【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
推荐试题
【多选题】
相关方人员在输气管道设备设施上工作前,管道企业应对其进行____,交底方和被交底方应在交底记录上签字确认后,方可允许其进入现场参加指定地点的工作。___
A. 设备设施状态
B. 运行隔离情况
C. 安全要求交底
D. 管理制度
【多选题】
介质置换作业包括_______
A. 氮气置换天然气
B. 天然气置换氮气
C. 氮气置换空气
D. 氮气置换空气
【多选题】
安规中所称工作是指从事浙能集团所属输气管道调度____等职务行为。___
A. 运行、维(检、抢)修
B. 检测、检验
C. 技术改造和改(扩)建工程施工
D. 试验
【多选题】
特殊作业许可证必须履行____等程序。___
A. 审核
B. 批准
C. 许可
D. 延期
【多选题】
____人员,必须经过安全教育培训 ,方可进入输气管道现场随同参加指定的工作,不得单独工作。___
A. 新参加工作
B. 实习人员
C. 临时工作
D. 外包人员
【判断题】
安规所称驻守站是指无人值班、有人值守的站场。
A. 对
B. 错
【判断题】
安规所称工作是指从事浙能集团所属输气管道调度、运行、维(检、抢)修、检测、检验、试验、技术改造和改(扩)建工程施工等职务行为。
A. 对
B. 错
【判断题】
工作票签发人、工作负责人、工作许可人三者一定不得相互兼任。
A. 对
B. 错
【判断题】
工作票风险辨识结果涉及八大特殊作业的,应同时办理特殊作业许可证。
A. 对
B. 错
【判断题】
专项施工方案应经管道企业主要负责人组织作业部门、工作许可部门、技术管理部门、安监部门审查批准后,作为办理工作票、特殊作业许可证的依据。
A. 对
B. 错
【判断题】
当发现大量泄漏时,不得靠近泄漏点,应启动ESD,并立即报告站场负责人和调度部门。
A. 对
B. 错
【判断题】
放空前需对放空区域进行辨识,不需要进行评价。
A. 对
B. 错
【判断题】
管线打开过程中发现现场工作条件与专项作业方案不一致时也可继续作业。
A. 对
B. 错
【判断题】
热放空操作前应确认放空区50米范围内无闲杂人员。
A. 对
B. 错
【判断题】
气体检测的位置和所采的样品可以任意选择。
A. 对
B. 错
【判断题】
动火点附近如有阴井、地沟等应进行检查分析,并根据现场的具体情况采取相应的安全防火措施。
A. 对
B. 错
【判断题】
挖掘作业坑除满足施工作业要求外, 应分别有上、下通道,通道坡度宜小于30 度。
A. 对
B. 错
【判断题】
需要动火的设备和管线,清洗、置换和通风后,要进行可燃气体浓度检测。
A. 对
B. 错
【判断题】
超过一天的工作票每天工作开始前,工作负责人和工作许可人需重新检查确认安措落实情况后,方可重新开始工作。
A. 对
B. 错
【判断题】
一类、二类、三类工作许可人应得到调度部门操作指令后方可进行操作。
A. 对
B. 错
【判断题】
中断工作连续3个月以上者,必须重新学习安规,并经考试合格后,方可恢复工作。
A. 对
B. 错
【判断题】
天然气场站中,机动车辆不带防火罩不准进入场区。
A. 对
B. 错
【判断题】
员工“三懂”是指:懂天然气着火爆炸条件、懂天然气着火爆炸的危险性、懂天然气着火爆炸预防措施及补救方法。
A. 对
B. 错
【判断题】
《安全生产法》规定,从业人员有权对本单位安全生产工作中存在的问题提出整改。
A. 对
B. 错
【判断题】
国家规定要求取得相应资格证书才能上岗作业的工作人员,必须经过公司培训后上岗。
A. 对
B. 错
【判断题】
安规所称特殊作业是指涉及输气管道安全运行并具有较大作业风险的动火作业、受限空间作业、货梯升降作业、高处作业、起重作业、管线打开作业、临时用电作业。
A. 对
B. 错
【判断题】
经医师鉴定,无妨碍工作的病症,并应至少每年进行一次体检,特殊岗位,按国家相应规定执行。
A. 对
B. 错
【判断题】
任何人进入站场工艺区或在输气管道本体设备上工作,必须正确佩戴安全帽,交出火种、释放静电,不得穿容易产生火花的带钉鞋和产生静电的化纤类衣物。
A. 对
B. 错
【判断题】
两个及以上单位(包括管道企业自身)在输气管道现场从事交叉作业,必须书面明确交叉作业安全措施,并由管道企业对各方工作负责人进行安全交底,并要求各方安排专门监护人在现场履行对交叉作业的组织协调和监督监护职责。
A. 对
B. 错
【判断题】
《临时/应急抢修单》可由现场监护人签发。
A. 对
B. 错
【判断题】
签发后的工作票需增加工作项目或变更安全措施的,应向签发人报告并经同意,可不填写新的工作票。
A. 对
B. 错
【判断题】
站场工艺区内有多项工作或线路有多处作业的,可填写一张工作票。
A. 对
B. 错
【判断题】
站场工艺区内有多项工作或线路有多处作业的,一个工作负责人能同时负责多项工作,可填写多张工作票。
A. 对
B. 错
【判断题】
若至预定时间,原工作范围内的一部分工作尚未完成,仍需继续工作而不影响恢复输气的,原工作票可先行终结。
A. 对
B. 错
【判断题】
工作票签发人督促、监护工作班成员严格遵守本规程和有关安全规章制度,正确使用作业机具、安全工器具、个人防护用品和应急救援器材。
A. 对
B. 错
【判断题】
工作负责人审查工作票所列安全措施和风险辨识、控制措施是否正确完备,是否符合现场实际。对工作票所列内容有疑问时,应及时向工作票签发人询问清楚,必要时应要求修改或补充。
A. 对
B. 错
【判断题】
从事输气管道设备设施维(检、抢)修、施工等工作的外包单位人员可以担任工作票签发人。
A. 对
B. 错
【判断题】
如工作内容发生变化或工作范围扩大,需要变更安全措施或工艺上的调整的,应重新填写工作票,履行签发、许可手续后,方可继续工作。
A. 对
B. 错
【判断题】
同一架梯子允许两人在上面工作,不准带人移动梯子。
A. 对
B. 错
【判断题】
处于运行状态的生产作业区域内,凡能拆移的动火部件,应拆移至安全地点进行动火。
A. 对
B. 错