【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
推荐试题
【填空题】
在《中国南方电网有限责任公司资产全生命周期设备退役和处置管理办法2014版》中规定:闲置设备再利用包括___、___;使用或存储年限超过轮换年限的闲置设备不能再转为储备物资。​​​​​​​
【填空题】
《中国南方电网有限责任公司利库计划业务指导书2014版》4中规定利库计划的管理目标为提高___,促进综合利用。​​​​​​​
【填空题】
《中国南方电网有限责任公司逆向物资入库业务指导书2014版》中规定:逆向物资入库原则“先物后账”,物资部门办理逆向物资入库时,应做好___和___。​​​​​​​
【填空题】
《中国南方电网有限责任公司备货发料作业指导书2014版》中规定:备货发料作业结束后,仓管员应在物资系统中流转相应___、___、___,并告知仓库负责人作业完成。​​​​​​​
【填空题】
《中国南方电网有限责任公司物资保管保养作业指导书2014版》中规定:日常线缆类物资保养的注意事项为___、防火、___、防撞击,存放在室外的要有遮挡。​​​​​​​
【填空题】
在《中国南方电网有限责任公司急救包管理规范2014版》中“急救包”的定义:指满足班组生产、抢修所需常用物资的存放点,急救包存储的物资为___物资,由使用部门单位进行日常管理。​​​​​​​
【填空题】
各单位加强对储备物资的实际使用情况的统计分析,避免出现___,提高储备物资周转率。​​​​​​​
【填空题】
《中国南方电网有限责任公司盘点作业指导书2014版》中规定的仓库盘点的5种类型月度盘点、年中盘点、年末盘点、不定期盘点、___。​​​​​​​
【填空题】
《中国南方电网有限责任公司物资管理规定2014版》中逆向物资的分类及各类逆向物资的管理原则:逆向物资分为___和___,​​​​​​​
【填空题】
闲置物资管理遵循“___、落实责任、严格考核”的原则;54报废物资管理遵循“集中处置、程序规范、___”的原则。​​​​​​​
【填空题】
实行仓库编码管理,编码集中、统一,仓库注册信息发生变化应及时更新,保持仓库信息___、___、___。​​​​​​​
【填空题】
盘点报告报经财务部门、___和分管领导审批后,物资部门进行盘亏出库和盘盈入库处理​​​​​​​
【填空题】
公司学习法国配电公司物流管理经验,决定推行___管理体系,提高物流管理水平。​​​​​​​
【填空题】
“大物流、大配送”的目标是落实公司中长期发展战略,___年全面实现“大物流、大配送”管理模式,为___提供全方位服务。​​​​​​​
【填空题】
“大物流、大配送”具体指构建___、库存结构及定额合理、___、服务功能齐全的管理模式。​​​​​​​
【填空题】
“大物流、大配送”仓库管理目标是建立“区域物流平台+急救包”管理层级,实现仓库___管理,规范仓储作业。​​​​​​​
【填空题】
“大物流、大配送”要求逐步退出___现有___、___级仓,最终实现“___”管理层级。​​​​​​​
【填空题】
公司2014年编制并发布了网级___指导书和___指导书,统一规范全网仓储作业。​​​​​​​
【填空题】
公司逐步应用___技术,提高仓储现场作业效率。​​​​​​​
【填空题】
条形码技术改变物流现场手工作业的传统方式,实现___与信息录入同步,达到帐实一致和在线跟踪物资存储配送形态变化和流动轨迹目的。​​​​​​​
【填空题】
条形码技术可实现___,通过物资管理系统找到货物最佳存放位置,优化取货路径。​​​​​​​
【填空题】
“大物流、大配送”储备管理的目标是建立___和___机制,形成全网储备物资清单。​​​​​​​
【填空题】
公司2012年开展补仓采购工作,逐步建立___、___供应模式。​​​​​​​
【填空题】
补仓采购模式要求储备物资 ___,减少工程余料产生,形成储备领用及___。​​​​​​​
【填空题】
“大物流、大配送”配送管理业务目标是形成___的配送服务,满足客户要求,降低___。​​​​​​​
【填空题】
配送管理需要根据根据各类物资的配送特点确定相应的___。​​​​​​​
【填空题】
配送管理实施策略包括建立以区域物流平台为中心的___,辐射服务区域。​​​​​​​
【填空题】
配送管理实施策略要求做好___管理,提高配送服务质量,降低配送成本。​​​​​​​
【填空题】
闲置物资管理目标是严控闲置物资___,提高闲置物资___。​​​​​​​
【填空题】
报废物资管理目标是实现___, 周期性清零。​​​​​​​
【填空题】
闲置物资遵循“同级消化为主、___”的方式再利用。​​​​​​​
【填空题】
报废物资处理分为采用___、___或者进产权交易所交易三种方式​​​​​​​
【填空题】
“大物流、大配送”体系分___个阶段实施, 从“___”逐步进入“区域物流平台+急救包”运作模式。​​​​​​​
【填空题】
公司2013年发布《区域物流平台建设和配置计划》,规划区域物流平台___个。​​​​​​​
【填空题】
新建区域物流平台应按照___开展建设和配置工作。​​​​​​​
【填空题】
区域物流平台运作必须配置满足“区域物流平台仓库群+急救包”业务需要的___配置标准。​​​​​​​
【填空题】
二级仓逐步退出过程中,可适当保留___回收功能。​​​​​​​
【填空题】
公司2014年以10kV台架变为试点,开展“四个标准”建设,其中涉及物流管理的是___。​​​​​​​
【填空题】
公司2014年大力推动___建设工作,双调广蓄电厂、广东东莞、广西钦州、深圳观澜仓等四家试点单位在年底通过了评审验收。​​​​​​​
【填空题】
变压器按冷却介质分类主要有___和油浸式变压器。​​​​​​​