检疫不合格又无有效方法作除害处理的,不准出境。
A. 对
B. 错
【判断题】
输入动物产品和其他检疫物经检疫不合格的,由海关签发《检疫处理通知单》,通知货主或者其代理人作除害、退回或者销毁处理。经除害处理合格的,准予进境。
A. 对
B. 错