【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
推荐试题
【多选题】
银承业务应专人接收邮件,登记《联行信件电报收发登记簿》,邮寄信封应妥善保管至少___。
A. 一个月
B. 两个月
C. 三个月
D. 六个月
【多选题】
三十八、将票据转交经办柜员后由经办柜员在票交所系统进行登记,要求在___前成登记。
A. 当个工作日
B. T+1日
C. T+2日
D. 第二日
【多选题】
在票交所系统进行承兑信息登记时批量导入最大记录为___条
A. 100
B. 150
C. 200
D. 500
【多选题】
办理贴现时,票据不敷记载需粘单时,贴现机构要骑缝处加盖___和法定代表人或其授权代理人的名章。
A. 结算专用章
B. 本票专用章
C. 已电子登记权属章
D. 汇票专用章
【多选题】
关于银承以下说法正确的是___
A. 银承挂失手续费按票面金额0.1%(不足5元收5元)收取。
B. 自客户挂失之日起12日内没有收到人民法字的止付通知书,第13日起挂失止付通知书失效。
C. 持票人对出票人和承兑人的票据权利最长为2年,超过2年的,需到付款地的基层人民法院申请公示催告。
D. 银承的收、付款人必须是在银行开立存款账户的法人或其他组织(包括个人),在同城或异地均可使用。
【多选题】
银承自动备款可能涉及以下哪些科目:___
A. 251001银行承兑汇票保证金
B. 201001001单位活期存款
C. 13900906银承业务代垫款项
D. 24300301银承保证金备付
【多选题】
银承到期解付(核心转账支付),解付记账所涉及的科目有:___
A. 602开出承兑汇票
B. 24300301银承保证金备付
C. 26100802票据业务资金清算应付款项
D. 73700101接收委托收款
【多选题】
商业汇票按承兑人的不同分为___
A. 银行汇票
B. 银行承兑汇票
C. 商业承兑汇票
D. 银行本票
【多选题】
商业汇票必须记载以下事项:___欠缺记载上列事项之一的,商业汇票无效。
A. 表明“商业承兑汇票”或“银行承兑汇票”的字样,无条件支付的承诺
B. 出票金额\出票日期
C. 出票人签章
D. 收付款人名称
【多选题】
银行承兑汇票的出票人必须具备下列条件是 ___
A. 在承兑银行开立存款账户的法人及其他组织
B. 与承兑银行具有真实的委托付款关系
C. 资信状况良好,具有支付汇票金额的可靠资金来源
D. 内部管理完善,经其法人授权的银行审定
【多选题】
甲公司将一张银行承兑汇票转让给乙公司,乙公司以质押背书方式向W银行取得贷款。贷款到期,乙公司偿还贷款,收回汇票并转让给丙公司。票据到期后,丙公司作成委托收款背书,委托开户银行提示付款。下列背书中,属于非转让背书的有___。
A. 甲公司背书给乙公司
B. 乙公司质押背书给W银行
C. 乙公司背书给丙公司
D. 丙公司委托收款背书
【多选题】
下列说法正确的是___
A. 票据系统将已达到期日的票据(节假日顺延到下一工作日)发送核心系统进行备款处理,核心的扣款顺序为先扣保证金账户锁定金额、再扣结算账户金额。
B. 若扣款金额仍不足票据金额时,核心系统自动生成银承备款。其中定期保证金账户利息随同本金一起入24300301银承保证金备付科目,当保证金扣款金额大于票面金额时,系统自动将多扣款项转入客户结算账户。
C. 若是单位定期存单,填写两联特种转账传票,用“2412定期销户”将定期存单本息销入临时存款账户。柜员用“2406行内转账”交易,转出账号输入临时账户账号,转账类型选择“归还垫款”,
D. 若系统自动备款时已经从客户活期结算账户扣取款项,则通过“2406行内转账”交易将临时账户内剩余款项(即系统备款时扣取的金额)划回客户结算账户,填写两联特种转账传票,
【多选题】
