【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
推荐试题
【单选题】
下列哪种病变属于梗死( )
A. 重Ⅱ度烧伤
B. 足坏疽
C. 刀割伤
D. 病毒性肝炎
E. 脓肿
【单选题】
脾、肾梗死灶肉眼检查的主要特点为( )
A. 多呈楔形、灰白色、界限清楚
B. 多呈不规则形、暗红色、界限不清
C. 多呈楔形、暗红色、界限不清
D. 多呈地图形、暗红色、界限不清
E. 多呈地图状、灰白色、界限清楚
【单选题】
容易发生出血性梗死的器官是( )
A. 心
B. 肾
C. 脑
D. 脾
E. 肠
【单选题】
漏出性出血常见的部位是( )
A. 小静脉
B. 小动脉
C. 大动脉
D. 毛细血管
E. 大静脉
【单选题】
左心衰竭主要引起( )
A. 慢性脾淤血
B. 慢性肝淤血
C. 胃肠淤血
D. 下肢淤血
E. 慢性肺淤血
【单选题】
下述哪项不是静脉性充血的原因( )
A. 致炎因子刺激
B. 心力衰竭
C. 肿瘤压迫
D. 静脉压升高
E. 静脉阻塞
【单选题】
肺淤血时痰液中出现胞质中含有含铁血黄素颗粒的巨噬细胞称为( )
A. 心衰细胞
B. 异物巨细胞
C. 肺泡上皮细胞
D. 尘细胞
E. 支气管黏膜上皮细胞
【单选题】
“心力衰竭细胞”是指( )
A. 心力衰竭时病变的心肌细胞
B. 心力衰竭时肺泡腔内的泡沫细胞
C. 心力衰竭时肺内吞噬碳末的巨噬细胞
D. 硅肺致右心衰竭时肺内吞噬硅尘的巨噬细胞
E. 褐色硬化肺内含有含铁血黄素的巨噬细胞
【单选题】
下列哪项不属于病理性充血( )
A. 炎性充血
B. 饭后胃肠道黏膜的充血
C. 侧支循环性充
D. 减压后充血
E. 二尖瓣狭窄时的肺充血
【单选题】
右心衰竭可使以下器官淤血的是( )
A. 肺、肝及胃肠道
B. 肝、脾及胃肠道
C. 肺、脑及胃肠道
D. 肾、肺及胃肠道
E. 脾、肺及胃肠道
【单选题】
右心衰竭时引起淤血的器官主要是:
A. 肺、肝及胃肠道
B. 肝、脾及胃肠道
C. 脑、肺及胃肠道
D. 肾、肺及胃肠道
E. 脾、肺及胃肠道
【单选题】
慢性肺淤血的特点不包括( )
A. 切面流出淡红色泡沫状液体
B. 肺泡腔内有心衰细胞
C. 肺泡壁毛细血管扩张充
D. 肺内支气管扩张
E. 肺泡间隔增宽
【单选题】
血液从心腔或血管内流出体外称为( )
A. 内出血
B. 血肿
C. 积血
D. 漏出性出血
E. 外出血
【单选题】
弥漫性血管内凝血发生广泛出血的主要原因是( )
A. 肝凝血酶原合成减少
B. 血管壁广泛损伤
C. 大量血小板及纤维蛋白消耗
D. 单核吞噬细胞系统功能下降
E. 血浆中缓激肽浓度增高
【单选题】
下列哪项不属于病理性充血( )
A. 炎性充血
B. 减压后性充血
C. 致炎因子引起的充血
D. 侧支循环性充血
E. 器官组织活动增强时引起的充血
【单选题】
肺栓塞的后果包括以下几点,但除外
A. 急死
B. 肺梗死
C. 间质性肺炎
D. 肺动脉高压
E. 右心房扩大
【单选题】
右上肢静脉血栓脱落主要栓塞于
A. 肺动脉
B. 脑动脉
C. 肝动脉
D. 心冠状动脉
E. 以上均不是
【单选题】
槟榔肝可发展为( )
A. 坏死后性肝硬化
B. 门脉性肝硬化
C. 淤血性肝硬化
D. 胆汁性肝硬化
E. 寄生虫性肝硬化
【单选题】
微循环血管壁通透性增高引起的出血是( )
A. 破裂性出血
B. 体腔积血
C. 外出血
D. 漏出性出血
E. 渗出性出血
【单选题】
栓子是:
