【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
推荐试题
【单选题】
(36203)使用电动工具,必须绝缘良好并有接地或接零措施,作业灯的电压不得超过___。(1.0分)
A. 34V
B. 35V
C. 36V
D. 37V
【单选题】
(36204)在滑车组,动滑轮上绕过的绳子根数为4根,则绳子要走___,起吊的重物才能移动1m。(1.0分)
A. 1m
B. 2m
C. 3m
D. 4m
【单选题】
13/9957.(36205)进行桥址三角网测量时的基线一般有___。(1.0分)
A. 一条
B. 二条
C. 三条
D. 四条
【单选题】
(36206)___不能检查出松动的高强度螺栓。(1.0分)
A. 目视法
B. 金属探伤法
C. 敲击法
D. 扭矩测定法
【单选题】
(36207)钢梁上下顺弯曲矢度不应小于跨度的___。(1.0分)
A. 1/500
B. 1/1000
C. 1/1500
D. 1/2000
【单选题】
(36208)单根抽换桥枕新桥枕面与轨底间铺上防磨胶垫厚度不得大于___。(1.0分)
A. 6mm
B. 8mm
C. 10mm
D. 12mm
【单选题】
(36209)梁跨及墩台的病害往往首先反映在___的变化上。(1.0分)
A. 梁身裂纹
B. 墩台裂纹
C. 支座位移
D. 轨道变形
【单选题】
(36210)单根抽换桥后,桥枕与护木的连接应密贴,间隙不大于___。(1.0分)
A. 6mm
B. 4mm
C. 3mm
D. 2mm
【单选题】
(36211)离心力与列车竖向动力作用同时计算时,制动力或牵引力应按列车竖向静活载的___计算。(1.0分)
A. 7%
B. 10%
C. 12%
D. 15%
【单选题】
(36212)常温常压下,___在0℃~100℃范围内可出现固、液、气三态变化。(1.0分)
A. 水
B. 机油
C. 柴油
D. 液压油
【单选题】
(36213)预应力混凝土梁,横隔板裂纹宽度不超过___。(1.0分)
A. 0.1mm
B. 0.2mm
C. 0.3mm
D. 0.4mm
【单选题】
(36215)使用过的钢丝绳在使用前也要每___做直径、长度、磨损程度、断丝数检查。(1.0分)
A. 30m
B. 35m
C. 40m
D. 40m
【单选题】
(36217)熬制热沥青时,温度达到___时,应停止加热升温。(1.0分)
A. 175℃
B. 170℃
C. 160℃
D. 150℃
【单选题】
(36218)使用手工焊,平面焊接时焊条与焊件的间距一般为___。(1.0分)
A. 7~9mm
B. 5~7mm
C. 2~3mm
D. 3~5mm
【单选题】
(36219)半细料石上、下、左、右的表面凹入深度不得超过___。(1.0分)
A. 1.5cm
B. 1.0cm
C. 0.7cm
D. 0.2cm
【单选题】
(36220)搭设枕木垛,如需枕木接长,每端至少搭接___。(1.0分)
A. 1.2m
B. 1.0m
C. 0.8m
D. 0.5m
【单选题】
(36221)混凝土强度不足的原因可能是___。(1.0分)
A. 模板润湿不够
B. 模板不严密
C. 掺入外加剂
D. 振捣不实
【单选题】
(36222)大体积混凝土施工如采用表面振捣,分层厚度不应超过___。(1.0分)
A. 200mm
B. 150mm
C. 250mm
D. 300mm
【单选题】
(36223)木模板所用木材的规格与___无关。(1.0分)
A. 结构构件截面尺寸
B. 结构构件截面部位
C. 模板材质
D. 浇筑混凝土时模板受力在大小
【单选题】
(36224)简支梁的温度跨度是按一孔梁的固定支座到相邻固定支座或___挡砟墙间的距离计算。(1.0分)
