【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
推荐试题
【单选题】
患者65岁,诉阴道有肿物脱出5年,查宫颈及部分宫体已脱出阴道口外,诊断该患者属几度子宫脱垂___
A. Ⅰ度轻
B. Ⅰ度重
C. Ⅱ度轻
D. Ⅱ度重
E. Ⅲ度
【单选题】
前置胎盘患者产后易出血的原因是___
A. 凝血机制的障碍
B. 子宫收缩差
C. 胎盘残留
D. 胎盘附着在子宫下段,产后子宫下段收缩力差
E. 感染所致
【单选题】
有关高危孕妇的处理,不妥当的是___
A. 保证足够休息
B. 宜取右侧卧位
C. 高蛋白、高能量饮食,补充维生素和微量元素
D. 提高胎儿对缺氧的承受能力
E. 间断给氧
【单选题】
患者29岁,滴虫性阴道炎治疗不当而反复发作,现因妊娠2个月就诊。护士指导措施中哪项是错误的___
A. 保持外阴清洁
B. 夫妇双方同时治疗
C. 复查白带找滴虫,3次均为阴性方可治愈
D. 滴虫阴性后继续1疗程以巩固疗效
E. 妊娠早期不宜局部用药,可采取口服甲硝唑
【单选题】
胎盘早剥的发生与下述何项无关___
A. 孕妇的血管病变
B. 外伤
C. 不协调的宫缩过强
D. 子宫腔内压突然降低
E. 子宫静脉压突然升高
【单选题】
一产后20天妇女,恶露为鲜红色、量多、有腥臭味,应采取何种措施最好___
A. 使用缩宫素,必要时用抗生素
B. 应用止血药物
C. 输液、供给营养
D. 保证睡眠、适当活动
E. 正常生理现象,不用干预
【单选题】
患者27岁,孕1产0,孕33周,无痛性少量阴道流血3天,胎心140次/min,无明显宫缩,初诊为前置胎盘,最恰当的处理是___
A. 住院期待疗法
B. 剖宫产
C. 立即肛查
D. 立即静脉滴注缩宫素
E. 应用止血药后回家观察
【单选题】
臀位分娩,下列哪项正确___
A. 臀位分娩后,胎头娩后无困难
B. 宫缩时见胎粪流出,考虑为胎儿缺氧
C. 臀位胎儿娩出不超过8分钟
D. "堵"臀时间越长越好
E. 阴道口见胎头拨露,快速结束分娩
【单选题】
造成持续性枕后位的主要原因是___
A. 漏斗形骨盆
B. 单纯扁平骨盆
C. 胎头俯屈不良
D. 子宫收缩乏力
E. 胎儿相对过大
【单选题】
确定子宫内膜癌的最可靠依据是___
A. 病史
B. 体征
C. 分段诊断性刮宫组织病理学检查
D. 宫腔镜检查
E. 经宫颈取分泌物涂片找癌细胞
【单选题】
一产钳助产新生儿,头颅血肿4cm×4cm×4cm,Apgar评分5分,有呕吐,护理措施下列哪项不正确___
A. 严密观察面色、呼吸
B. 保持绝对安静,3天内不予淋浴
C. 早期冷敷
D. 使用促凝剂
E. 预防感染,用注射器抽去血肿内液体
【单选题】
早孕反应一般在下列妊娠哪一阶段出现___
A. 6周左右
B. 8周左右
C. 10周左右
D. 11周左右
E. 12周左右
【单选题】
下述哪项不是慢性宫颈炎的病理变化___
A. 宫颈息肉
B. 宫颈腺囊肿
C. 宫颈颗粒型重度糜烂
D. 宫颈鳞状上皮变化
E. 宫颈管炎
【单选题】
产褥感染中最常见的是___
A. 急性子宫内膜炎、子宫肌炎
B. 外阴、阴道、子宫颈伤口炎症
C. 急性盆腔结缔组织炎
D. 栓塞性静脉炎
E. 腹膜炎
【单选题】
宫外孕失血休克病人的护理,不妥的一项是___
A. 做好术前准备
B. 保暖
C. 氧气吸入
D. 立即取头低位
E. 迅速建立静脉通道
【单选题】
纯母乳喂养的概念是___
A. 除母乳外,不喂任何饮食
B. 除母乳外,每2次喂奶之间喂糖水1次
C. 除母乳外,每2次喂奶之间喂开水1次
D. 除母乳外,不足时可静脉输液
E. 除母乳外,不足喂牛奶
【单选题】
下列哪项不符合先兆子癎的临床表现___
A. 高血压≥160/110mmHg
B. 24小时尿蛋白定量<5g
C. 水肿+++
D. 伴有自觉症状
E. 水肿+
【单选题】
下列哪项是宫颈癌的早期症状___
A. 接触性出血
B. 阴道大量排液
C. 反复阴道出血
D. 腰骶部疼痛
E. 不规则出血
【单选题】
会阴正中切开术的优点不包括___
A. 出血少
B. 易缝合
C. 愈合好
D. 不易撕裂肛门括约肌
