【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
推荐试题
【判断题】
隧道的优良标准是:任意100 m2防水面积上的湿渍不超过3处,任意湿迹面积不大于0.2 m2
A. 对
B. 错
【判断题】
隧道的不合格标准是:任意200 m2防水面积的平均漏水量大于4L/(m2•d);
A. 对
B. 错
【判断题】
隧道的不合格标准是:任意100 m2防水面积的平均漏水量大于4L/(m2•d);
A. 对
B. 错
【判断题】
隧道的不合格标准是:隧道内出现涌砂、线流或漏泥沙,侧墙出现连续渗流;
A. 对
B. 错
【判断题】
隧道的不合格标准是:道床与管片产生脱离现象
A. 对
B. 错
【判断题】
防水材料是指防止地下水、工业和民用的给排水、腐蚀性液体等侵人地下构筑物的材料
A. 对
B. 错
【判断题】
刚性防水材料是指以水泥、砂石为原材料,或其内掺入少量外加剂、高分子聚合材料等材料
A. 对
B. 错
【判断题】
防水材料品种繁多,按物态的不同可分为刚性防水材料和柔性防水材料
A. 对
B. 错
【判断题】
柔性防水材料指在相对于刚性防水材料如防水砂浆和防水混凝土等而言的一种防水材料形态,以其与基层附着的形式包括防水涂膜、防水卷材和密封材料等
A. 对
B. 错
【判断题】
按防水材料粘贴位置的不同,分为外防水(外包防水)和内防水(内包防水》两种
A. 对
B. 错
【判断题】
柔性防水材料具有较好的弹塑性、延伸性,能适应结构的部分变形,但易老化、分解
A. 对
B. 错
【判断题】
隧道防水施工验收要严格执行分级验收、控制质量的原则,质量验收人员必须为主管工程师及以上技术人员
A. 对
B. 错
【判断题】
防水施工质量应按照隧道设施维修规程进行验收,实行生产维护部门及公司二级验收实施
A. 对
B. 错
【判断题】
管片错台指管片间在环面或纵向接触面内发生相对错动的现象
A. 对
B. 错
【判断题】
管片损伤病害较为直观,管片裂缝与缺角主要通过目测进行检查
A. 对
B. 错
【判断题】
管片裂缝通常表现为颜色略深于管片内表面本色的细缝
A. 对
B. 错
【判断题】
管片缺角部位因表层混凝上缺失,缺角颜色同样会深于管片表面本色
A. 对
B. 错
【判断题】
管片错台检查目标应明确错台位置及错台量
A. 对
B. 错
【判断题】
根据地铁盾构隧道纵向变形分析,当超过错台量超过5 mm时,将会影响到止水条防水性能
A. 对
B. 错
【判断题】
根据地铁盾构隧道纵向变形分析,当超过错台量超过8 mm时,将会影响到止水条防水性能
A. 对
B. 错
【判断题】
防水混凝土的抗压强度和抗渗压力必须符合设计要求;防水混凝土应密实,表面应平整.不得有露筋、蜂窝等缺陷;裂缝宽度应符合设计要求;
A. 对
B. 错
【判断题】
水泥砂浆防水层应密实、平整、粘结牢固,不得有空鼓、裂纹、起砂、麻面等缺陷;防水层厚度应符合设计要求;
A. 对
B. 错
【判断题】
卷材接缝应粘结牢固、封闭严密,防水层不得有损伤、空鼓、皱折等缺陷;
A. 对
B. 错
【判断题】
涂层应粘结牢固,不得有脱皮、流淌、鼓泡、露胎、皱折等缺陷;涂层厚度应符合设计要求;
A. 对
B. 错
【判断题】
塑料板防水层应铺设牢固、平整,搭接焊缝严密,不得有焊穿、r垂、绷紧现象;​
A. 对
B. 错
【判断题】
金属板防水层焊缝不得有裂纹、未熔合、夹渣、焊瘤、咬边、烧穿、弧坑、针状气孔等缺陷;保护涂层应符合设计要求;
A. 对
B. 错
【判断题】
隧道质量评定分为“优良”、“合格”、“不合格”三个等级
A. 对
B. 错
【填空题】
盾构法隧道施工质量的检查数量,应按每连续___环抽查1处,每处为一环,但不少于___处。
【填空题】
1.跨度40m及以下结合梁维修长度每米折合___桥涵换算米
【填空题】
2.声屏障维修面积每平米折合___桥涵换算米
【填空题】
3.涵洞维修长度每米折合___桥涵换算米
【填空题】
26. 隧道衬砌钢筋混凝土管片或钢管片等劣损的类型主要有___三种,是隧道衬砌在运营过程中物理性质逐渐劣化的主要表现形式
【填空题】
1.管片剥落是指在管片上出现的端部、螺栓孔或管片中部出现的缺角、掉块或剥落现象,常规采用___或___两张指标判定裂缝的严重程度
【填空题】
2.变形病害是指隧道横纵向断面变形,或者由于横纵向断面变形而引发的___
【填空题】
钻孔注浆止水时,应符合下列规定: 宜在基层表面均匀布孔, 钻孔间距不宜大于 ___, 钻孔深度不宜小于结构厚度的 ___, 孔径不宜大于___ , 并宜采用聚氨酷或丙烯酸盐灌浆材料;当工程周围土体疏松且地下水位较高时,可钻孔穿透结构至迎水面并注浆,钻孔间距及注浆压力宜根据浆液及周割土体的性质确定,注浆材料宜采用水泥基、水泥-水玻瑞或丙烯酸盐等灌浆材料。注浆时应采取有效措施防止浆液对周围建筑物及设施造成破坏。
【填空题】
6.当水压小或孔洞直径小于 ___时,可按木条第 1 款的规定采用埋管___注浆止水, 也可采用快速封堵止水。当采用快速封堵止水时,宜先清除孔润周围疏松的混凝土,并宜将孔洞周围剔凿成 V 形凹坑, 凹坑最宽处的直径宜大千孔洞直径 ___ 以上,深度不宜小于___, 再在凹坑中嵌填速凝型无机防水堵漏材料止水。
【填空题】
5.当水压大或孔洞直径大千等于___时 ,宜采用埋管嘴注浆止水。注浆管宜使用硬质金属管或塑料管,并宜配置阀门 ,管径应符合引水卸压及注浆设备的要求。注浆材料宜使用速凝型水泥-水玻璃灌浆材料或聚氨酣灌浆材料。 注浆压力应根据灌浆材料及工艺进行选择
【填空题】
7.管道根部渗漏的止水应符合下列规定:当渗漏证大时,宜采用钻孔注浆止水,钻孔宜斜穿基层并到达管道表面,钻孔与管道外侧簸近直线距离不宜小于 ___, 注浆嘴不应少于___个,并宜对称布置。
【填空题】
9.在喷射混凝土终凝___后,应即进行喷水养护,并保持较长时间的养护,一般不得少于 ___。
【填空题】
13.水压或渗漏量大的裂缝宜采取钻孔注浆止水,并应符合下列规定:对于无补强要求的裂缝,注浆孔宜交叉布置在裂缝两侧,钻孔应斜穿裂缝,垂直深度宜为混凝土结构厚度h 的___, 钻孔与裂缝水平距离宜为 ___, 孔间距宜为 ___,孔径不宜大千___, 斜孔倾角___。当需要预先封缝时,封缝的宽度宜为 ___