商业汇票在何种情况下不得背书转让? ___
A. 填明“不得转让”字样的商业汇票
B. 作成委托收款背书的商业汇票
C. 作成质押背书的商业汇票
D. 已贴现的商业汇票
【多选题】
下列哪些票据不得挂失止付?___
A. 未承兑的银行承兑汇票
B. 未填明“现金”字样的银行本票
C. 已承兑的商业承兑汇票
D. 填明“现金”字样和代理付款人的银行汇票
【多选题】
银承解付时,关于“二代支付”和“核心支付”两种解付渠道说法正确的是___。
A. “二代支付”走大额系统,“核心支付”走小额系统
B. 选择“二代支付”时,票据系统联动二代支付系统发报;选择“核心支付”时,则须手工通过5702交易进行付款。
C. “二代支付”渠道对应26100302科目,“核心支付”渠道对应26100802科目。
D. 选择“核心支付”时,银承底卡、银承以及托收凭证均作为“解付记账”交易传票附件;选择“二代支付”渠道,则银承底卡作为“解付记账”交易传票附件,银承及托收凭证按电汇交易传票摆放。
E. 选择“二代支付”时,托收凭证上付款人帐号为“26100302”;选择“核心支付”时,托收凭证上付款人帐号为系统内应付款账号。
【多选题】
下列关于银承业务说法正确的有___
A. 当保证金扣款金额大于票面金额时,系统自动将多扣款项转入客户结算账户。
B. 专人接收邮件,登记《联行信件电报收发登记簿》,邮寄信封应妥善保管至少一年。
C. 理财产品质押开立银承时,要求理财产品到期日小于或等于银承到期日。
D. 柜员收到汇票时,需在规定时限内验明汇票真伪,并在票据到期当日在票据系统中作付款登记。
【多选题】
定期保证金所开立的银行承兑汇票,若到期后系统备款不成功,则手工备款可能涉及到的交易包括___。
A. 2401对公账户开户
B. 银承维护
C. 2407单位定期部提或2412定期销户
D. 2406行内转账交易
E. 手工扣款
【多选题】
柜员收到持票人开户行寄来的托收凭证及商业承兑汇票时,需要双人审核,金额___万元以上(含)要用票据鉴别仪识别真伪
A. 5
B. 10
C. 20
D. 50
【多选题】
商业汇票按承兑人的不同分为商业承兑汇票和银行承兑汇票,商业承兑汇票由( )出票、( )承兑,银行承兑汇票由( )出票、( )承兑。___
A. 企业,企业,企业,银行
B. 企业,企业,银行,银行
C. 银行,企业,银行,银行
D. 企业,银行,银行,银行
【多选题】
若付款人提前收到其承兑的商业汇票,付款人在接到通知日的次日起( )日内未通知银行付款,付款人接到通知的次日起第( )日早于汇票到期日的,银行应于汇票到期日将票款划给持票人。___
A. 3 3
B. 5 5
C. 3 5
D. 3 4
【多选题】
出售商业承兑汇票每份为___。
A. 0.80元
B. 0.28元
C. 1.40元
D. 1.20元
【多选题】
单位和个人都可以采用的结算方式是___
A. 支票
B. 银行本票
C. 银行汇票
D. 商业汇票
【多选题】
商业承兑汇票到期解付时,付款人账户不足支付时,银行应该___
A. 填制付款人未付票款通知书
B. 在委托收款凭证备注栏注明“付款人无款支付”字样
C. 通过被委托银行向收款人发出未付款项通知书
D. 如债务证明留存付款人开户银行的,应将其债务证明连同未付款项通知书邮寄被委托银行转交收款人
【多选题】
五十、下列说法正确的是___
A. 银行承兑汇票的付款人是承兑银行
B. 商业承兑汇票的付款人是企业
C. 商业承兑汇票属于商业汇票
D. 银行承兑汇票属于银行汇票
【多选题】
下列关于商票到期解付说法正确的是___
A. 收到商业承兑汇票及托收凭证后,通知付款人来行,将托收凭证第五联交付款人,并由付款人在第三联空白处签收。托收凭证第三、四联连同汇票留存专夹保管;
