【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
推荐试题
【填空题】
21140.___气动技术的最终目的是利用压缩空气来驱动不同的机械装置。
【填空题】
21141.___为保证齿轮传动的平稳性应同时限制基节偏差与齿形误差。
【填空题】
21142.___为使零件的几何参数具有互换性,必须把零件的加工误差控制在给定的范围内。
【填空题】
21143.___公差可以说是允许零件尺寸的最大偏差。
【填空题】
21144.___数控机床在手动和自动运行中,一旦发现异常情况,应立即使用紧急停止按钮。
【填空题】
21145.___当进行螺纹切削时,如果编码器反馈信号断开,则会出现主轴停止,进给继续的故障。
【填空题】
21146.___基孔制配合要求孔的精度高,基轴制配合要求轴的精度高。
【填空题】
21147.___“进给保持”的意思是按给定的进给速度保持进给运动。
【填空题】
21148.___机床的操练、调整和修理应有经验或受过专门训练的人员进行。
【填空题】
21149.___对一般的紧固螺纹来说,螺栓的作用中径应小于或等于螺母的作用中径。
【填空题】
21150.___定位公差带具有确定的位置,但不具有控制被测要素的方向和形状的职能。
【填空题】
21151.___定向公差带相对于基准有确定的方向,并具有综合控制被测要素的方向和形状的能力。
【填空题】
21152.___形状误差包含在位置误差之中。
【填空题】
21153.___建立基准的基本原则是基准应符合最小条件。
【填空题】
21154.___绘制齿轮工作图时,必须在齿轮的三个公差组中各选一个检验项目组标在齿轮图样上。
【填空题】
21155.___同一个齿轮的齿距累积误差与其切向综合误差的数值是相等的。
【填空题】
21156.___在外圆车削加工时,背吃刀量等于待加工表面与已知加工表面间的距离。
【填空题】
21157.___数控机床驱动主要采用交流驱动,是因为交流电机比直流电机调速性能好。
【填空题】
21158.___齿轮加工时的进给运动为齿轮坯的啮合转动。
【填空题】
21159.___主运动、进给运动和切削深度合称为切削量的三要素。
【填空题】
21160.___进给量越大,则切削厚度越大。
【填空题】
21161.___作业分析是对某项具体工序进行的分析,最小单位是操作。
【填空题】
21162.___刀具切削部分最前面的端面称为前刀面。
【填空题】
21163.___主偏角即主刀刃偏离刀具中心线的角度。
【填空题】
21164.___前角即前面与基面间的夹角,在切削平面内测量。
【填空题】
21165.___刀尖在刀刃的最高位置时,刃倾角为正。
【填空题】
21166.___直流伺服电动机上的转子电流的换向位置由专门的检测器检测获得。
【填空题】
21167.___钨系高速钢中最主要的成分是钨。
【填空题】
21168.___YG3 比 YG6 更适宜于铸件的粗加工。
【填空题】
21169.___为确保机床参考点的精度,数控系统常采用寻找编码器每转一个的零位电脉冲信号,并且寻找速度要低,例如 30mm/min。
【填空题】
21170.___高性能高速钢之所以具有高性能,主要是因为它们的钨含量高。
【填空题】
21171.___根据资源特点,铝高速钢比钴高速钢更适合于我国国情。
【填空题】
21172.___数控机床在没有回参考点的方式下,能够实现软限位保护。
【填空题】
21173.___半闭环和全闭环位置反馈系统的根本差别在于位置传感器安装的位置不同,半闭环的位置传感器安装在工作台上,全闭环的位置传感器安装在电机的轴上。
【填空题】
21174.___陶瓷刀具硬度高,但脆性大,所以一般不宜用于粗重加工。
【填空题】
21175.___ROM 中的信息在断电时可由电池维持。
【填空题】
21176.___就四种切屑基本形态相比较,形成带状切屑时切削过程最平稳。
【填空题】
21177.___立式加工中心的自动换刀动作是这样完成的:换刀指令经 CNC-CPU 译码后,由轴控制器___控制完成。
【填空题】
21178.___积屑瘤的存在对切削过程总是有害的,所在地以要尽力消除它。
【填空题】
21179.___切削振动只会影响切削过程平稳性,而不会影响已加工表面质量。