【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
推荐试题
【单选题】
SC/FC光纤尾纤两端接头分别是( )___
A. 两端均大方头
B. 圆头/大方头
C. 大方头/圆头
D. 两端大圆头
E.
F.
【单选题】
SDH的含义是:___
A. 同步数字传输体制
B. 光网络
C. 无源光网络
D. 综合数字网
E.
F.
【单选题】
SDH管理网采用了()的服务定义,协议规范等。___
A. ITU
B. IETF
C. TMN
D. ATM
E.
F.
【单选题】
IP 地址132.119.100.200 的子网掩码是255.255.255.240,哪么它所在子网的广播地址是___
A. 132.119.100.207
B. 132.119.100.255
C. 132.119.100.193
D. 132.119.100.223
E.
F.
【单选题】
SDH技术是一种光纤传输体制,它以( )为基本概念.___
A. STM-16
B. STM-1
C. STM-4
D. STM-64
E.
F.
【单选题】
行政执法人员从事行政执法活动时,应当向当事人出示行政执法证件,除适用简易程序外,必须( )人以上共同进行。
A. 一
B. 二
C. 三
D. 无要求
【单选题】
行政机关实施行政强制、行政处罚前,行政当事人享有的权利不包括:( )
A. 陈述权;
B. 申辩权;
C. 享有赔偿权;
D. 申请行政执法人员回避。
【单选题】
行政执法人员实施行政处罚,纠正违法行为,应当坚持( )原则。
A. 职权法定;
B. 严惩为先;
C. 处罚与教育相结合;
D. 权责统一。
【单选题】
行政执法人员销毁暂扣物品时,现场应当有( )名以上行政执法人员在场,并制作销毁笔录。
A. 一
B. 二
C. 三
D. 无要求
【单选题】
黄河市行政执法人员强制拆除违法建筑时,其采取的措施中错误的是:( )
A. 通知当事人在限定期限内取走违法建筑内的财物;
B. 当事人未在限定期限内取走相关财物的,应当进行拍照或者摄像,并详细登记后妥善保管;
C. 妥善保管后及时通知当事人在限定期限内领取;
D. 当事人逾期未领取的,行政执法人员应当及时将暂扣的物品充缴国库。
【单选题】
行政执法的理念要求不包括:( )
A. 职权法定;
B. 严惩为先;
C. 程序正当;
D. 权责统一。
【单选题】
两个以上行政执法单位联合执法的,以下说法错误的是:( )
A. 由参加联合执法的行政执法单位在各自的职责范围内依法作出行政执法决定;
B. 行政处罚权相对集中后,原行政执法单位不得再行使已被集中行使的行政处罚权;
C. 原行政执法单位继续行使已被集中的行政处罚权,作出的行政处罚无效;
D. 联合执法的行政执法单位名义在前的承担联合执法的主要责任。
【单选题】
关于委托执法下列说法错误的是:( )
A. 受委托组织应当向委托单位定期报告行政执法情况,并接受委托单位的指导和监督;
B. 受委托组织应当在委托范围内,以委托行政执法单位名义实施行政执法;
C. 委托单位为提高执法效率可同时再委托第三家组织实施行政执法;
D. 行政执法单位委托符合法定条件的组织实施行政执法的,应当签订行政执法委托协议,明确委托事项。
【单选题】
行政执法人员在进行证据调查时制作的法律文书不包括:( )
A. 询问笔录;
B. 检查笔录;
C. 处罚告知书;
D. 勘验笔录;
【单选题】
行政执法人员当场作出行政处罚决定的,应当:( )。
A. 当场填写行政处罚决定书,当场交付当事人;
B. 当场填写行政处罚决定书,通知当事人事后来行政机关领取;
C. 当场口头告知当事人,通知当事人事后来行政机关领取;
D. 以上都不对。
【单选题】
行政机关层级监督制度不包括:( )
A. 执法案卷评查制度;
B. 行政执法监督建议书制度;
C. 处罚听证制度;
D. 行政复议制度;
【单选题】
为加强对行政执法机关行政事业性收费和罚没收入等资金的专业监督机构是:( )
A. 上级行政机关;
B. 同级人民代表大会;
C. 审计机关;
D. 同级人民法院。
【单选题】
关于行政执法过错责任制问责对象,下列说法错误的是:( )
A. 行政执法人员因故意或者过失不履行法定职责,产生危害后果或者不良影响的;
B. 行政执法人员因不正确履行法定职责,产生危害后果或者不良影响的;
C. 行政执法行为造成重大损失或者恶劣影响的行政执法单位;
D. 行政执法行为造成重大损失或者恶劣影响的行政执法单位负责人。
【单选题】
行政执法人员应当严格按照规定的职权范围实施行政执法行为。下列哪项
A. 法律
B. 法规
C. 规章
D. 其他规范性文件
【单选题】
行政执法人员调查取证时,以下说法不正确的是:( )
A. 应当全面、客观、公正;
B. 不得以利诱、欺诈、胁迫、暴力等不正当手段收集证据;
C. 不得伪造、隐匿证据;
D. 紧急情况下可由行政执法人员指派无行政执法资格的人员进行调查取证。
【单选题】
江城市爱民食品厂因生产不符合食品安全产品被卫生局处以相应行政处罚,在以下哪种情形下,其无权要求举行听证:( )
A. 责令停产停业;
B. 吊销营业执照;
C. 20万元罚款;
D. 警告。
【单选题】
