【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
推荐试题
【单选题】
强制保险是由国家(政府)通过法律或行政手段强制实施的一种保险。强制保险的特征是___。
A. 统一性、强制性
B. 全面性、统一性
C. 全面性、强制性
D. 强制性、制约性
【单选题】
按照《民法通则》规定,法人应当具备的条件包括___。
A. 依法成立
B. 有必要的财产或者经费
C. 有自己的名称、组织机构和场所
D. 如不能独立承担民事责任,需能够与他人共同承担民事责任
【单选题】
某电子设备有限公司为全体员工购买团体人寿保险,你认为不能作为被保险人的主题是___。
A. 该公司的在职职工
B. 该公司聘请的临时工
C. 该公司聘请的合同工
D. 该公司的退休人员
【单选题】
根据我国消费者权益保护法的规定,对符合中华人民共和国民事诉讼条件的消费者权益争议,人民法院的正确做法是___。
A. 可以不予受理
B. 说服其申请仲裁
C. 必须受理,暂缓受理
D. 必须受理,及时受理
【单选题】
在保险承保中,对于属于标准风险类别的保险标的,保险公司通常作出的承保决策是___。
A. 正常承保
B. 优惠承保
C. 有条件地承保
D. 拒保
【单选题】
在保险承保中,对于属于优质风险类别的保险标的,保险公司按低于标准费率的费率予以承保。这一承保决策属于___。
A. 正常承保
B. 优惠承保
C. 有条件地承保
D. 拒保
【单选题】
收入保障保险保障的内容之一是___。
A. 被保险人因自杀而致残疾的收入损失
B. 被保险人因吸毒而致残疾的收入损失
C. 被保险人因意外伤害而致残疾的收入损失
D. 被保险人因战争而致残疾的收入损失
【单选题】
在财产保险中,被保险人获得保险保障的最高经济限额是___。
A. 财产及其利益的实际价值
B. 财产及其利益的保险金额
C. 财产及其利益的预期价值
D. 财产及其利益的实际损失
【单选题】
在健康保险经营实务中,保险人为了控制风险、防止逆选择,通常规定一定的期间作为等待期(或观察期)。等待期的适用对象是___。
A. 初次投保健康保险的被保险人
B. 初次投保健康保险的投保人
C. 续效投保健康保险的被保险人
D. 续效投保健康保险的投保人
【单选题】
某被保险人投保100万元的财产保险,在保险期限内,由于第三者的责任导致被保险人的财产损失50万元,被保险人从第三者那里获得赔款40万元。同时被保险人又向保险人要求赔付50万元,对此保险人的处理方式是___。
A. 不予赔付
B. 赔10万元
C. 赔50万元
D. 赔40万元
【单选题】
某公众责任保险保单规定的每次事故赔偿限额是100万元,累计责任限额是1000万元,免赔额为1万元。如果一次公众责任事故导致受害人财产损失56万元,人身损失35万元,且依法全部由被保险人赔偿。则保险人承担的保险赔款金额是___。
A. 89万元
B. 90万元
C. 91万元
D. 100万元
【单选题】
一般来说,保险销售人员在为客户设计保险方案时应遵循的首要原则是___。
A. 高损失频率优先原则
B. 高额损失优先原则
C. 低损失频率优先原则
D. 低额损失优先原则
【单选题】
根据我国机动车辆保险条款的规定,下面情况属于车辆损失保险保险责任的有___等。
A. 保险车辆与其他车辆相撞,造成本车的损失
B. 保险车辆受所载货物撞击,造成本车的损失
C. 保险车辆轮胎爆裂的损失
D. 保险车辆所载货物的损失
【单选题】
保守秘密是保险代理从业人员的一项义务。这里所指的秘密是指___。
A. 客户和所属机构的秘密
B. 仅指客户的秘密
C. 仅指所属机构的秘密
D. 保险代理人相互之间的秘密
【单选题】
在保险实务中,财产保险合同的主体变更主要是指___。
A. 保险人和投保人的变更
B. 投保人和受益人的变更
C. 被保险人和代理人的变更
D. 投保人和被保险人的变更
【单选题】
保险代理从业人员职业道德的基础是___。
A. 诚实信用、公平竞争
B. 守法遵规、专业胜任
C. 客户至上、勤勉尽责
D. 公平竞争、保守秘密
【单选题】
按照《机动车交通事故责任强制保险条例》规定,投保人及其允许的合法驾驶人被称为___。
A. 关系人
B. 当事人
C. 受益人
D. 被保险人
【单选题】
在人身意外伤害保险中,保险期限不足一年,只有几天、几小时甚至更短时间的意外伤害保险属于___。
A. 极短期意外伤害保险
B. 临时性意外伤害保险
C. 一年期意外伤害保险
D. 较短期意外伤害保险
【单选题】
足额保险合同中,保险人支付保险赔款后,在取得保险标的全部所有权的条件下,保险人在处理标的物时所获得的利益如果超过所支付的赔偿金额,对超过部分的正确处理方式是___。
A. 归保险人
B. 归被保险人
C. 归第三者
D. 由保险双方比例分享
【单选题】
在保险活动中,被保险人一旦违反保证义务,保险人的正确处理方式是___。
