【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AD
解析
暂无解析
相关试题
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
推荐试题
【单选题】
下列描述IgG错误的是A.是人血中含量最多的抗体___
A. 是人血中含量最多的抗体(E)
B. 是人体内最重要的抗体
C. 是唯一能穿过胎盘的抗体
D. 胎盘球蛋白.丙种球蛋白中的抗体主要是IgG
E. 凝集实验是抗原抗体反应,其抗体主要是IgG
【单选题】
疟疾发作时,出现寒战.高热.出汗等症状的反应是___
A. 过敏反应
B. 变态反应
C. 吞噬反应
D. 异性蛋白反应
E. 其余选项均不是
【单选题】
以下哪项不符合水痘的特点___
A. 潜伏期10~21天
B. 为痒性皮疹从丘疹变为疱疹
C. 皮疹最多见于面部与四肢
D. 发热1~2天后出现皮疹E.皮疹一般在3~5天内分批出齐
E. 皮疹一般在3~5天内分批出齐
【单选题】
中毒型细菌性痢疾最严重的临床症状是___
A. 高热
B. 惊厥
C. 呼吸衰竭
D. 循环衰竭
E. 昏迷
【单选题】
病程的何时是流行性乙型脑炎的极期___
A. 1~3天
B. 3~4天
C. 1~10天
D. 4~10天
E. 10~20天
【单选题】
___
A. 急性重型肝炎
B. 亚急性重型肝炎
C. 慢性重型肝炎
D. 慢性肝炎重度
E. 瘀胆型肝炎
【单选题】
某患者感染HIV后并发卡氏肺孢子感染及卡波西肉瘤,此时属于艾滋病的哪一期___
A. 潜伏期
B. 急性期
C. 无症状期
D. 持续性全身淋巴结病期
E. 艾滋病期
【单选题】
羊红细胞溶血试验可用来鉴别以下哪项___
A. 痢疾杆菌与伤寒杆菌
B. 伤寒杆菌与副伤寒杆菌
C. 痢疾杆菌与霍乱弧菌
D. 痢疾杆菌与副霍乱弧菌
E. 霍乱弧菌与副霍乱弧菌
【单选题】
流行性出血热继发感染易发于下列哪期___
A. 发热期至低血压休克期
B. 低血压休克期至少尿期
C. 少尿期至多尿期
D. 多尿期至恢复期
E. 恢复期后
【单选题】
霍乱患者由于下列哪项临床上会出现剧烈水样腹泻___
A. 细菌的内毒素引起肠细胞分泌功能增加
B. 细菌的外毒素激活环磷腺苷介导系统引起小肠过度分泌
C. 活菌产生的酶引起粘膜损害和炎症
D. 弧菌溶血引起自主神经系统失调
E. 胆汁分泌减少引起肠道功能紊乱
【单选题】
哪个部位是细菌性痢疾病理改变最严重的部位___
A. 盲肠
B. 回肠末端
C. 直肠和乙状结肠
D. 升结肠
E. 降结肠
【单选题】
钩端螺旋体病致病性与下列哪项有关___
A. 与钩端螺旋体活跃的螺旋运动及所含的透明质酸酶有关
B. 与大量繁殖的钩端螺旋体及其死亡后释放出的代谢产物及毒素等有关
C. 与其能分泌外毒素有关
D. 与其能分泌溶组织酶有关
E. 与其能引起机体的过敏反应有关
【单选题】
下列出疹性传染病最早出疹的疾病是___
A. 麻疹
B. 天花
C. 猩红热
D. 伤寒
E. 水痘
【单选题】
某传染病在一个较小的范围内短时间突然出现大批同类病例称为___
A. 流行
B. 大流行
C. 散发
D. 暴发
E. 其余选项都是
【单选题】
自然疫源性传染病主要是指___
A. 以虫媒为传染媒介的传染病
B. 所有地方性传染病都是自然疫源性疾病
C. 以野生动物为主要传染源的动物性传染病
D. 以家畜家禽为主要传染源的传染病
E. 凡是动物源性传染病都是自然疫源性疾病
【单选题】
人体能对抗再感染的主要原因是___
A. 非特异性免疫功能
B. 特异性免疫功能
C. 预防用药
D. 注射疫苗
E. 增强体质
【单选题】
以下哪项是钩端螺旋体病的病理变化基础___
A. 肺毛细血管出血
B. 急性肝功能不全
C. 急性肾功能不全
D. 播散性血管内凝血
E. 全身毛细血管中毒性损害
【单选题】
钩端螺旋体病在病程缓解后的3~4天,可能再次出现发热的原因是___
A. 再燃
B. 复发
C. 先后两批病原体侵入
D. 青霉素治疗后反应
E. 迟发型变态反应
【单选题】
下列哪项不是钩端螺体病后的并发症___
A. 后发热
B. 虹膜睫状体炎
C. 反应性脑膜炎