B. 若付款人提前收到其承兑的商业汇票,付款人在接到通知日的次日起3日内未通知银行付款,付款人接到通知的次日起第4日早于汇票到期日的,银行应于汇票到期日将票款划给持票人;
C. 付款人的银行账户不足支付的,银行应填制付款人未付票款通知书,在委托收款凭证备注栏注明“付款人无款支付”字样,并通过被委托银行向收款人发出未付款项通知书;
D. 我行在付款人接到通知日的次日起3日内收到付款人的拒绝付款证明时,我行将拒绝付款证明、债务证明和有关凭证一并寄给被委托银行,转交收款人。
【多选题】
以下关于商业汇票的说法正确的有___
A. 商业汇票只能转账,不能支取现金
B. 银行承兑汇票申请人于汇票到期未能足额交存票款的,作垫款处理,应对出票人尚未支付的汇票金额按照每日千分之五计收利息
C. 出票金额、出票日期、收付款人名称有更改的商业承兑汇票属无效汇票,不能受理。
D. 及时通知付款人来行签收“付款通知”。付款时间必须是付款人收到“付款通知”后第三个工作日,或汇票到期日
E. 商业汇票的提示付款期限为汇票到期日起30天。
【多选题】
___有更改的商业承兑汇票属无效汇票,不能受理。
A. 出票金额
B. 出票日期
C. 收款人名称
D. 付款人名称
【多选题】
节假日小额支付系统限额提升至___万。
A. 5
B. 10
C. 20
D. 50
【多选题】
下列结算凭证中需要加盖结算专用章的有:___
A. 委托收款凭证
B. 支票
C. 银行汇票
D. 银行本票
【多选题】
汇兑凭证上的委托日期是指汇款人向汇出银行提交汇兑凭证的 ___
A. 前2日
B. 前1日
C. 当日
D. 后1日
【多选题】
汇兑业务若付款人一样、金额一样的重复业务,需要___授权。
A. 柜员
B. 会计主管
C. 网点长
D. 分管行长
【多选题】
以下哪个说法不正确___
A. 单位和个人的各种款项的结算均可使用汇兑方式。
B. 结算业务申请书上记载的收款人为个人,且需要到汇入行领取汇款的,汇款人应在结算业务申请书收款人账号或地址栏注明“留行待取”字样。汇款人确定不得转汇的,应在结算业务申请书备注栏注明“不得转汇”字样。
C. 汇款人对银行尚未汇出的款项可以申请撤销。申请撤销时,应出具正式函件及原汇款回单。汇出银行查明确未汇出款项的,收回回单后,办理撤销。
D. 汇款人对银行已经汇出的款项不可以申请退汇。
【多选题】
汇兑业务冲账需要写明冲账原因,并由___授权后签字确认。
A. 复核柜员
B. 会计主管
C. 分管行长
D. 支行行长
【多选题】
下列说法正确的是___
A. 节假日小额支付系统限额为20万;
B. 付款人一样、金额一样的重复业务,需要网点会计主管授权;
C. 金额≥5万,汇款渠道也可以选择小额支付系统;
D. 补记客户账可以柜员相互授权。
【多选题】
汇入银行对于收款人发出取款通知,经过多久无法交付的汇款,应主动办理退汇___
A. 一个星期
B. 一个月
C. 二个月
D. 三个月
【多选题】
办理汇兑业务,应填制一式三联结算业务申请书,结算业务申请书必须记载下列事项有:___
A. 确定的金额
B. 收款人名称、汇款人名称
C. 汇入行名称、汇出行名称
D. 委托日期
E. 汇款人签章。
【多选题】
以下属于汇兑结算方式的是:___
A. 信汇
B. 电汇
C. 委托收款
D. 托收承付
【多选题】
电汇复核发现信息与结算业务书上信息不符,进行驳回操作,下列哪些情况不能修改___
A. 金额
B. 付款人账号
C. 汇款渠道
D. 收款人账号
【多选题】
单位客户汇款人对汇出银行尚未汇出的款项申请撤销的,应向银行出具哪些资料___
A. 正式函件
B. 本人身份证件
C. 原电(信)汇回单
D. 公司证明
【多选题】
汇兑业务中如出票人为个人的必须是个人结算账户,且应摘录___,经签章确认后留存身份证复印件。
A. 证件种类
B. 证件号码
C. 发证机关