【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
推荐试题
【单选题】
肌肉轻微收缩,无肢体活动,肌力评估为___
A. 0级
B. 1级
C. 2级
D. 3级
E. 4级
【单选题】
肢体可水平移动,但不能抬离床面,肌力评估为___
A. 0级
B. 1级
C. 2级
D. 3级
E. 4级
【单选题】
肢体能抬离床面,但不能拮抗阻力,肌力评估为___
A. 0级
B. 1级
C. 2级
D. 3级
E. 4级
【单选题】
肢体能做拮抗阻力运动,但肌力有不同程度的减弱,肌力评估为___
A. 0级
B. 1级
C. 2级
D. 3级
E. 4级
【单选题】
以下有关医院感染的叙述正确的是___
A. 家属在探视时获得的感染不属于院内感染
B. 由于医源性因素引起的炎症均为院内感染
C. 由于诊疗措施激活的潜在性感染如结核不属于院内感染
D. 凡是医务人员在院内发作的感染均为医院感染
E. 医院感染的研究对象主要是病人和医务人员
【单选题】
门诊发现传染病病人应立即___
A. 转急诊室处理
B. 提前就诊
C. 隔离就诊
D. 进行卫生宣教
E. 消毒候诊环境
【单选题】
下列化学消毒剂中,可用于空气消毒的是___
A. 2%戊二醛
B. 75%乙醇
C. 2%过氧乙酸
D. 3%过氧化氢
E. 0.5%氯己定
【单选题】
具有广谱、高效的杀菌作用,对金属腐蚀性小,受有机物影响小的化学消毒剂是___
A. 乙醇
B. 福尔马林(4%甲醛溶液)
C. 戊二醛
D. 过氧化氢
E. 碘伏
【单选题】
手术前进行外科手消毒的范围是___
A. 双手手掌
B. 双手
C. 双手及前臂
D. 双手、前臂及肘部
E. 双手、前臂及肘上10cm
【单选题】
医院感染间接传播最主要的方式是通过___
A. 医疗设备
B. 医务人员的手
C. 病人间的接触
D. 病人的排泄物、分泌物
E. 一次性物品
【单选题】
下列需进行外科手消毒的是___
A. 无菌操作前
B. 接触病人体液后
C. 脱手套后
D. 外科手术前
E. 戴口罩前
【单选题】
下列有关外科手消毒的做法正确的是___
A. 消毒范围从指尖到肘下10cm
B. 不需用肥皂、清水洗手,可直接进行外科手消毒
C. 消毒过程只用一个无菌小刷
D. 以无菌巾从手向肘部擦干
E. 消毒完毕,双手保持高过肩部
【单选题】
卫生手消毒监测应达到___
A. ≤5cfu/cm2
B. ≤10cfu/cm2
C. ≤15cfu/cm2
D. ≤20cfu/cm2
E. ≤100cfu/cm2
【单选题】
外科手消毒监测应达到___
A. ≤5cfu/cm2
B. ≤10cfu/cm2
C. ≤15cfu/cm2
D. ≤20cfu/cm2
E. ≤100cfu/cm2
【单选题】
新生儿脐带消毒应选用___
A. 2%碘酊和75%乙醇
B. 无水乙醇
C. 复方硼酸溶液
D. 生理盐水
E. 1%过氧化氢
【单选题】
传染科门诊四固定不包括___
A. 诊室
B. 人员
C. 时间
D. 器械
E. 病人
【单选题】
护士小陈为病人进行肌内注射前,洗手过程如下,其中错误的做法是___
A. 每个部位的揉搓时间不少于10~15s
B. 双手下垂,用流动水充分冲洗
C. 洗净双手后,用手直接关闭水龙头
D. 取擦手巾擦干双手
E. 连续为两个病人注射时,中间用快速手消毒液消毒双手
【单选题】
患者陈某,女,25岁,因细菌性痢疾住院治疗。护士小陈对其进行护理的过程中,错误的是___
A. 为该病人进行体格检查时,戴一次性橡胶手套
B. 为病人体格检查完毕后,脱去手套,用肥皂和流动水洗净双手
C. 协助病人倒粪便时,戴一次性橡胶手套
D. 若手直接接触到病人粪便,应立即用肥皂和流动水洗净双手
E. 每接触一个病人应更换一副手套
【单选题】
换药室地面上溅有病人血液,应___
A. 用干拖把拖净
B. 用湿拖把拖净
C. 用含氯消毒剂拖洗,然后将拖把洗净