E. 瘢痕小
【单选题】
下列哪项不是妇科病人常见的症状___
A. 阴道流血
B. 白带增多
C. 腹痛
D. 发热
E. 下腹部包块
【单选题】
患者28岁,身高150cm,足月妊娠,骨盆入口相对狭窄,胎儿估计体重2000g、产力好,目前应___
A. 先试产2~4h
B. 立即行剖宫产
C. 不应试产
D. 监护胎心,胎心正常行剖宫产
E. 作术前准备
【单选题】
B超检查结果最早可见妊娠环的孕周是___
A. 2周
B. 3周
C. 4周
D. 5周
E. 6周
【单选题】
羊水栓塞的临床表现不包括___
A. 休克
B. 出血
C. 肾功能衰竭
D. 呼吸困难
E. 阴道出血有凝血块
【单选题】
不宜口服灭滴灵治疗滴虫阴道炎的时期是___
A. 哺乳期
B. 老年期
C. 性成熟期
D. 青春期
E. 产褥期
【单选题】
新生儿窒息吸氧的流量为___
A. 1L/min
B. 2L/min
C. 3L/min
D. 4L/min
E. 5L/min
【单选题】
对高危孕妇处理,不正确的是___
A. 卧床休息
B. 增加营养
C. 预防早产
D. 适时终止妊娠
E. 凡威胁母儿健康,不管胎儿成熟程度即终止妊娠
【单选题】
产妇,29岁,第一胎,妊娠合并心脏病,孕37周,阴道侧切分娩一活婴,产后心功能Ⅱ级,在护理措施中,不正确的为___
A. 产后3天严密观察心衰的表现
B. 产后24小时内绝对卧床休息
C. 不宜母乳喂养
D. 进食富含纤维素食物防便秘
E. 至少住院观察2周
【单选题】
胎心音的听诊部位,不正确的一项是___
A. 骶右前位、母体脐下右侧
B. 枕左前位、母体脐下左侧
C. 骶左前位、母体脐上左侧
D. 枕右前位、母体脐下右侧
E. 肩先露、母体脐周围
【单选题】
新生儿窒息时应首先采取的措施___
A. 口对口人工呼吸
B. 清理呼吸道
C. 刺激足部
D. 给呼吸兴奋剂
E. 吸氧
【单选题】
目前临床上最常用的剖宫产术是___
A. 子宫体剖宫产术
B. 腹膜外刮宫产术
C. 剖宫产子宫切除术
D. 古典式剖宫产术
E. 子宫下段剖宫产术
【单选题】
前置胎盘的正确处理___
A. 有阴道流血,即终止妊娠
B. 宫口小,刮宫产;宫口大,阴道分娩
C. 胎儿死亡,均从阴道分娩
D. 疑有前置胎盘,肛查宜轻柔
E. 阴道检查操作必须在输液、备血和做好手术准备的情况下方可进行
【单选题】
慢性心力衰竭发病机制下列哪项不妥___
A. 慢性心衰早期通过心率加快、心肌肥厚及心腔扩大可提高排心血量
B. 心衰早期神经内分泌系统激活,增加血管阻力,水钠潴留以维持血液灌注压
C. 失代偿期心肌肥厚致心肌损伤和坏死
D. 失代偿时持续心脏扩大,可加重心肌损伤
E. 失代偿期神经内分泌系统长期活性增加仍可维持血液灌注压
【单选题】
关于支气管扩张的叙述,下列哪项有误___
A. 多在中、老年期起病
B. 主要表现为慢性咳嗽、大量脓痰、反复咯血及继发肺部感染
C. 病变部位可听到局限性持久存在的湿啰音
D. X线胸片可见蜂窝状或卷发样阴影
E. 支气管碘油造影可确诊
【单选题】
做甲状腺摄I率测定,在检查前1个月禁食的食物是___
A. 河鱼
B. 白菜
C. 土豆
D. 紫菜
E. 鸡蛋
【单选题】
关于胸膜摩擦音正确的是___
A. 常见于前胸上部
B. 听诊器加压后减弱
C. 吸气时消失
D. 屏住呼吸则消失
E. 常见于胸腹腔积液
【单选题】
高血压脑出血最易发生在___
A. 内囊
B. 中脑
C. 桥脑
D. 延脑
E. 小脑
【单选题】
肾脏疾病注重饮食护理有何好处___
A. 适当增加营养,增加抵抗力
B. 控制蛋白质
C. 减少钠水潴留
D. 减少食物中有毒物质
E. 减轻"健存"肾单位滤过负担
【单选题】
下列哪项不属于护理体检前准备___
A. 工作人员准备
B. 用物准备(检查)
C. 环境准备
D. 病人准备
E. 家属准备
【单选题】
发作性呼气性呼吸困难最常见于___
A. 自发性气胸
B. 阻塞性肺气肿
C. 支气管肺癌
D. 支气管哮喘
E. 支气管异物
【单选题】
多潘立酮的作用是什么___
A. 减少胃酸
B. 刺激胃窦蠕动
C. 消灭细菌
D. 保护黏膜
E. 避免胆汁反流