A. 全部承担赔偿或给付保险金的责任
B. 部分的承担赔偿或给付保险金的责任
C. 不承担赔偿或给付保险金的责任,并不退还保险费
D. 不承担赔偿或给付保险金的责任,但可退还保险费
【单选题】
人身意外伤害保险提取的责任准备金属于___。
A. 长期性责任准备金
B. 寿险性责任准备金
C. 未到期责任准备金
D. 保障性责任准备金
【单选题】
在人身意外伤害保险中,除不可保意外伤害、特约保意外伤害以外的全部意外伤害统称为___。
A. 特殊可保意外伤害
B. 特别可保意外伤害
C. 一般可保意外伤害
D. 特定可保意外伤害
【判断题】
根据我国《保险法》的规定,保险公司的业务范围分为财产保险和人寿保险。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,保险公司若要变更公司或者分支机构的营业场所,应当经保险监督管理机构批准。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,保险代理人是根据被保险人的委托,向保险人收取代理手续费,并在被保险人授权的范围内代位办理保险业务的机构或者个人。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,在财产保险中,保险事故发生时,被保险人无责任尽力采取必要的措施,防止或者减少损失。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,投保人提出保险要求,经保险人同意承保,并就合同条款达成协议,同时已收到投保人交来的全部保险费后,保险合同成立。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,被监管的保险公司的债权债务关系不因接管而发生变化。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,人身保险业务包括人寿保险、非人寿保险等业务。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,在人身保险合同中,如果被保险人同意投保人为其订立合同,视为投保人对被保险人具有保险利益。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,保险合同的形式可以是书面的,也可以是口头的。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,订立保险合同,保险人就保险标的或者被保险人的有关情况提出询问,但投保人、被保险人和受益人可以不予告知。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,保险公司有《中华人民共和国企业破产法》第二条规定情形的,无须经国务院保险监督管理机构同意,保险公司或者其债权人可以依法向人民法院申请重整、和解或者破产清算。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,保险公司应当妥善保管的有关业务经营活动的完整账簿,证及有关资料的保管期限,所有保险合同自生效之日起计算,不得少于五年
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,保险代理人是根据保险人的委托,向保险人收取佣金,并在保险人授权的围内代为办理保险业务的机构或者个人
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,保险事故发生后,投保人,被保险人或者受益人以伪造,变造的有关证明,资料或者其他证据,变造虚假的事故原因或者夸大损失程度的,保险人对其虚假的部分不承担赔偿或者给付保险金的责任
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,保险事故发生后,投保人、 被保险人或者受益人以伪造、变造有关证明、资料或其他证据,编造虚假的事故原因或者夸大损失程度的,保险一经发现,将不承担赔偿或给付保险金的责任。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,在财产保险履行过程中,保险标的的保险价值明显减少的,除合同另有约定外,保险人应当降低保险费,并按日计算退还相应的保险费。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,投保人、 被保险人或者受益人故意造成财产损失的保险事故,骗取保险金,构成犯罪的,依法追究刑事责任。
A. 对
B. 错
【判断题】
根据我国《保险法》的规定,在财产保险保险责任开始后,投保人要求解除合同的,保险人可以收取自保险责任开始之日起至合同解除之日止的保险费,然后将剩余的现金价值退还给投保人。
A. 对
B. 错