D. 肾损害
E. 闭塞性脑动脉炎
【单选题】
传染病在某一地区流行后人群感染状态的一般规律是___
A. 显性感染多
B. 隐性感染多
C. 潜在性感染多
D. 健康带菌者多
E. 病后带菌者多
【单选题】
患者,男性,起病较缓慢,有全身不适.乏力.食欲不振.厌油.恶心.呕吐.上腹不适.肝区隐痛.肝脏肿大,无黄疸.病程在3个月以内,该患者可能患的疾病是___
A. 急性黄疸型肝炎
B. 急性无黄疸型肝炎
C. 慢性肝炎
D. 瘀胆型肝炎
E. 肝炎后肝硬化
【单选题】
在传染过程中,对防治流行扩散有积极意义的是下列哪种感染类型增多___
A. 病原体被清除
B. 潜伏性感染
C. 隐性感染
D. 病原携带状态
E. 显性感染
【单选题】
普通型流脑的临床特点是___
A. 明显上呼吸道症状,头痛,呕吐,颈强直
B. 急性发热,头痛,呕吐,嗜睡,抽搐
C. 高热,头痛,呕吐,皮肤出血点,脑膜刺激征
D. 突发高热,精神萎糜,大块瘀斑,休克
E. 高热.头痛.皮肤出血点.呼吸衰竭
【单选题】
哪项是登革热最常见的并发症___
A. 急性血管内溶血
B. 败血症
C. 呼吸衰竭
D. 肾功能衰竭
E. 心肌炎
【单选题】
某患者感染HIV后2~6周,患者出现血清样症状,持续1~2周后好转,此时属于艾滋病的哪一期___
A. 潜伏期
B. 急性期
C. 无症状期
D. 持续性全身淋巴结病期
E. 艾滋病期
【单选题】
伤寒最显著的病理改变部位是在___
A. 肠系膜淋巴结
B. 回盲部
C. 回肠下段的集合淋巴结和孤立的淋巴细胞
D. 乙状结肠
E. 脾脏
【单选题】
在传染过程中,下列疾病哪种表现为显性感染多___
A. 乙型脑炎
B. 脊髓灰质炎
C. 流行性脑脊髓膜炎
D. 白喉
E. 麻疹
【单选题】
下列何种疾病在没有人工免疫的情况下发病率最高___
A. 脊髓灰质炎
B. 麻疹
C. 细菌性痢疾
D. 白喉
E. 病毒性肝炎
【单选题】
下列哪项护理诊断与机会性感染有关___
A. 营养失调
B. 疼痛
C. 腹泻
D. 疲乏
E. 绝望
【单选题】
人可以成为其第二中间宿主.转续宿主甚至终宿主的绦虫是___
A. 猪带绦虫
B. 牛带绦虫
C. 细粒棘球绦虫
D. 多房棘球条虫
E. 曼氏迭宫绦虫
【单选题】
下列有关休息的陈述哪一项不正确 ___
A. 休息就是睡觉
B. 休息是指在一定时间内减少活动
C. 休息意味着身心感到平静,宽慰和放松
D. 休息可解除人体的疲劳
E. 休息可降低精神上的压力
【单选题】
不影响个体活动选择的因素为 ___
A. 性别
B. 年龄
C. 身体状况
D. 智商
E. 场所
【单选题】
下列哪一项不是活动减少对机体造成的影响___
A. 便秘
B. 压疮
C. 高血压 D
D. 坠积性肺炎
E. 下肢静脉血栓
【单选题】
肌肉完全失去活动后几小时就会发生萎缩现象___
A. 12小时
B. 24小时
C. 48小时
D. 72小时
E. 三天以后
【单选题】
下列有关睡眠的定义哪一项正确 ___
A. 睡眠占人的一生约1/3的时间
B. 睡眠是最自然的休息方式
C. 睡眠是一种知觉的特殊状态
D. 睡眠中人对特殊刺激会产生选择性的知觉
E. 睡眠是周期发生的知觉的特殊状态
【单选题】
睡眠时相中睡得最浅的一期是 ___
A. 慢波睡眠第1时相
B. 慢波睡眠第2时相
C. 慢波睡眠第3时相
D. 慢波睡眠第4时相
E. 快波睡眠初期
【单选题】
下列有关失眠的叙述,错误的是 ___
A. 原发性失眠是一种慢性综合征
B. 患者经常打哈欠
C. 患者清醒时可感觉激动不安
D. 患者可有轻度的一过性眼球震颤
E. NREM第3.4时相易被唤醒
【单选题】
下列有关睡眠过多的陈述,错误的是 ___
A. 可见于由于忧郁患者
B. 睡眠总的时间延长
C. 各时相所占百分比正常
D. 睡眠时相的周期延长
E. 与进食失调和病态肥胖有关
【单选题】
每个睡眠时相周期平均时间为 ___
A. 80分钟
B. 90分钟
C. 100分钟
D. 110分钟
E. 120分钟
【单选题】
下列哪一项不属于活动能力丧失对个体造成的影响 ___
A. 自卑
B. 敏感
C. 猜疑
D. 生理功能增强
E. 与社会交流活动隔离