【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
推荐试题
【填空题】
物资信息资料卡内容应涵盖货物入库存储和取货的所有参数,包括规格型号、技术参数、___、___、适合存放的仓储区等。​​​​​​​
【填空题】
属于在《中国南方电网有限责任公司仓储配送管理办法2014版》中规定的物资采购增值税专用发票管理的原则有及时取得、___、按期认证 应抵尽抵。​​​​​​​
【填空题】
在《中国南方电网有限责任公司仓储配送管理办法2014版》中规定:入库是指物资完成验收入账、___的过程。​​​​​​​
【填空题】
《中国南方电网有限责任公司出库业务指导书2014版》中规定:出库指物资运出仓库,并___状态的过程,包括移库、调拨、补仓、领用物资等。​​​​​​​
【填空题】
物资盘点前进行仓库锁定,盘点期间仓库不允许再发生物资的___。​​​​​​​
【填空题】
物资部门编制___,盘点总负责人分配盘点工作,明确具体执行人员、盘点开始、预计完成时间、参与人、盘点的具体仓库、物资信息、项目信息等。​​​​​​​
【填空题】
《中国南方电网有限责任公司仓储特种设备作业指导书2014版》中规定:仓储常用特种设备主要包括___、起重机、车载吊车、___等。​​​​​​​
【填空题】
《中国南方电网有限责任公司仓库建设和配置标准》中规定:自动化立体仓库一般由___、巷道堆垛机、出入库搬运系统、管理控制系统组成。​​​​​​​
【填空题】
《中国南方电网有限责任公司仓库建设和配置标准》中规定:根据电力物资的包装、体积、重量等因素,综合性仓库常用的物资存储方式有地面平放式、___、直接堆放式、___。​​​​​​​
【填空题】
编码的规范性原则是___、类型、编写格式必须统一有一定的分组规则,以便在整个系统具有通用性。​​​​​​​
【填空题】
在《中国南方电网有限责任公司物资管理规定2014版》中规定:紧急情况下,各级物资需求单位可利用___、___、___等物资,满足应急需求。​​​​​​​
【填空题】
在《中国南方电网有限责任公司资产全生命周期设备退役和处置管理办法2014版》中规定:闲置设备再利用包括___、___;使用或存储年限超过轮换年限的闲置设备不能再转为储备物资。​​​​​​​
【填空题】
《中国南方电网有限责任公司利库计划业务指导书2014版》4中规定利库计划的管理目标为提高___,促进综合利用。​​​​​​​
【填空题】
《中国南方电网有限责任公司逆向物资入库业务指导书2014版》中规定:逆向物资入库原则“先物后账”,物资部门办理逆向物资入库时,应做好___和___。​​​​​​​
【填空题】
《中国南方电网有限责任公司备货发料作业指导书2014版》中规定:备货发料作业结束后,仓管员应在物资系统中流转相应___、___、___,并告知仓库负责人作业完成。​​​​​​​
【填空题】
《中国南方电网有限责任公司物资保管保养作业指导书2014版》中规定:日常线缆类物资保养的注意事项为___、防火、___、防撞击,存放在室外的要有遮挡。​​​​​​​
【填空题】
在《中国南方电网有限责任公司急救包管理规范2014版》中“急救包”的定义:指满足班组生产、抢修所需常用物资的存放点,急救包存储的物资为___物资,由使用部门单位进行日常管理。​​​​​​​
【填空题】
各单位加强对储备物资的实际使用情况的统计分析,避免出现___,提高储备物资周转率。​​​​​​​
【填空题】
《中国南方电网有限责任公司盘点作业指导书2014版》中规定的仓库盘点的5种类型月度盘点、年中盘点、年末盘点、不定期盘点、___。​​​​​​​
【填空题】
《中国南方电网有限责任公司物资管理规定2014版》中逆向物资的分类及各类逆向物资的管理原则:逆向物资分为___和___,​​​​​​​
【填空题】
闲置物资管理遵循“___、落实责任、严格考核”的原则;54报废物资管理遵循“集中处置、程序规范、___”的原则。​​​​​​​
【填空题】
实行仓库编码管理,编码集中、统一,仓库注册信息发生变化应及时更新,保持仓库信息___、___、___。​​​​​​​
【填空题】
盘点报告报经财务部门、___和分管领导审批后,物资部门进行盘亏出库和盘盈入库处理​​​​​​​
【填空题】
公司学习法国配电公司物流管理经验,决定推行___管理体系,提高物流管理水平。​​​​​​​
【填空题】
“大物流、大配送”的目标是落实公司中长期发展战略,___年全面实现“大物流、大配送”管理模式,为___提供全方位服务。​​​​​​​
【填空题】
“大物流、大配送”具体指构建___、库存结构及定额合理、___、服务功能齐全的管理模式。​​​​​​​
【填空题】
“大物流、大配送”仓库管理目标是建立“区域物流平台+急救包”管理层级,实现仓库___管理,规范仓储作业。​​​​​​​
【填空题】
“大物流、大配送”要求逐步退出___现有___、___级仓,最终实现“___”管理层级。​​​​​​​
【填空题】
公司2014年编制并发布了网级___指导书和___指导书,统一规范全网仓储作业。​​​​​​​
【填空题】
公司逐步应用___技术,提高仓储现场作业效率。​​​​​​​
【填空题】
条形码技术改变物流现场手工作业的传统方式,实现___与信息录入同步,达到帐实一致和在线跟踪物资存储配送形态变化和流动轨迹目的。​​​​​​​
【填空题】
条形码技术可实现___,通过物资管理系统找到货物最佳存放位置,优化取货路径。​​​​​​​
【填空题】
“大物流、大配送”储备管理的目标是建立___和___机制,形成全网储备物资清单。​​​​​​​
【填空题】
公司2012年开展补仓采购工作,逐步建立___、___供应模式。​​​​​​​
【填空题】
补仓采购模式要求储备物资 ___,减少工程余料产生,形成储备领用及___。​​​​​​​
【填空题】
“大物流、大配送”配送管理业务目标是形成___的配送服务,满足客户要求,降低___。​​​​​​​
【填空题】
配送管理需要根据根据各类物资的配送特点确定相应的___。​​​​​​​
【填空题】
配送管理实施策略包括建立以区域物流平台为中心的___,辐射服务区域。​​​​​​​
【填空题】
配送管理实施策略要求做好___管理,提高配送服务质量,降低配送成本。​​​​​​​
【填空题】
闲置物资管理目标是严控闲置物资___,提高闲置物资___。​​​​​​​