【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
推荐试题
【判断题】
道岔是轨道的一个重要组成部分,也是轨道的薄弱环节之一。
A. 对
B. 错
【判断题】
F A S系统包括火警自动报警和自动灭火控制两个主要功能。
A. 对
B. 错
【判断题】
站台门系统是安装于地铁车站站台边缘,用以提高运营安全系数、改善乘客候车环境、节约运营成本的一套机电一体化的机电设备系统。
A. 对
B. 错
【判断题】
88尖轨与基本轨之间存在异物侵入时,手摇道岔作业人员应继续将道岔操纵至相关位置。
A. 对
B. 错
【判断题】
89所谓职业道德,就是同人们的职业活动紧密联系的符合职业特点所要求的道德准则、道德情操与道德品质的总和。
A. 对
B. 错
【判断题】
90正确价值观的确立,良好社会风尚的形成,离不开舆论力量的倡导和推动。
A. 对
B. 错
【判断题】
91职业道德基本内容包括:热爱本职、忠于职守、文明待客、热情服务。
A. 对
B. 错
【判断题】
责任心和职业道德直接影响着道路交通安全,关系着社会的安定和谐。因此,驾驶员具有良好的社会责任感和职业道德是做好运输服务工作的基础。
A. 对
B. 错
【判断题】
93不同的行业和不同的职业,有不同的职业道德标准,体现了职业道德的多样性。
A. 对
B. 错
【判断题】
94社会主义道德建设的基本要求是爱祖国、爱人民、爱劳动、爱科学、爱社会主义。
A. 对
B. 错
【判断题】
95不准进行毫无防护的高处作业。
A. 对
B. 错
【判断题】
96安检电源属专用电源,不得外接临时电源。
A. 对
B. 错
【判断题】
热忱服务,文明生产[服务]直接关系到企业的声誉和经营的效果 。
A. 对
B. 错
【判断题】
确立正确的人生观是职业道德修养的前提。
A. 对
B. 错
【判断题】
正常照明包括:工作照明、节点照明、广告照明设备及附属用房照明、安全照明、标志照明.
A. 对
B. 错
【判断题】
100所谓故障—安全,就是要求信号设备或系统一旦发生安全故障后能防止出现灾难性后果,自动导向安全一方的主要设计原则。
A. 对
B. 错
【判断题】
197行车时间以北京时间为准,从零时起计算,实行24小时制。
A. 对
B. 错
【判断题】
198道岔是使列车由一条线路跨越另一条线路的设备。
A. 对
B. 错
【判断题】
199地铁通信是构成地铁各部门之间有机联系、实现运输集中统一指挥、行车调度自动化、列车运行自动化,提高运输效率的必备工具。
A. 对
B. 错
【判断题】
200列车在接近区段时,办理取消进路操作,可以关闭信号,同时进路解锁。
A. 对
B. 错
【判断题】
201采用行车闭塞法行车时,一个闭塞分区同时只允许一趟列车占用。
A. 对
B. 错
【判断题】
202地铁通信系统在灾害或事故的情况下应作为应急处理、抢险救援的手段。
A. 对
B. 错
【判断题】
203轨道交通企业规定指挥列车运行的命令和口头指示,只能由行车调度发布
A. 对
B. 错
【判断题】
204正常取消进路时,进路白光带先熄灭,信号再关闭。
A. 对
B. 错
【判断题】
205车站信号控制台站控与中控[或遥控]方式的转换,须根据调度命令办理。
A. 对
B. 错
【判断题】
206运营期间站台门端门应关闭且锁紧。
A. 对
B. 错
【判断题】
207施工作业防护遵循"谁设置谁撤除"的原则,实行“自控、互控、他控”。
A. 对
B. 错
【判断题】
208所有施工作业防护使用的警示标识一律不得放置在钢轨面上,应放置在施工作业区域两端轨道中央的道床上。
A. 对
B. 错
【判断题】
209施工计划及相关命令是施工请销点的凭证。
A. 对
B. 错
【判断题】
210原则上同一时间段一个施工负责人只能负责一项施工作业。
A. 对
B. 错
【判断题】
211开启重要设备柜施工作业时,原则上执行“一人操作,一人监护”的管理要求。
A. 对
B. 错
【判断题】
212遇到跨越站内站间时,由车站工作人员在作业地点外两端轨道中央的道床上设置警示标识防护。
A. 对
B. 错
【判断题】
213动火后“一清”:现场负责人与监护人在动火后,彻底清理现场火种,确认无遗留隐患后方可离开
A. 对
B. 错
【判断题】
214车站设备房,车站备品库,O C C,区间,变电站[所],属于一级动火范围。
A. 对
B. 错
【判断题】
215当按下综控室AFC紧急释放按钮后,车站检票机的闸门全部打开,车站出站信号机立即关闭。
A. 对
B. 错
【判断题】
216联络线:连接两条独立运营的线路或正线与车辆段间的线路。
A. 对
B. 错
【判断题】
217列车运行图基本要素主要有列车区间运行时分、列车停站时分、列车折返时分、追踪列车间隔时间等
A. 对
B. 错
【判断题】
线路通过能力是在单位时间内[通常是高峰小时]能够通过的最大列车数。
A. 对
B. 错
【判断题】
I B P盘是车站监控工作站的紧急后备监控盘,当监控工作站发生故障不能使用时,使用I B P盘对部分车站设备进行临时监控。
A. 对
B. 错
【判断题】
220在车站站台、站厅、通道、出入口进行的施工作业,施工单位无需与行车调度员联系,由车站综控员依据施工计划受理此类施工作业。
A. 对
B. 错