【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
推荐试题
【多选题】
下列哪些属于党支部七项组织生活制度___
A. 民主生活会制度
B. 会议制度
C. 报告制度
D. 团日制度
【多选题】
下列属于党的“六项纪律”的是___。
A. 群众纪律
B. 政治纪律
C. 组织纪律
D. 廉洁纪律
E. 生活纪律
【多选题】
下列关于党的基层组织说法正确的有___。
A. 正式党员人数超过3名,不足50名的基层单位,经上级批准,可以成立党支部
B. 党小组是支部的组成部分,不是党的一级组织
C. 党小组是支部的组成部分,也是党的一级组织
D. 党的最基层组织是党支部
【多选题】
关于部队党员发展下列说法正确的有___。
A. 从义务兵中发展党员,每年控制在义务兵总数的5%以内
B. 从士官中发展党员,每年控制在非党员士官总数的30%以内
C. 从义务兵中发展党员,每年控制在义务兵总数的3%以内
D. 从士官中发展党员,每年控制在非党员士官总数的20%以内
【多选题】
根据中央军委《传承红色基因实施纲要》要求,部队常态开展___活动。
A. 读经典、学原著
B. 学传统、爱传统、讲传统
C. 看红色电影、唱红色歌曲、讲红色故事
D. 学习主席讲话
【多选题】
教育应当贴近官兵实际,___。
A. 用真理说服人
B. 用真情感染人
C. 用真诚感染人
D. 用真实打动人
【多选题】
___负责组织实施本单位思想政治教育。
A. 政治指导员
B. 连长
C. 排长
D. 政治教导员
【多选题】
教育可分为___几类。
A. 主题教育
B. 基础教育
C. 经常性思想教育
D. 形势政策教育
【多选题】
党的建设发生的“三个有力”深刻变化是___
A. 弱化党对军队绝对领导的状况得到有力解决
B. 一些党组织软弱乏力问题得到有力纠治
C. 一度被恶化的政治生态得到有力扭转
D. 以上内容均不是
【多选题】
当前我军党的领导和建设方面存在的“不纯”问题是指___
A. 思想不纯
B. 政治不纯
C. 组织不纯
D. 作风不纯
【多选题】
当前我军党的领导和建设方面存在的“弱化”问题是指___
A. 政治意识、政治能力弱化,党委集中统一领导弱化
B. 领导备战打仗本领弱化,党组织原则性、战斗性弱化
C. 党管干部、党管人才弱化,革命意志、奋斗精神弱化
D. 履行管党治党责任弱化
【多选题】
当前我军党的领导和建设方面存在的“三个不纯”“七个弱化”问题造成的严重影响是___
A. 严重破坏党的团结和集中统一
B. 严重危害我军性质、宗旨、本色
C. 严重涣散军心士气和部队战斗力
D. 以上内容均不是
【多选题】
当前反腐败斗争严峻复杂形势是___
A. “四风”反弹回潮隐患仍然存在
B. 反腐败减存量、遏增量任务仍然繁重
C. 正风反腐责任传导不够现象仍然突出
D. 特别是一些人在高压之下仍然不收敛不收手
【多选题】
我军党的领导和党的建设的重要地位作用是___
A. 党的领导和党的建设是我军建设发展的关键
B. 关系强军事业兴衰成败
C. 关系党和国家长治久安
D. 坚持正风肃纪、反腐惩恶
【多选题】
全方位考察干部的政治情况是指___
A. 政治忠诚
B. 政治定力
C. 政治担当
D. 政治能力
E. 政治自律
【多选题】
全面从严治党、全面从严治军要坚持___
A. 无禁区、全覆盖、零容忍
B. 重遏制、强高压、长震慑
C. 行贿受贿一起查
D. 以上内容均不是
【多选题】
全面从严治党、全面从严治军要坚决___
A. 防止军内形成利益集团
B. 防范领导干部被“围猎”、被绑架
C. 扭转恶化的政治生态
D. 以上内容均不是
【填空题】
1.党的宗旨:___。
【填空题】
2.党的组织原则:___。
【填空题】
3.党的三大作风:___、密切联系群众、___。
【填空题】
4.党的思想路线:___,一切从实际出发,理论联系实践,___。
【填空题】
5.“三会一课”:定期召开___、___、___,按时上好党课。
【填空题】
6、党支部职责:管理党员、___、监督党员、___、宣传群众、___、服务群众。
【填空题】
7.“四个自信”:坚持中国特色社会主义___、理论自信、___、文化自信。
【填空题】
8.“四个全面”:全面建成小康社会,___,全面依法治国,___。
【填空题】
9.民主集中制“四个服从”内容:___、少数服从多数、___、___。
【填空题】
10.“三型”政党:___、服务型、___的马克思主义政党。
【填空题】
11.党的基层组织:正式党员人数超过3名,不足___名的基层单位,经上级批准,可以成立党支部,其中党员人数超过7名的,应设立支部委员会,党的最基层组织是党支部,党小组是落实组织生活<“三会一课”中的党小组会>的重要保证,每一位党员不论职务高低都应该纳入党小组,党员人数少的支部也可以不划分党小组,党小组是支部的组成部分,不是党的一级组织。
【填空题】
12.十六字方针:___、民主集中、___、___。
【填空题】
13.“三严三实”:___、严以用权、___;___、创业要实、___。
【填空题】
14.“两学一做”学习教育。___、___、___。
【填空题】
15.党的“六项纪律”:政治纪律、___、___、___、群众纪律、___。
【填空题】
16.优秀共产党员:“五个带头”带头___,带头践行宗旨,带头___,___,带头___。
【填空题】
17. 部队党员发展:从义务兵中发展党员,每年控制在义务兵总数的5%以内,<边远艰苦地区可提高10%>;从士官中发展党员,每年控制在非党员士官总数的30%以内,初级士官非党员总数的___以内<边远地区可分别提高10%>。
【填空题】
18.四个伟“伟大”:___、伟大工程、___、___。
【填空题】
19.党的全国代表大会每几年举行一次:___。
【单选题】
军人着军服时通常行:___。
A. 举手礼
B. 注目礼
C. 举枪礼
D. 鞠躬礼
【单选题】
着作训服时,通常穿___。
A. 作战靴
B. 作训鞋
C. 常服皮鞋
D. 以上三种都可以
【单选题】
以下哪个选项是错误的___。
A. 军人非因公外出可以着军服
B. 军人非因公外出可以着便服
C. 着军服时可以着深色便袜
D. 内着非制式衣服的不得外露
【单选题】
以下哪个选项是正确的___。
A. 男军人可以蓄胡须
B. 男军人可以留大鬓角
C. 女军人发辫可以过肩
D. 军人因生理原因或者医疗需要可以留规定之外的发型