【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
推荐试题
【多选题】
下列关于集中器安装位置选择要求的说法,正确的有()。
A. A.一般在台区的中心位置。
B. B.有三相四线供电电源。
C. C.考虑CDMA或GPRS通讯的可靠性。
D. D.尽可能安装在供电线路末端。
【多选题】
采用GPRS通信方式的计量自动化终端终端,现场调试上线需要设置的参数主要包括()。
A. A.主站IP地址
B. B.端口号
C. C.APN
D. D.测量点参数
【多选题】
居民集中抄表本地数据采集组网模式有( )。
A. A.集中器+载波表
B. B.集中器+采集器+RS-485表
C. C.集中器+微功率无线表
D. D.主站+GPRS表
【多选题】
以下哪些参数是终端与表计通讯有关联的()?
A. A.电表地址
B. B.波特率
C. C.通信规约
D. D.电表型号
【多选题】
在计量自动化系统中,实时召测某块电表数据失败,下列原因分析正确的有( )。
A. A.终端内未设置该电表通信参数或参数设置错误。
B. B.终端与该电表的通信信道故障。
C. C.该电表故障或未通电。
D. D.主站没有对应设置采集任务。
【多选题】
新系统退补流程主要有( )。
A. A.冲正退补
B. B.电量退补
C. C.电费退补
D. D.电价退补
【多选题】
根据现行居民电价政策,下列选项中,应执行居民合表户电价的有( )。
A. A.学生生活用电
B. B.教堂、寺庙生活用电
C. C.福利院生活用电
D. D.实行“一户一表”的住宅小区居民用户
【多选题】
按最新销售电价分类说明,以下属于大工业电价适用范围的有( )。(根据桂价格【2014】122号文)
A. A.军事动力用电
B. B.化肥生产用电
C. C.城乡污水处理厂生产用电
D. D.商场空调用电
【多选题】
根据现行居民电价政策,实施居民阶梯电价的目的意义包括以下哪几项。
A. A.有利于理顺电价机制
B. B.有利于建立公平负担的用电机制
C. C.有利于促进节能减排
D. D.有利于改善员工福利
【多选题】
以下用户,执行非居民电价的有( )。(根据桂价格【2014】122号文)
A. A.公路照明用电
B. B.收费站用电
C. C.公共厕所用电
D. D.商场用电
【多选题】
根据《广西壮族自治区物价局关于降低一般工商业电价有关事项的通知》(桂价格〔2018〕43号)的规定,基本电费可以按()计算。
A. A.变压器容量
B. B.最大需量合同值
C. C.实际最大需量
D. D.单台设备的最大容量
【多选题】
依据南网公司《业扩报装及配套项目管理办法》(2017版),供电方案应依据()以及综合现场勘查结果等因素确定。
A. A.国家有关政策和规定
B. B.电网运行和规划建设情况
C. C.客户的用电需求
D. D.客户履约能力
【多选题】
广西电网公司业扩五项禁令第一条内容包含:
A. A.严禁人为设置障碍,拖延客户用电
B. B.严禁对客户“吃、拿、卡、要”
C. C.严禁人为造成业扩报装受限
D. D.严禁不给客户报装
【多选题】
《广西电网有限责任公司公司远程和社会化服务渠道管理细则》中由95598呼叫中心履行服务调度职责,负责对( )全过程监控及客户问题处理全程进行跟踪、协调。
A. A.故障报修
B. B.快速复电
C. C.停电事件
D. D.意见及建议
【多选题】
《广西电网有限责任公司公司远程和社会化服务渠道管理细则》中社会化服务渠道:指供电企业通过( )为用电客户提供服务的渠道。
A. A.政府有关机构
B. B.社会第三方
C. C.公共资源
D. D.用户资源
【多选题】
电能表按照结构分为( )。
A. A.电子式电能表
B. B.机电一体式电能表
C. C.感应式电能表
D. D.电磁式电能表
【多选题】
互感器的使用有什么好处( )。
A. A.可扩大仪表和继电器的量程
B. B.有利于仪表和继电器的规范化生产,降低生产成本
C. C.用互感器将高电压与仪表、继电器加回路隔开,能保证仪表、继电器回路及工作人员的安全
D. D.可缩小仪表和继电器的量程
【多选题】
运行中的电流互感器开路将可能产生以下哪些后果()。
A. A.二次侧产生高压
B. B.互感器可能烧坏
C. C.互感器误差增大
D. D.互感器一次侧电流增大
【多选题】
当终端通电后无任何指示灯亮时应检查( )。
A. A.220V电源是否接好
B. B.交流熔断器是否熔断
C. C.稳压电源输出是否正常
D. D.通讯模块是否正常