长江市工商行政管理局执法人员暂扣一违法工厂生产原料后,其所采取的处理措施中错误的是:( )
A. 告知当事人在规定期限内至指定地点接受处理;
B. 及时移交长江市工商行政管理局妥善保管,不得使用或者损毁;
C. 当事人接受处理后,行政执法人员应当及时将暂扣的物品充缴国库;
D. 一执法人员发现暂扣原料涉及违禁物品,及时报告长江市工商行政管理局。
【单选题】
行政执法人员送达有关法律文书方式不包括:( )
A. 直接送达
B. 留置送达
C. 转交送达
D. 公告送达
【单选题】
关于听证制度,下列说法中不正确的是:( )
A. 行政执法人员应当充分听取当事人的意见,完整记录当事人陈述和申辩的内容;
B. 行政执法人员应当对当事人提出的事实、理由和证据,进行复核;
C. 不得因当事人申辩而加重处罚;
D. 听证主持人在听证开始后不得要求行政执法人员另行补充证据。
【单选题】
行政复议机关在审理行政复议案件过程中,发现行政执法行为违法或者不当的,应当做出的决定形式不包括:( )
A. 撤销该行政行为;
B. 变更该行政行为;
C. 确认该行政行为违法;
D. 限期履行决定。
【多选题】
行政执法人员从事行政执法活动所注意的个人形象规范包括:( )
A. 应当仪表整洁、语言文明、举止得体、方式得当;
B. 不得使用粗俗、歧视、侮辱以及威胁性语言;
C. 不得刁难当事人或者做出有损行政执法人员形象的行为;
D. 应当按照有关规定着制服,没有制服的,着装应当庄重得体。
【多选题】
行政执法人员应当严格按照( )规定的职权范围实施行政执法行为。
A. 法律
B. 法规
C. 规章
D. 其他规范性文件
【多选题】
行政执法人员从事行政执法活动,应当遵守法定程序,严格按照法定的( )实施。
A. 方式
B. 步骤
C. 顺序
D. 期限
【多选题】
行政执法人员调查取证时,以下说法正确的是:( )
A. 应当全面、客观、公正;
B. 不得以利诱、欺诈、胁迫、暴力等不正当手段收集证据;
C. 不得伪造、隐匿证据;
D. 紧急情况下可由行政执法人员指派无行政执法资格的人员进行调查取证。
【多选题】
实施行政检查前,行政执法人员应当告知当事人行政检查的( )。
A. 理由
B. 内容
C. 要求
D. 程序
【多选题】
在以下哪些情形下,行政执法人员应当告知当事人有要求举行听证的权利:( )
A. 责令停产停业;
B. 吊销许可证或者执照;
C. 较大数额罚款;
D. 警告。
【多选题】
长江市工商行政管理局执法人员暂扣一违法工厂生产原料后,其所应当采取的正确处理措施包括:( )
A. 告知当事人在规定期限内至指定地点接受处理;
B. 及时移交长江市工商行政管理局妥善保管,不得使用或者损毁;
C. 当事人接受处理后,行政执法人员应当及时将暂扣的物品充缴国库;
D. 一执法人员发现暂扣原料涉及违禁物品,及时报告长江市工商行政管理。
【多选题】
行政执法人员送达有关法律文书方式包括:( )
A. 直接送达
B. 留置送达
C. 委托送达
D. 公告送达
【多选题】
行政执法单位的执法主体资格应当有( )的授权或者委托。
A. 法律
B. 法规
C. 规章
D. 其他规范性文件
【多选题】
关于委托执法下列说法正确的是:( )
A. 受委托组织应当向委托单位定期报告行政执法情况,并接受委托单位的指导和监督;
B. 受委托组织应当在委托范围内,以委托行政执法单位名义实施行政执法;
C. 委托单位为不得再委托任何其他组织实施行政执法;
D. 行政执法单位委托符合法定条件的组织实施行政执法的,应当签订行政执法委托协议,明确委托事项。
【多选题】
行政执法单位之间发生行政执法争议的,以下说法正确的是:( )
A. 争议各方应当先自行协调,并就协调一致的意见形成会议纪要或者签订相关协议;
B. 自行协调不成的,应当及时提请相关协调机关组织协调。
C. 协调机关在协调过程中,发现不立即执法可能对公共利益造成重大影响的,可以决定由某个行政执法单位先负责执法。
D. 紧急情况下协调机关应当自行管理执法。
【多选题】
关于听证制度,下列说法正确的是:( )
A. 行政执法人员应当充分听取当事人的意见,完整记录当事人陈述和申辩的内容;
B. 行政执法人员应当对当事人提出的事实、理由和证据,进行复核;
C. 不得因当事人申辩而加重处罚;
D. 听证主持人要求行政执法人员补充证据的,行政执法人员可以拒绝提供补充调查的证据。
【多选题】
对行政事业性收费和罚没收入管理,下列说法正确的是:( )
A. 全部实行“收支两条线”管理;
B. 行政事业性收费和罚没收入按规定全额上缴国库或者财政专户;
C. 将行政事业性收费或者罚没收入按比例返还行政执法单位作为行政执法经费和奖励经费使用;
D. 行政执法经费全额纳入部门预算管理。
【多选题】
行政执法人员收缴罚款的形式包括:( )。
A. 当场收缴罚款;
B. 通知当事人事后及时交至行政执法单位;
C. 事后到指定的代收银行缴纳罚款;
D. 通知当事人汇款至行政执法单位。
【多选题】
市级行政主管部门对执法案卷评查制度应当从以下哪些角度考虑:( )
A. 行政执法案件事实认定是否清楚;
B. 行政执法案件证据是否确凿;
C. 行政执法案件程序是否合法;
D. 行政执法案件法律适用是否准确。