【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
D
解析
暂无解析
相关试题
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
推荐试题
【单选题】
对项目融资,以下说法错误的是( )。
A. 贷款用途通常是用于建造一个或一组大型生产装置、基础设施、房地产项目或其他项目
B. 借款人通常是主要从事该项目建设、经营或融资的既有企事业法人
C. 借款人通常是为建设、经营该项目或为该项目融资而专门组建的企事业法人
D. 还款资金来源主要依赖该项目产生的销售收入、补贴收入或其他收入
【单选题】
对于项目融资资金形成的项目资产,农商银行( )。
A. 应按照自愿原则,鼓励借款人投保商业保险,并在保险单上明确约定农商行作为第一顺位保险金请求权人,或采取其他措施有效控制保险赔款权益
B. 应要求借款人投保商业保险,并在保险单上明确约定农商行作为第一顺位保险金请求权人,或采取其他措施有效控制保险赔款权益
C. 对借款人为新设法人的,应要求借款人投保商业保险,并在保险单上明确约定农商行作为第一顺位保险金请求权人,或采取其他措施有效控制保险赔款权益
D. 对借款人为既有法人的,应要求借款人投保商业保险,并在保险单上明确约定农商行作为第一顺位保险金请求权人,或采取其他措施有效控制保险赔款权益
【单选题】
对固定资产贷款的项目评估中,评估项目投资估算和资金筹措情况的主要依据为( )。
A. 借款人财务报表
B. 项目发起人财务报表
C. 项目可行性研究报告
D. 借款人介绍情况
【单选题】
对于固定资产贷款,短期贷款到期前( )天,中长期贷款到期前( )天,信贷人员应以书面、电话、短信等方式提示借款人按期偿还贷款本息。
A. 1 5
B. 3 5
C. 5 10
D. 10 30
【单选题】
根据《山东省农村商业银行法人客户统一授信管理办法》(2017版),法人客户授信中,法人客户授信应执行单一客户贷款余额不超过资本净额的( )。
A. 10%
B. 8%
C. 6%
D. 4%
【单选题】
根据《山东省农村商业银行法人客户统一授信管理办法》(2017版),法人客户授信中,单一集团客户授信余额不超过资本净额的( )。
A. 6%
B. 8%
C. 10%
D. 15%
【单选题】
根据《山东省农村商业银行法人客户统一授信管理办法》(2017版),对单一法人客户授信额超过资本净额( )(含),或单一集团客户授信额超( )(含)的信贷业务,应提交农商行董事会审议,由董事长审批。
A. 6% 8%
B. 8% 12%
C. 10% 15%
D. 15% 20%
【单选题】
根据《山东省农村商业银行法人客户统一授信管理办法》(2017版)对单一法人客户授信额超过资本净额( ),单一集团客户授信额超过资本净额( )的,应由农商行董事长或高级管理层审批。
A. 5% 8%
B. 5% 10%
C. 10% 15%
D. 15% 20%
【单选题】
根据《山东省农村商业银行法人客户统一授信管理办法》(2017版)要求,信贷人员开展授信前调查,坚持( )调查,调查过程客观、公正,独立提出调查意见。
A. 一人
B. 双人
C. 三人
D. 多人
【单选题】
根据《山东省农村商业银行法人客户统一授信管理办法》(2017版)中,财务分析须包括但不限于近( )年财务总体及结构增减变化情况、近( )年短期偿债能力、近( )年长期偿债能力以及可能影响客户偿债能力的其它财务状况等内容。
A. 一
B. 二
C. 三
D. 五
【单选题】
根据《山东省农村商业银行法人客户统一授信管理办法》(2017版)要求,实施统一授信的集团客户,集团总部或核心企业应在( ),拟办理社团贷款的集团客户除外。
A. 本省内
B. 农商银行服务辖区内
C. 本市内
D. 中国境内
【单选题】
根据《山东省农村商业银行法人客户统一授信管理办法》(2017版)中统一授信的流程为( )。
A. 调查→拟定统一授信方案→审查→(审议)→(董事会审议)→有权审批人审批
B. 调查→审查→拟定统一授信方案→(审议)→(董事会审议)→有权审批人审批