A. 循环血液内脱落的血栓
B. 循环血液内脱落的菌落
C. 循环血液内不溶于血液的异物
D. 循环血液内脂肪和空气
E. 以上都不是
【单选题】
右下肢静脉血栓脱落主要栓塞于:
A. 肺动脉
B. 下腔静脉
C. 右心房
D. 右心室
E. 右下肢大静脉
【单选题】
下述关于肺淤血的描述.哪一项是错误的
A. 肺泡壁毛细血管扩张
B. 肺泡内中性白细胞和纤维素渗出
C. 肺泡腔内有水肿液
D. 可发生漏出性出血
E. 常可见心衰细胞
【单选题】
肺动脉栓塞不会引起( )
A. 猝死
B. 间质性肺炎
C. 肺梗死
D. 肺动脉高压
E. 右心室扩张
【单选题】
心脏赘生物最常见于( )
A. 心外膜
B. 心瓣膜
C. 心内膜
D. 心肌
E. 冠状动脉口
【单选题】
皮肤、黏膜和浆膜少而广泛的出血灶称为( )
A. 积血
B. 淤血
C. 血肿
D. 凝血块
E. 瘀点
【单选题】
血液从心腔或血管内逸出,并积聚于体腔内称为( )
A. 体腔积血
B. 出血
C. 血肿
D. 外出血
E. 漏出性出血
【单选题】
血液流入组织内并局限化时,形成( )
A. 积血
B. 外出血
C. 内出血
D. 血肿
E. 淤斑
【单选题】
淤血是 ( )
A. 血液淤积于皮下组织内
B. 毛细血管和小静脉内血含量增加
C. 血管扩张所致
D. 血管腔内充满血液
E. 血管内含血量增多
【单选题】
肺淤血主要由下列哪种病变引起( )
A. 肺动脉栓塞
B. 急性风湿性心内膜炎
C. 空气栓塞
D. 左心衰竭
E. 肺源性心脏病
【单选题】
淤血时扩张充盈的血管主要是( )
A. 动脉
B. 静脉
C. 小动脉和毛细血管
D. 小静脉和毛细血管
E. 毛细血管、小静脉和小动脉
【单选题】
关于淤血组织器官的病变,哪项描述是错误的( )
A. 常伴有水肿
B. 呈暗红色
C. 温度增加
D. 可引起出血
E. 可发生萎缩
【单选题】
血栓形成是指( )
A. 在活体的心脏和血管内血液成分形成固体质块的过程
B. 血液发生凝固形成固体质块的过程
C. 在活体组织内血液发生凝固形成固体质块的过程
D. 血液在静止状态中发生的异常凝固
E. 活体组织内红细胞发生凝固形成固体质块的过程
【单选题】
关于出血性梗死的病理学特征,以下哪项说法不正确( )
A. 梗死灶呈锲形
B. 梗死区淤血、出血明显
C. 充血、出血带不明显
D. 组织结构常不清
E. 常合并细菌感染
【单选题】
下列哪种出血不属于破裂性出血( )
A. 慢性空洞性肺结核大咯血
B. 肝硬化食管静脉曲张大呕血
C. 十二指肠溃疡柏油样便
D. 胃癌呕血
E. 肺淤血性出血
【单选题】
急性风湿性心内膜炎。心瓣膜上的赘生物为( )
A. 透明血栓
B. 红色血栓
C. 白色血栓
D. 混合血栓
E. 微血栓
【单选题】
左心室附壁血栓可引起( )
A. 心力衰竭
B. 肺淤血
C. 脑动脉栓塞
D. 肺动脉栓塞
E. 心壁穿孔
【单选题】
股静脉血栓形成时.下述哪种结局不易发生
A. 阻塞血流
B. 机化
C. 脱落
D. 钙化
E. 血流完全恢复正常
【单选题】
肱静脉血栓形成可引起( )
A. 肺动脉栓塞
B. 尺动脉栓塞
C. 桡动脉栓塞
D. 脑动脉栓塞
E. 肾动脉栓塞
【单选题】
有关慢性肝淤血的叙述中,下列哪一项不妥
A. 中央静脉扩张
B. 肝窦扩张
C. 肝细胞有萎缩
D. 门静脉扩张
E. 部分肝细胞脂变
【单选题】
层状血栓是( )
A. 红色血栓
B. 白色血栓
C. 混合血栓
D. 透明血栓
E. 延续性血栓