【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
【单选题】
以下关于数据处理的叙述中,不正确的足___。
A. :数据处理不仅能预测不久的未来,自时还能影响未
B. :数据处理和数据分析可以为决策提供真知灼见
C. :数据处理的重点应从技术角度去发现和解释数据蕴涵的意义
D. :数据处理足从现实世界到数据,冉从数据到现实世界的过程
【单选题】
“互联网十制造”是实施《中国制造2025》的重要措施。以下对“互联网十制造”主要特征的叙述中,不正确的是___。
A. :数字技术得到普遍应用,设计和研发实现协同与共享
B. :通过系统集成,打通整个制造系统的数据流、信息流
C. :企业生产将从以用户为中心向以产品为中心转型
D. :企业、产品和用户通过网络平台实现联接和交互
【单选题】
信息技术对传统教育方式带来了深刻的变化。以下叙述中,不正确的是___。
A. :学习者可以克服时空障碍,实现随时、随地、随愿学习
B. :给学习者提供宽松的、内容丰富的、个性化的学习环境
C. :通过信息技术与学科教学的整合,激发学生的学习兴趣
D. :教育信息化的发展使学校各学科全部转型为电子化教育
【单选题】
厂参加技能考核的女工有___人。
A. :16
B. :18
C. :20
D. :24
【单选题】
(a+b-|a-b|)/2=___。
A. :a
B. :b
C. : min (a,b)
D. :max (a,b)
【单选题】
在信息收集过过程中,需要根据项目的目标把握数据___要求,既不要纳入过多无关的数据,也不要短缺主要的数据:既不要过于简化,也不要过于繁琐。
A. :适用性
B. :准确性
C. :安全性
D. :及时性
【单选题】
许多企业常把大量暂时不用的过期数据分类归档转存于___中。
A. :ROM
B. :移动硬盘
C. :cache
D. :RAM
【单选题】
信息传递的三个基本环节中,信息接收者称为___。
A. :信源
B. :信道
C. :信标
D. :信宿
推荐试题
【判断题】
客户申请开立惠农卡时,网点可根据申请人身份证登记住址判断农户身份
A. 对
B. 错
【判断题】
办理联名账户时,全体联名人都要签订《个人联名存款账户管理协议》
A. 对
B. 错
【判断题】
委托单位代发工资款项应可来源于其一般存款账户
A. 对
B. 错
【判断题】
对于代理人办理需联网核查的业务,应同时对代理人和被代理人进行核查,其中对代理人须进行人行核查
A. 对
B. 错
【判断题】
单笔超过1000万元(含)的大额资金划转业务,属于正常的工作发放、缴纳个税与费、向财政支付、集团客户账户间资金归集等支付的,可以不换人审核
A. 对
B. 错
【判断题】
金融机构存放同业资金、财政预算外资金、单位银行卡备用金存款人可以申请开立专用存款账户
A. 对
B. 错
【判断题】
因收入汇缴资金和业务支出资金开立的专用存款账户,应使用隶属单位的名称
A. 对
B. 错
【判断题】
独立核算的附属机构开立基本账户,应出具其主管部门的基本存款账户开户登记证和批文
A. 对
B. 错
【判断题】
存款人日常经营活动的资金收付及其工资、奖金和现金的支取,应通过基本账户办理
A. 对
B. 错
【判断题】
临时存款账户用于办理临时机构以及存款人临时经营活动发生的资金收付
A. 对
B. 错
【判断题】
注册验资账户的资金汇缴人应与出资人的名称一致
A. 对
B. 错
【判断题】
未获得工商行政管理部门核准登记的单位,在验资期满后,应向银行申请撤销注册验资临时存款账户,其账户资金应退还给验资人
A. 对
B. 错
【判断题】
注册验资资金以现金方式存入,出资人需提取现金的,应出具缴存现金时的现金缴款单原件及其有效身份证件