C. 调查→审查→(审议)→拟定统一授信方案→(董事会审议)→有权审批人审批
D. 调查→拟定统一授信方案→审查→(审议)→有权审批人审批→(董事会审议)
【单选题】
根据《山东省农村商业银行法人客户统一授信管理办法》(2017版)要求,客户授信方案的有效期原则上为一年,其中AA级(含)以上法人客户授信期限可为( )年。
A. 二
B. 三
C. 四
D. 五
【单选题】
根据《山东省农村商业银行押品管理办法》,董事会负责督促高级管理层在全面风险管理体系框架下构建押品管理体系,履行押品管理职责,承担押品管理最终责任,( )为第一责任人。
A. 董事长
B. 行长
C. 分管行长
D. 监事长
【单选题】
根据《山东省农村商业银行押品管理办法》,以下( )不属于押品释放应遵循的原则。
A. 偿还金额须高于对应释放价值
B. 保证贷款余额与所剩余押品评估价值的比例不高于原审批贷款抵押率
C. 先行释放价值高、易变现的押品
D. 对拟部分释放押品后会影响剩余抵质押权利主张设定的,或严重影响整体价值的,不得部分释放押品
E. 对禁止分割的押品不得部分释放
【单选题】
根据《山东省农村商业银行公司类贷款管理办法》,对单一客户授信余额超资本净额5%(含),集团客户授信余额超资本净额10%(含)的,由农商行( )审批。
A. 分管行长
B. 行长
C. 董事长
D. 董事会
【单选题】
根据《山东省农村商业银行公司类贷款管理办法》,( )是指符合《商业银行与内部人和股东关联交易管理办法》规定的商业银行的关联法人或其他组织。
A. 关系人
B. 关联企业
C. 集团客户
D. 关联组织
【单选题】
根据《山东省农村商业银行公司类贷款管理办法》,农商行要坚持做好风险承诺制。单一客户授信余额1000万元(含)以上、集团客户授信余额3000万元(含)以上的贷款,须由( )签订风险承诺书,承诺对贷款风险负主要责任。
A. 分管行长
B. 行长
C. 董事长
D. 有权审批人
【单选题】
对同一法人(集团)客户开展的各类信贷业务纳入统一授信。单一客户贷款余额不超过农商行资本净额的( ),集团客户授信余额不超过农商行资本净额的( )。
A. 5%,10%
B. 8%,10%
C. 8%,12%
D. 10%,15%
【单选题】
根据《山东省农村商业银行公司类贷款“四个中心”建设指引》,农商行应逐步建立专业的内部评估队伍和评估运行机制,对押品实施内部评估。实施外部评估的,农商行应建立对外部评估机构的准入和退出机制,并由( )负责定期对评估机构实施准入和退出。
A. 营销调查中心
B. 风险审查中心
C. 放款中心
D. 贷后检查中心
【单选题】
根据《山东省农村商业银行公司类贷款“四个中心”建设指引》,贷后检查中心是由专业贷后检查人员组成,与营销调查中心的贷后管理双线并行的部门,应( )。
A. 挂靠信贷管理部门
B. 挂靠风险管理部门
C. 挂靠资产管理部门
D. 单独设立
【单选题】
根据《山东省农村商业银行公司类贷款管理办法》,农商行总部设立单独的贷后检查中心,对一定额度以上的贷款实施定期贷后检查,与营销调查岗的贷后管理双线并行。贷后检查中心检查的贷款,不低于全部公司贷款户数的( )。
A. 1/2
B. 1/3
C. 1/4
D. 1/5
【单选题】
根据《山东省农村商业银行公司类贷款管理办法》,省联社各派出机构和农商行加强对公司信贷人员的综合培训,培训内容包括但不限于法律、财务、信贷等知识,一般信贷人员每年集中培训时间不低于( )个工作日,相关部门(支行)负责人每年脱岗培训时间不低于( )个工作日。
A. 3 3
B. 3 6
C. 6 3
D. 6 6
【单选题】
根据《山东省农村商业银行公司类贷款尽职操作指引》,贷审会设秘书岗,由( )担任,负责介绍贷款、会议记录、保管审议资料等。
A. 营销调查中心负责人
B. 风险审查中心负责人
C. 放款中心负责人
D. 信贷管理部门负责人
【单选题】
根据《山东省农村商业银行公司类贷款“四个中心”建设指引》,放款中心合同签订岗与合同复核岗不能兼岗,档案管理岗应单独设立,其他各岗位在兼顾工作质量、工作效率和岗位制衡的前提下,可适当兼岗,但不得由( )兼岗。
A. 合同签订岗
B. 合同复核岗
C. 资金监管岗
D. 内勤人员