【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
推荐试题
【判断题】
安全带的挂钩或绳子应挂在结实牢固的构件上,或专为挂安全带用的钢丝绳上,并应采用高挂低用的方式。禁止挂在移动或不牢固的物件上。
A. 对
B. 错
【判断题】
作业人员作业过程中,应随时检查安全带是否拴牢。高处作业人员在转移作业位置时不得失去安全保护。
A. 对
B. 错
【判断题】
人在梯子上时,若要移动梯子必须采取可靠的安全措施。
A. 对
B. 错
【判断题】
在试验和推广新技术、新工艺、新设备、新材料的同时,应制定相应的安全措施,经本单位主管领导批准后执行。
A. 对
B. 错
【判断题】
任何人发现有违反《安规》的情况,应立即制止,经纠正后才能恢复作业。
A. 对
B. 错
【判断题】
各类作业人员有权拒绝违章指挥和强令冒险作业。
A. 对
B. 错
【判断题】
在发现直接危及人身、电网和设备安全的紧急情况时,有权停止作业或者在采取可能的紧急措施后撤离作业场所,但应在事前进行报告。
A. 对
B. 错
【判断题】
新参加电气工作的人员、实习人员和临时参加劳动的人员(管理人员、非全日制用工等),应经过安全知识教育后,方可下现场参加工作,但不准单独工作。
A. 对
B. 错
【判断题】
工作负责人(监护人)、工作许可人应由有一定工作经验、熟悉本部分、熟悉工作范围内的设备情况,并经车间(工区、公司、中心)生产领导书面批准的人员担任。
A. 对
B. 错
【判断题】
装、拆接地线导体端均应使用绝缘棒或专用的绝缘绳。
A. 对
B. 错
【判断题】
高处作业人员在作业过程中,应随时检查安全带是否栓牢。高处作业人员在转移作业位置时不准失去安全保护。
A. 对
B. 错
【判断题】
高处作业使用的脚手架不需验收即可使用。
A. 对
B. 错
【判断题】
梯子不宜绑接使用。
A. 对
B. 错
【判断题】
人在梯子上时,在确保安全的前提下可以移动梯子。
A. 对
B. 错
【判断题】
吊物上不许站人,禁止作业人员利用吊钩来上升或下降。
A. 对
B. 错
【判断题】
禁止与工作无关人员在起重工作区域内行走或停留。
A. 对
B. 错
【判断题】
进入作业现场应将使用的带电作业工具放置在防潮的帆布或绝缘垫上,防止绝缘工具在使用中脏污和受潮。
A. 对
B. 错
【判断题】
在带电设备周围禁止使用钢卷尺、皮卷尺和线尺(夹有金属丝者)进行测量工作。
A. 对
B. 错
【判断题】
电气工具和用具使用前应检查电线是否完好,有无接地线;不合格的禁止使用。
A. 对
B. 错
【判断题】
电气工具和用具使用时应按有关规定接好剩余电流动作保护器(漏电保护器)和接地线;使用中发生故障,应立即修复。
A. 对
B. 错
【判断题】
电气工具和用具的电线不准接触热体,不要放在湿地上,并避免载重车辆和重物压在电线上。
A. 对
B. 错
【判断题】
使用吊车撤杆时,应先检查有无卡盘或障碍物并试拔。
A. 对
B. 错
【判断题】
采用以旧线带新线的方式施工,应检查确认旧导线完好牢固。
A. 对
B. 错
【判断题】
在交通道口采取无跨越架施工时,应采取措施防止车辆挂碰施工线路。
A. 对
B. 错
【判断题】
使用移动式电动工具时,可以提拉电源线以便于施工。
A. 对
B. 错
【判断题】
接地线一经拆除,设备即应视为有电,严禁再去接触或进行工作。
A. 对
B. 错
【判断题】
在起重作业时,严禁吊件从人员上空越过。
A. 对
B. 错
【判断题】
凡新加工、购置、翻新的各类绝缘工具、绳都应进行机械强度和电气性能试验。
A. 对
B. 错
【判断题】
判断伤员无意识,应立即用手指甲掐压人中穴、合谷穴约5s。
A. 对
B. 错
【判断题】
个人保安线应在杆塔上接触或接近导线的作业开始前挂接,作业结束脱离导线后拆除。
A. 对
B. 错
【判断题】
停电检修的线路如与另一回带电线路相交叉或接近,以致工作时人员和工器具可能和另一回导线接触或接近至《线路安规》表4“邻近或交叉其他电力线工作的安全距离”以外,则另一回线路也应停电并予接地。
A. 对
B. 错
【判断题】
工作票一份交工作负责人,一份留存工作票签发人或工作许可人处。工作票应当日交给73.工作负责人。
A. 对
B. 错
【判断题】
带电作业工作票签发人或工作负责人认为有必要时,应组织有经验的人员到现场勘察,根据勘察结果作出能否进行带电作业的判断,并确定作业方法和所需工具以及应采取的措施。
A. 对
B. 错
【判断题】
高架绝缘斗臂车操作人员应服从工作负责人的指挥,作业时应注意周围环境及操作速度。在工作过程中,高架绝缘斗臂车的发动机不准熄火。
A. 对
B. 错
【判断题】
《安全生产法》规定从业人员发现事故隐患时,应立即向现场安全管理人员或本单位负责人报告。
A. 对
B. 错
【判断题】
《安全生产法》规定对存在重大事故隐患且拒不执行停产停业等决定的生产经营单位,负有安全生产监督管理职责的部门可以立即通知有关单位停止供电强制生产经营单位履行相关决定。
A. 对
B. 错
【判断题】
《国网公司安全职责规范》规定,基层单位二级机构主要负责人的安全职责之一是定期召开安全生产月度例会,每月至少参加 二 次班组的安全日活动,抽查班组安全活动记录,并提出改进要求。
A. 对
B. 错
【判断题】
《国网公司安全职责规范》规定,各级职能管理部门对所承担工作范围内的安全工作负直接管理责任。
A. 对
B. 错
【判断题】
《国网湖北省电力有限公司领导干部安全履责手册》规定,将绩效管理引入安全生产领域并切实执行,建立安全考核“专项奖惩”加“绩效融入”的精准型考核激励模式。
A. 对
B. 错
【判断题】
《国网湖北省电力有限公司领导干部安全履责手册》规定,发生五级责任性人身事件,负有直接责任的人员及负有主要领导责任的人员,或安全履责有严重渎职、失职行为,恶性违章被考核6分及以上的人员,12 个月内不得晋升或重用;责任单位12个月内不得参加省公司及以上评先评优。
A. 对
B. 错