A. 对
B. 错
【判断题】
所有存款人在申请开立单位银行结算账户时,其申请开立的账户名称、出具的开户证明文件上记载的存款人名称以及预留银行签章中公章或财务专用章的名称应必须保持一致
A. 对
B. 错
【判断题】
银行结算账户按存款人分为单位银行结算账户和单位非活期存款账户
A. 对
B. 错
【判断题】
结算印章应严格按照规定的范围使用,不得预先在空白凭证上加盖
A. 对
B. 错
【判断题】
空白票据出售时应在每张支票上加盖本行行名和存款人账号,业务繁忙时可交由开户单位自填
A. 对
B. 错
【判断题】
结算账户撤销时,要求客户将未用的空白票据交回银行;客户未按规定交回的,要求其出具有关证明,造成损失的,由客户和银行共同承担
A. 对
B. 错
【判断题】
票据提入时,应检查提入票据专用袋的完整性,清点提入票据专用袋总数是否正确,核对无误后办理交接手续
A. 对
B. 错
【判断题】
账户资料扫描是指未在BOS处理,但需要留存影像资料的账户类业务,可以通过“待核销过渡凭证查询补打”功能进行扫描,例如单位借记卡开、销户,不动户销户等
A. 对
B. 错
【判断题】
账户业务资料是指账户业务办理过程中所需的各种凭证资料的统称
A. 对
B. 错
【判断题】
客户回单查询提供按业务序号精确查询或按应用、业务种类、日期等条件组合模糊查询业务信息,包括业务详细信息、资料清单信息、资料清单影像及补扫描功能
A. 对
B. 错
【判断题】
存款人遗失密码的,应持其开户时需要出具的证明文件和基本存款账户开户许可证到中国人民银行当地分支行申请重置密码
A. 对
B. 错
【判断题】
柜员通过集中作业平台开立账户时,应通过多头账户检查交易查询客户在农行系统开立基本户和一般户的情况,按规定判定能否开立账户
A. 对
B. 错
【判断题】
NEWBOS核准前销户业务,清息交易产生的清息回单如果未打印,可以通过账户业务回单查询打印交易补打
A. 对
B. 错
【判断题】
预占账号是指网点受理业务信息完成后,即可生成客户预开账号类型的账号
A. 对
B. 错
【判断题】
新开账户必须先在BoEing建立客户信息,然后才能在NEWBOS做核准前开户交易
A. 对
B. 错
【判断题】
网点办理核准前开户业务,必须由主管指纹授权才能提交
A. 对
B. 错
【判断题】
票面要素审验。包括票据是否是人行规定印刷的制式凭证,出票日期是否符合要求,票据记载要素是否完整、规范、合法,背书是否连续、规范;粘单是否符合标准等
A. 对
B. 错
【判断题】
NEWBOS核准前销户业务,转出余额交易支持每天调用3次
A. 对
B. 错
【判断题】
票据责任,是指票据债权人向持票人支付票据金额的义务
A. 对
B. 错
【判断题】
没有代理权而以代理人名义在票据上签章的,应当由代理人承担票据责任
A. 对
B. 错
【判断题】
无民事行为能力人或者限制民事行为能力人在票据上签章的,其签章无效,同时影响其他签章的效力
A. 对
B. 错
【判断题】
票据金额以中文大写和数码同时记载,二者必须一致,二者不一致的,票据无效
A. 对
B. 错
【判断题】
票据上有伪造、变造的签章的,不影响票据上其他真实签章的效力
A. 对
B. 错
【判断题】
票据丧失,失票人可以及时通知票据的收款人挂失止付
A. 对
B. 错
【判断题】
出票是指出票人签发票据并将其交付给收款人的票据行为
A. 对
B. 错
【判断题】
汇票上未记载付款日期的,为无效票据
A. 对
B. 错
【判断题】
持票人为背书人的,对其前手无追索权
A. 对
B. 错
【判断题】
开立支票存款账户和领用支票,应当有可靠的资信,并存入一定的资金
A. 对
B. 错