【多选题】
以下( )原因会导致终端因自身原因而掉线。
A. A.电源
B. B.天线
C. C.软件设计
D. D.电池
【多选题】
《DL_T448-2016电能计量装置技术管理规程》规定,封印的安装位置为( )等。
A. A.互感器二次回路的各接线端子
B. B.电能表接线端子盒
C. C.电能计量柜(箱、屏)门
D. D.表后开关室翻盖处
【多选题】
生产经营单位的从业人员有权了解其作业场所和工作岗位存在的()、()及(),有权对本单位的安全生产工作提出建议。
A. A.危险因素
B. B.防范措施
C. C.事故应急措施
D. D.风险评估
【多选题】
参与公司系统电气工作的外单位工作人员,工作前,设备运行管理单位应告知:()。
A. A.简单
B. B.危险点
C. C.安全注意事项
D. D.作业时间
【多选题】
直接经济损失包括以下:()。
A. A. 人员伤亡后所支出的费用,如医疗费用、丧葬及抚恤费用、补助及救济费用、歇工工资等。
B. B.事故(事件)造成的财产损失费用,如固定资产损失价值、流动资产损失价值等。
C. C.事故(事件)善后处理费用,如处理事故(事件)的事务性费用、现场抢救费用、现场清理费用、事故罚款和赔偿费用等。
D. D.工作人员的加班费和劳务费
【多选题】
电力事故(事件)分为()。
A. A.电力人身伤亡事故(事件)
B. B.设备事故(事件)
C. C.电力安全事故(事件)
D. D.电网安全事故(事件)
【多选题】
计算机打印的操作票正文采用()。
A. A.四号
B. B.宋体
C. C.黑色字
D. D.三号
【多选题】
工作票签发人:是指以确认()、工作人员()和工作票上所填安全措施是否()的审核签发人员。
A. A.工作必要性
B. B.安全资质
C. C.正确完备
D. D.落实到位
【多选题】
填写工作票应对照()或(),填写设备名称、编号应与现场实际的()相符合。
A. A.接线图
B. B.模拟图板
C. C.名称和编号
D. D.线路设备
【多选题】
户外安装的(),其进出线宜采用电缆。
A. A.箱式变电站
B. B.电缆环网柜
C. C.电缆分接箱
D. D.柱上断路器
【多选题】
真空断路器的金属屏蔽罩的作用包括()。
A. A.提高弧隙击穿电压
B. B.防止弧隙金属蒸汽喷溅到绝缘外壳内壁
C. C.吸附电弧燃烧时产生的金属蒸汽
D. D.降低弧隙击穿电压
【多选题】
以下哪些排列方式属于负相序()。
A. A.BAC
B. B.CBA
C. C.ACB
D. D.CAB
【多选题】
评价低压计划停电服务质量工作内容包括()
A. A.实施停电是否按要求将信息传递给服务调度。
B. B.每月对计划停电的服务质量进行统计分析
C. C.延期送电是否按要求通知客户
D. D.临时停电是否按时停电
【多选题】
供电企业应就披露的供电服务信息建立健全信息保密审查制度,明确审查责任和程序,不得披露( )供电服务信息。
A. A.涉及国家秘密
B. B.商业秘密
C. C.个人隐私
D. D.有可能影响公共安全和社会稳定
【多选题】
自我情绪管理的方法有哪些?( )。
A. A.意识调节法
B. B.自我暗示法
C. C.环境转换法
D. D.压抑升华法
【多选题】
以下描述符合同理心规则的选项有( )。
A. A.站在对方的角度思考问题
B. B.能专心听对方说话
C. C.能正确解读对方说话的含义
D. D.能正确辩识对方情绪
【多选题】
服务质量指在( )等工作中,能够履行岗位职责,正确执行与落实安全责任、服务规范、服务标准、服务承诺和相关管理制度及规定等。
A. A.现场服务
B. B.窗口服务
C. C.95598服务
D. D.抢修服务
【多选题】
下列选项中,属于供用电合同条款的有( )。
A. A.供电方式、供电质量、供电电压和供电时间
B. B.用电容量和供电地址、用电性质
C. C.计量方式和电价、电费结算方式
D. D.供用电设施维护责任的划分
【多选题】
以下属于事业单位身份证明的是( )。
A. A.事业单位法人登记证
B. B.组织机构代码证
C. C.政府主管部门批准其成立的文件
D. D.上级单位证明文件
【多选题】
由客户( )造成房屋倒塌等原因引起的,可批量办理销户业务。
A. A.整体拆迁
B. B.地震
C. C.水灾
D. D.火灾
【多选题】
下列属于收费员职责的是( )。
A. A.负责领用电费发票
B. B.负责收费后的开票、销账
C. C.负责当天实收日报表的统计填报
D. D.负责日终将款项存入银行电费资金专户