A. 桥头
B. 梁端
C. 墩台
D. 桥台
【单选题】
(36225)千斤顶构造分类中,没有___千斤顶。(1.0分)
A. 螺旋式
B. 轴式
C. 液压式
D. 齿条式
【单选题】
(36226)___不是于钢丝绳的优点。(1.0分)
A. 自重大
B. 强度高
C. 耐磨损
D. 弹性大
【单选题】
(36227)钢梁涂料在使用前应充分搅拌,使用搅拌机时,搅拌时间一般不小于___。(1.0分)
A. 8min
B. 10min
C. 12min
D. 15min
【单选题】
(36228)隧道衬砌腐蚀总深度超过原衬砌实有厚度的2/3,其面积不足该段边墙或拱部表面积的___时,可以考虑采取局部镶补或翻修。(1.0分)
A. 40%
B. 50%
C. 60%
D. 70%
【单选题】
(36229)带传动是依靠传动带与带轮之间的___来传动的。(1.0分)
A. 作用力
B. 张紧力
C. 摩擦力
D. 弹力
【单选题】
(36230)机械启动时,启动马达转速低的原因是___。(1.0分)
A. 引擎故障
B. 燃料过滤器堵塞
C. 电瓶不良
D. 进气阀的气流孔堵塞
【单选题】
(36231)辊轴的实际纵向位移是活动支座轴承座中心线与底板中心线间距离的___。(1.0分)
A. 1/4
B. 1/3
C. 1/2
D. 1
【单选题】
(36232)当河面结冰时,应采用___计算每一垂线上的平均流速。(1.0分)
A. 二点法
B. 三点法
C. 五点法
D. 六点法
【单选题】
(36233)当隧道衬砌总腐蚀厚度大于10cm时,宜采用___进行修补。(1.0分)
A. 抹补法
B. 补筑法
C. 喷补法
D. 镶补法
【单选题】
(36234)桥梁承受的特殊荷载是指船只或排筏对桥墩的碰撞力和___等。(1.0分)
A. 车辆重量
B. 地震力
C. 冲击力
D. 离心力
【单选题】
(36235)隧道衬砌腐蚀类型不包括___。(1.0分)
A. 水蚀
B. 火蚀
C. 烟蚀
D. 冻蚀
【单选题】
(36236)最冷月平均气温低于___的严寒地区,只要确定冬季有水,其水沟均应采取防寒措施。(1.0分)
A. -10℃
B. -15℃
C. -20℃
D. -25℃
【单选题】
(36237)简支梁的温度调节器应安装在___附近。(1.0分)
A. 桥头
B. 梁的中部
C. 固定支座
D. 活动支座
【单选题】
(36238)矿渣硅酸盐水泥的特征有___。(1.0分)
A. 水化热较小
B. 早期强度低
C. 耐热性较差
D. 抗冻性较好
【单选题】
(36239)根据运营经验,排水沟底部或疏水盲沟中心深度应在隧道铺底或仰拱底面以下至少___。(1.0分)
A. 0.2m
B. 0.3m
C. 0.4m
D. 0.5m
【单选题】
(36240)对于后张法预应力混凝土梁,当张拉钢丝时,同一构件截面内断丝数不得超过该截面钢丝总数的___。(1.0分)
A. 1%
B. 2%
C. 3%
D. 5%
【单选题】
(36241)对于先张法预应力混凝土梁,当张拉预应力粗钢筋时,每一截面允许出现的断丝数为___。(1.0分)
A. 1%
B. 2%
C. 3%
D. 不允许
【单选题】
(36242)测深钢卷尺对尺带宽度、尺带厚度、刻线长度、各长度范围内的___均有严格规定。(1.0分)
A. 测量标准
B. 尺寸限度
C. 精度等级
D. 允许误差
【单选题】
(36243)当隧道衬砌总腐蚀厚度小于10cm时,宜采用___进行修补。(1.0分)
A. 抹补法
B. 补筑法
C. 喷补法
D. 镶补法
【单选题】
(36244)桥梁护岸防护加固的迎水面边坡,当不经常浸水时用___坡度。(1.0分)
A. 1:1
B. 1:05
C. 1:1.5
D. 1:20