【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
推荐试题
【单选题】
PLC 改造设备控制是采用可编程序控制器 PLC 替换原设备控制中庞大而复杂的 ___控制装置。
A. 模拟
B. 继电器
C. 时序逻辑电路
【单选题】
高性能的高压变频器调速装置的主电路开关器件采用___。
A. 功率场效应晶体管
B. 电力晶体管
C. 绝缘栅双极型晶体管
D. 晶闸管
【单选题】
进行理论教学培训时,除依据教材外,应结合本职业特点讲解些关于___的知识。
A. 案例
B. “四新”应用
C. 科技动态
D. 与本职业无关
【单选题】
CMOS 集成电路的输人端___。
A. 不允许悬空
B. 允许悬空
C. 必须悬空
【单选题】
842lBCD 码(0010 1000 0011) 842lBCD 所表示的十进制数是___。
A. 643
B. 283
C. 创 0
D. 683
【单选题】
直流电动机的调速方案,越来越趋向于采用___调速系统。
A. 直流发电机一直流电动机
B. 交磁电机扩大机一直流电动机
C. 晶闸管可控整流一直流电动机
【单选题】
在数控指令中, T 代码用于___。
A. 主轴控制
B. 换刀
C. 辅助功能
【单选题】
绝缘栅双极型晶体管的导通与关断是由___来控制。
A. 栅极电流
B. 发射极电流
C. 栅极电压
D. 发射极电压
【单选题】
能够实现有源逆变的电路为___。
A. 三相半控桥式整流电路
B. 三相全控桥式整流电路
C. 单相半控桥式整流电路
D. 单相半波可控整流电路
【单选题】
晶闸管供电直流电动机可逆调速系统主电路中的环流是___电动机或负载的。
A. 不流过
B. 正向流过
C. 反向流过
D. 正向与反向交替流过
【单选题】
自然环流可逆调速系统,若正组晶闸管处于整流状态,则反组必然处于___ 状态。
A. 待逆变
B. 逆变
C. 待整流
D. 整流
【单选题】
在自然环流可逆调速系统中,均衡电抗器(环流电抗器)所起的作用是___。
A. 限制动态环流
B. 使主电路电流连续
C. 用来平波
D. 限制静态环流
【单选题】
在自然环流可逆调速系统中,触发器的初始相位角。和最小逆变角月分别是 ___。
A. 0°和 30°
B. 30°和 90°
C. 90°和0°
D. 90°和 30°
【单选题】
在逻辑无环流可逆调速系统中,逻辑装置有以下工作状态: ① 检测主回路电流信号为零; ② 检测转矩极性变号; ③ 经过“触发等待时间”的延时、发出开放原来未工作的晶闸管 装置的信号; ④ 经过“关断等待时间”的延时,发出封锁原来工作的晶闸管装置的信号。以上过程的正确顺序为___。
A. ① -② -③ -④
B. -① -② - ④ - ③
C. ② - ① - ④ - ③
D. ② - ① - ③ - ④
【单选题】
双闭环调速系统包括电流环和速度环,其中两环之间的关系是___。
A. 电流环为内环,速度环为外环
B. 电流环为外环,速度环为内环
C. 电流环为内环,速度环也为内环
D. 电流环为外环,速度环也为外环
【单选题】
自动控制系统中反馈检测元件的精度对控制系统的精度___。
A. 无影响
B. 有影响
C. 不能确定
D. 有影响,但被闭环系统补偿了
【单选题】
在速度、电流双闭环直流调速系统中,在起动、过载和堵转的条件下___。
A. 速度调节器起主要作用
B. 电流调节器起主要作用
C. 两个调节器都起作用
D. 两个调节器都不起作用
【单选题】
在速度、电流双闭环直流调速系统中,在负载变化时出现偏差,消除偏差主要靠 ___。
A. 速度调节器
B. 电流调节器
C. 电流、速度调节器
D. 比例、积分调节器
【单选题】
逻辑无环流可逆调速系统与自然环流可逆系统在主回路上的主要区别是___。
A. 增加了逻辑装置
B. 取消了环流电抗器
C. 采用了交叉连接线路
D. 采用了反并联接法
【单选题】
