【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
【单选题】
以下关于数据处理的叙述中,不正确的足___。
A. :数据处理不仅能预测不久的未来,自时还能影响未
B. :数据处理和数据分析可以为决策提供真知灼见
C. :数据处理的重点应从技术角度去发现和解释数据蕴涵的意义
D. :数据处理足从现实世界到数据,冉从数据到现实世界的过程
推荐试题
【单选题】
电磁力的大小与导体的有效长度成___。
A.  反比  
B.  正比
C.  不变
【单选题】
单极型半导体器件是()。___
A.  二极管
B.  双极性二极管
C.  场效应管
【单选题】
()仪表由固定的永久磁铁,可转动的线圈及转轴、游丝、指针、机械调零机构等组成。___
A.  电磁式
B.  磁电式
C.  感应式
【单选题】
测量电动机线圈对地的绝缘电阻时,摇表的“L”、“E”两个接线柱应()。 ___
A.  “E”接在电动机出线的端子,“L”接电动机的外壳
B.  “L”接在电动机出线的端子,“E”接电动机的外壳
C.  随便接,没有规定
【单选题】
万用表实质是是一个带有整流器的()仪表。___
A.  电磁式
B.  磁电式
C.  电动式
【单选题】
非自动切换电器是依靠()直接操作来进行工作的。  ___
A.  外力(如手控)
B.  电动
C.  感应
【单选题】
低压熔断器,广泛应用于低压供配电系统和控制系统中,主要用于()保护,有时也可用于过载保护。___
A.  短路
B.  速断
C.  过流
【单选题】
电流继电器使用时其吸引线圈直接或通过电流互感器()在被控电路中。___
A.  并联
B.  串联
C.  串联或并联
【单选题】
在采用多级熔断器保护中,后级的熔体额定电流比前级大,目的是防止熔断器越级熔断而()。   ___
A.  减小停电范围
B.  查障困难
C.  扩大停电范围
【单选题】
电容器在用万用表检查时指针摆动后应该()。___
A.  保持不动
B.  逐渐回摆
C.  来回摆动
【单选题】
避雷针是常用的避雷装置,安装时,避雷针宜设独立的接地装置,如果在非高电阻率地区,其接地电阻不宜超过()Ω。 ___
A.  4
B.  2
C.  10
【单选题】
为避免高压变配电站遭受直击雷,引发大面积停电事故,一般可用()来防雷。___
A.  接闪杆
B.  阀型避雷器
C.  接闪网
【单选题】
对于低压配电网,配电容量在100KW以下时,设备保护接地的接地电阻不应超过()Ω。___
A.  6
B.  10
C.  4
【单选题】
()可用于操作高压跌落式熔断器、单极隔离开关及装设临时接地线等。 ___
A.  绝缘手套
B.  绝缘鞋
C.  绝缘棒
【单选题】
登杆前,应对脚扣进行()。___
A.  人体载荷冲击试验
B.  人体静载荷试验
C.  人体载荷拉伸试验
【单选题】
一般情况下220V工频电压作用下人体的电阻为()Ω。___
A.  500-1000
B.  800-1600
C.  1000-2000
【单选题】
保护线(接地或接零线)的颜色按标准应采用()。___
A.  红色
B.  蓝色
C.  黄绿双色
【单选题】
低压断路器也称为()。___
A.  闸刀
B.  总开关
C.  自动空气开关
【单选题】
热继电器的整定电流为电动机额定电流的()%。___
A.  120
B.  100
C.  130
【单选题】
星-三角降压启动,是起动时把定子三相绕组作()联结。___
A.  三角形
B.  星形
C.  延边三角形
【单选题】
对电机内部的脏物及灰尘清理,应用()。___
A.  布上沾汽油、煤油等抹擦
B.  湿布抹擦
C.  用压缩空气吹或用干布抹擦
【单选题】
对电机各绕组的绝缘检查,如测出绝缘电阻为零,在发现无明显烧毁的现象时,则可进行烘干处理,这时()通电运行。___
A.  允许
B.  不允许
C.  烘干好后就可
【单选题】
事故照明一般采用()。___
A.  日光灯
B.  白炽灯
C.  高压汞灯
【单选题】
螺口灯头的螺纹应与()相接。___
A.  相线
B.  零线
C.  地线
【单选题】
在电路中,开关应控制()。 ___
A.  零线
B.  相线
C.  地线
【单选题】
电气火灾的引发是由于危险温度的存在,危险温度的引发主要是由于()。___
A.  电压波动
B.  设备负载轻
C.  电流过大
【单选题】
低压带电作业时,()。___
A.  既要戴绝缘手套,又要有人监护
B.  戴绝缘手套,不要有人监护
C.  有人监护不必戴绝缘手套
【单选题】
纯电容元件在电路中()电能。___
A.  储存
B.  分配
C.  消耗
【单选题】
三相四线制的零线的截面积一般()相线截面积。___
A.  小于
B.  大于
C.  等于
【单选题】
交流10kV母线电压是指交流三相三线制的()。___
A.  线电压
B.  相电压
C.  线路电压
【单选题】
钳形电流表是利用()的原理制造的。___
A.  电压互感器
B.  电流互感器
C.  变压器
【单选题】
测量电压时,电压表应与被测电路()。___
A.  串联
B.  并联
C.  正接
【单选题】
低压电器按其动作方式又可分为自动切换电器和()电器。___
A.  非自动切换
B.  非电动
C.  非机械
【单选题】
交流接触器的电寿命是约为机械寿命的()倍。___
A.  1
B.  10
C.  1/20
【单选题】
铁壳开关在作控制电机启动和停止时,要求额定电流要大于或等于()倍电动机额定电流。 ___
A.  一
B.  两
C.  三
【单选题】
行程开关的组成包括有()。___
A.  保护部分
B.  线圈部分
C.  反力系统
【单选题】
电容器组禁止___。
A.  带电合闸
B.  带电荷合闸
C.  停电合闸
【单选题】
静电引起爆炸和火灾的条件之一是()。___
A.  静电能量要足够大
B.  有爆炸性混合物存在
C.  有足够的温度
【单选题】
运输液化气,石油等的槽车在行驶时,在槽车底部应采用金属链条或导电橡胶使之与大地接触,其目的是___。
A.  中和槽车行驶中产生的静电荷
B.  泄漏槽车行驶中产生的静电荷
C.  使槽车与大地等电位
【单选题】
建筑施工工地的用电机械设备()安装漏电保护装置。___
A.  应  
B.  不应
C.  没规定