【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
推荐试题
【判断题】
生产经营单位可以将生产经营项目、场所、设备发包或者出租给不具备安全生产条件或者相应资质的单位或者个人,从事生产经营活动。
A. 对
B. 错
【判断题】
事故发生单位负责人接到事故报告后,应当立即启动事故相应应急预案,或者采取有效措施,组织抢救,防止事故扩大,减少人员伤亡和财产损失。
A. 对
B. 错
【判断题】
建设项目在竣工验收后,建设单位应当进行职业病危害控制效果评价。
A. 对
B. 错
【判断题】
应急预案的管理遵循综合协调、分类管理、分级负责、属地为主的原则。
A. 对
B. 错
【判断题】
任何单位和个人发现事故隐患,均有权向安全监管监察部门和有关部门报告。
A. 对
B. 错
【判断题】
企业一旦发生重大危险源事故,本企业抢险抢救力量不足,不必请求社会力量援助。
A. 对
B. 错
【判断题】
储存危险化学品的建筑必须安装通风设备,并注意设备的防护措施。
A. 对
B. 错
【判断题】
在炸药爆炸场所进行施救工作时,除了防止爆炸伤害外,还应注意防毒,以免造成中毒事故。
A. 对
B. 错
【判断题】
装卸易燃液体需穿防静电工作服。禁止穿带铁钉鞋。
A. 对
B. 错
【判断题】
道路交通事故、火灾事故自发生之日起7日内,事故造成的伤亡人数发生变化的,应当及时补报。
A. 对
B. 错
【判断题】
建筑之间的防火间距应按相邻建筑外墙的最近距离计算,如外墙有凸出的燃烧构件,应从其凸出部分外缘算起。
A. 对
B. 错
【判断题】
剧毒品应专库储存或存放在彼此间隔的单间内,还需安装防盗报警器,库门装双锁。
A. 对
B. 错
【判断题】
应按《常用化学危险品贮存通则》对危险化学品进行妥善贮存,加强管理。
A. 对
B. 错
【判断题】
在结构上尽量使几何形状不连续处缓和而平滑的过渡,以减少不连续应力。
A. 对
B. 错
【判断题】
流经心脏的电流越多、电流路线越短电击危险性越大。
A. 对
B. 错
【判断题】
安全生产行政执法人员、劳动者或者其近亲属、劳动者委托的代理人有权查阅、复印劳动者的职业健康监护档案。
A. 对
B. 错
【判断题】
凡确诊患有职业病的职工,可由企业决定是否享受国家规定的工伤保险待遇或职业病待遇。
A. 对
B. 错
【判断题】
危险化学品经营企业不得向未经许可从事危险化学品生产、经营活动的企业采购危险化学品,不得经营没有化学品安全技术说明书或者化学品安全标签的危险化学品。
A. 对
B. 错
【判断题】
工会依法参加事故调查处理,但无权向有关部门提出处理意见。
A. 对
B. 错
【判断题】
装卸易燃液体人员需穿防静电工作服。禁止穿带钉鞋。大桶不得在水泥地面滚动。桶装各种氧化剂不得在水泥地面滚动。
A. 对
B. 错
【判断题】
各级人民政府应当组织开展经常性的消防宣传教育,提高公民的消防安全意识。
A. 对
B. 错
【判断题】
生产经营单位发生事故后,应当及时启动应急预案,组织有关力量进行救援,不必将事故信息及应急预案启动情况报告安全生产监督管理部门和其他负有安全生产监督管理职责的部门。
A. 对
B. 错
【判断题】
散装储存是将物品装于小型容器或包件中储存;整装储存是物品不带外包装的净货储存。
A. 对
B. 错
【判断题】
为了防止膨胀导致容器破裂,对盛装易燃液体的容器,夏天要储存于阴凉处或用喷淋冷水降温的方法加以防护。
A. 对
B. 错
【判断题】
易燃气体、不燃气体和有毒气体要分别专库储藏。
A. 对
B. 错
【判断题】
开展安全标准化是企业的自主行为,不需要政府或其他有关部门的监督与考核。
A. 对
B. 错
【判断题】
在任何情况下,安全生产监督管理部门和负有安全生产监督管理职责的有关部门不可以越级上报事故情况。
A. 对
B. 错
【判断题】
危险物品的生产、经营、储存单位,应当设置安全生产管理机构或者配备兼职安全生产管理人员。
A. 对
B. 错
【判断题】
危险化学品经营许可证是从事危险化学品的采购、调拨、销售活动的合法凭证。
A. 对
B. 错
【判断题】
压力容器,可由没有制造许可证的专业单位制造。
A. 对
B. 错
【判断题】
外力除去后构件恢复原有的形状,即变形随外力的除去而消失,这种变形称为塑性变形。
A. 对
B. 错
【判断题】
为了有利于静电的泄露,可采用静电导电性工具。
A. 对
B. 错
【判断题】
静电事故多发生在潮湿的季节。
A. 对
B. 错
【判断题】
从事使用高毒物品作业的用人单位,应当配备专职的或者兼职的职业卫生医师和护士;不具备配备专职的或者兼职的职业卫生医师和护士条件的,应当与依法取得资质认证的职业卫生技术服务机构签订合同,由其提供职业卫生服务。
A. 对
B. 错
【判断题】
使用有毒物品作业的用人单位应当按照国务院卫生行政部门的规定,定期对使用有毒物品作业场所职业中毒危害因素进行检测、评价。
A. 对
B. 错
【判断题】
职业性危害因素所致职业危害的性质和强度取决于危害因素的本身理化性能。
A. 对
B. 错
【判断题】
申请易制毒化学品运输许可,应当提交易制毒化学品的购销合同,货主是企业的,应当提交营业执照;货主是其他组织的,应当提交登记证书(成立批准文件);货主是个人的,应当提交其个人身份证明。经办人还应当提交本人的身份证明。
A. 对
B. 错
【判断题】
生产经营单位风险种类多、可能发生多种事故类型的,可以不用编制本单位的综合应急预案。
A. 对
B. 错
【判断题】
危险化学品可以露天堆放,但应符合防火、防爆的安全要求。爆炸物品、一级易燃物品、遇湿燃烧物品、剧毒物品不得露天堆放。
A. 对
B. 错
【判断题】
危险化学品运输企业必须具备的条件由国务院交通部门规定。
A. 对
B. 错