电流调节器( ACR )的调试不包括___。
A. 调整输出电流值
B. 调整输出正、负电压限幅值
C. 测定输人输出特性
D. 测定 PI 特性
【单选题】
在U/f控制方式下,当输出频率比较低时,会出现输出转矩不足的情况,要求变频器具有___功能。
A. 频率偏置
B. 转差补偿
C. 转矩补偿
D. 段速控制
【单选题】
PWM 调制器产生的调宽脉冲的特点是___。
A. 频率不变,脉宽随控制信号的变化而变化
B. 频率变化,脉宽由频率发生器产生的脉冲本身决定
C. 频率不变,脉宽也不变
D. 频率变化,脉宽随控制信号的变化而变化
【单选题】
在变频器装置中,中间直流环节采用大电容滤波、无法实现回馈制动的是___ 变频器。
A. 电压源型
B. 电流源型
C. 交一交型
D. 可控整流型
【单选题】
在起重机械中,由于变频器的数量较多,可以采用公用母线方式,即所有变频器的___是公用的。
A. 交流电源部分
B. 整流部分
C. 逆变部分
D. 电压输出部分
【单选题】
对电动机基本频率向上的变频调速属于___调速。
A. 转矩补偿
B. 频率偏置
C. 段速控制
D. 弱磁恒功率
【单选题】
采用空间矢量分析方法,采用定子磁场定向,直接对逆变器的开关状态进行控制的技术是___。
A. 矢量控制
B. 恒磁通控制
C. 恒转矩控制
D. 直接转矩控制
【单选题】
工业洗衣机甩干时转速快,洗涤时转速慢,烘干时转速更慢,故需要变频器的 ___功能。
A. 多段速
B. 恒转矩
C. 恒磁通
D. 恒转差率
【单选题】
不适应变频调速系统的制动方式是___。
A. 直流制动
B. 回馈制动
C. 反接制动
D. 能耗制动
【单选题】
变频器升降速模式中, ___适用于带式输送机、纺织机一类的负载。
A. 线性方式
B. S 型方式
C. 前半 5
D. 后半 S
【单选题】
主要用于机械准确停车控制和制止电动机在起动前由于外因引起的不规则自由旋转的通用变频器制动方案是___。
A. 直流制动
B. 制动单元丫制动电阻
C. 回馈制动
D. 机械抱闸制动
【单选题】
变频器超载输出电流超过额定工作电流的 150 %时,规定持续时间不超过___。
A. 0、55
B. 605
C. 6005
D. 10min
【单选题】
由于模拟量信号的抗干扰能力较差、因此必须采用屏蔽线,在连接时,屏蔽层靠近变频器一侧应___、另一端应悬空。
A. 悬空
B. 控制电路的公共端
C. 接地
D. 接继电输出端子
【单选题】
变频器的外接给定配置不包括___。
A. 外接电压给定信号控制
B. 外接电流给定信号控制
C. 电阻给定
D. 辅助给定
【单选题】
用微机控制变频器网络时,如通信距离较远,应采用___通信口通信。
A. RS-485
B. RS-232
C. RS-422
D. 采用双绞线
【单选题】
如果变频器散热不好,温度一旦超过某一数值,会立即导致逆变管的损坏,时,每带走 Ikw 热量所需要的风量为___。
A. 0、1 m3 / 5
B. 0、ICm3 / 5
C. lm3 / sD , ICm3 / s
【单选题】
一种检测精密位移,常用作各种机床的位移检测装置是___传感器。
A. 自整角机
B. 旋转变压器
C. 光电编码器
D. 感应同步器
【单选题】
在步进电动机驱动电路中,脉冲信号经___放大器后控制步进电动机励磁绕组。
A. 电流
B. 功率
C. 电压
D. 直流
【单选题】
I/O 接口芯片 8255A 有___个可编程(选择其工作方式的)通道。
A. 一
B. 二
C. 三
D. 四
【单选题】
三相桥式电路平均逆变电压UD=___。
A. 1.17 U2CosB
B. -1.17U2CosB
C. 2.34 U2CosB
D. -2.34 U2CosB
【多选题】
在 A 系列龙门刨床主电路中励磁机 G2 的基本作用是___。
A. 为发电机提供励磁电流
B. 为控制系统提供控制电源
C. 参与调速