D. 用含氯消毒剂拖洗,然后将拖把先消毒、再洗净
E. 用含氯消毒剂拖洗,然后将拖把丢弃
【单选题】
乙型病毒肝炎最主要的传播途径是___
A. 粪-口传播
B. 呼吸道传播
C. 水源传播
D. 蚊虫叮咬
E. 血行传播
【单选题】
有关医院感染正确的描述是___
A. 患者住院期间出现的感染症状
B. 患者出院后出现的感染症状
C. 感染和发病同时发生在医院内
D. 陪护者是医院感染的主要对象
E. 住院患者在医院内获得的感染
【单选题】
医院感染监测包括全面综合性监测和___
A. 危险因素监测
B. 发病率监测
C. 感染病种监测
D. 致病微生物监测
E. 目标监测
【单选题】
热力消毒灭菌中效果最为可靠、临床使用最广的消毒灭菌方法是___
A. 日光暴晒法
B. 煮沸消毒法
C. 高压蒸气灭菌法
D. 干烤法
E. 烧灼法
【单选题】
脓毒血症的热型是___
A. 稽留热
B. 弛张热
C. 间歇热
D. 回归热
E. 不规则热
【单选题】
补钾前首先应考虑到病人的___
A. 肾功能
B. 心功能
C. 肝功能
D. 脑功能
E. 肺功能
【单选题】
下列静脉补钾的要点中,先决条件是___
A. 尿量须在30ml/h以上
B. 氯化钾浓度<0.3%
C. 滴速<60滴/min
D. 生理需要成人一般为3g/天
E. 严重病人补钾不超过8g/天
【单选题】
补充钾盐前,应首先考虑病人的___
A. 血压
B. 呼吸
C. 尿量
D. 神志
E. 脉率
【单选题】
病人甲,下肢严重挤压伤后发生急性肾衰竭,少尿期不可能出现的是___
A. 尿相对密度低
B. 低钾血症
C. 低钠血症
D. 代谢性酸中毒
E. 氮质血症
【单选题】
下列哪项情况不可进行静脉补钾___
A. 明显脱水征
B. 尿量每小时少于30ml
C. 口渴严重
D. 血钠低于130mmol/L
E. 代谢性碱中毒
【单选题】
菌血症的热型是___
A. 稽留热
B. 弛张热
C. 间歇热
D. 回归热
E. 不规则热
【单选题】
压力蒸气灭菌时物品的装载错误的是___
A. 尽量将同类物品放在一起灭菌
B. 物品的上下左右均应间隔一定距离
C. 难灭菌的大包放上层,易灭菌的小包放下层
D. 金属物品放下层,织物包放上层
E. 玻璃瓶等开口向上或侧放
【单选题】
有关化学消毒剂的使用,错误的是___
A. 碘酊多用于皮肤的消毒
B. 氯己定对金属和织物无腐蚀性
C. 过氧乙酸可用于浸泡金属器械
D. 戊二醛可用于浸泡内镜
E. 碘附对皮肤、黏膜无刺激
【单选题】
不属于消毒剂的是___
A. 过氧乙酸
B. 过氧化氢
C. 含氯消毒剂
D. 戊二醛
E. 乙醇
【单选题】
不属于灭菌剂的是___
A. 戊二醛
B. 甲醛
C. 环氧乙烷气体
D. 邻苯二甲醛
E. 碘伏
【单选题】
属于中效消毒剂的是___
A. 乙醇
B. 氯己定
C. 新洁尔灭
D. 戊二醛
E. 过氧乙酸
【单选题】
属于灭菌剂的是___
A. 戊二醛
B. 乙醇
C. 碘伏
D. 含氯消毒剂
E. 过氧乙酸
【单选题】
戊二醛使用浓度及灭菌时间___
A. 2%,10小时以上
B. 2%,20-45分钟
C. 3%,10小时以上
D. 3%,20-45分钟
E. 2%,2小时以上
【单选题】
戊二醛使用浓度及消毒时间___
A. 2%,10小时以上
B. 2%,20-45分钟
C. 3%,10小时以上
D. 3%,20-45分钟
E. 2%,2小时以上
【单选题】
使用化学消毒灭菌剂浸泡物品注意事项错误的是___
A. 待灭菌的物品必须先彻底清洁,待干
B. 有管腔的物品应注意管腔的清洁,浸泡时应让管腔中注满消毒液
C. 消毒液应浸没物品,容器可不加盖
D. 浸泡过程不要随时加泡物品,否则其作用时间应从最后泡入物品时算起
E. 浸泡后的物品均经无菌水冲洗后直接使用
【单选题】
关于低钾血症的病因,下列哪项是错误的___
A. 长期少食
B. 频繁呕吐,长期胃肠道吸引
C. 急性肾功能衰竭
D. 碱中毒
E. 注射大量葡萄糖和胰岛素