【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
推荐试题
【单选题】
10KV/0.4KV电力变压器低压侧中性点应进行工作接地,其接地电阻值应不大于___。
A. 8Ω
B. 4Ω
C. 10Ω
【单选题】
电气设备保护接地电阻越大,发生故障时漏电设备外壳对地电压___.
A. ,越低
B. ,不变
C. ,越高.
【单选题】
电器设备未经验电,一律视为___
A. , 有电,不准用手触及
B. , 无电,可以用手触及
C. , 无危险电压
【单选题】
维修电工在操作中,特别要注意___问题。
A. 戴好安全防护用品
B. 安全事故的防范
C. 安全文明生产行为
【单选题】
人体___是最危险的触电形式。
A. 单相触电
B. 两相触电
C. 跨步电压触电
【单选题】
发生电气火灾后必须进行带电灭火时,应该使用___.
A. , 消防水喷射
B. , 干粉灭火剂
C. ,泡沫灭火器
【单选题】
电压等级低于___伏的电器属于低压电器。
A. 36
B. 380
C. 1000
【单选题】
隔离开关的主要作用是___。
A. 拉合线路
B. 断开电流
C. 隔断电源;
【单选题】
对于照明和电加热负载,熔体的额定电流应为___倍负载额定电流。
A. 1
B. 1.5~2.5
C. 3~3.5
【单选题】
控制一台不经常启动的电动机时,熔断器熔体额定电流选为电机额定电流的___倍
A. 1
B. 1.5~2.5
C. 3~3.5
【单选题】
控制一台经常启动的电动机时,熔断器熔体额定电流选为电机额定电流的___倍
A. 1
B. 1.5~2.5
C. 3~3.5
【单选题】
热继电器中的双金属片弯曲是由于两金属片___
A. 机械强度不同
B. 热膨胀系数不同
C. 温差效应
【单选题】
热继电器中热元件的整定电流应为电动机额定电流的___倍
A. 0.7
B. 0.95~1.05
C. 1.5
【单选题】
控制按钮属于主令电器,它主要接在___。
A. 主回路
B. 控制回路
C. 主回路和控制回路
【单选题】
按钮的触头允许通过的电流较小,一般不超过___安。
A. 2
B. 5
C. 10
【单选题】
下列承担短路保护的电器是___
A. –交流接触器或中间继电器
B. --熔断器
C. —热继电器
【单选题】
下列承担过载保护的电器是___
A. –交流接触器或中间继电器
B. --熔断器
C. —热继电器
【单选题】
下列承担失压保护的电器一般为___
A. –交流接触器或中间继电器
B. --熔断器
C. —热继电器
【单选题】
一台30KW的三相交流电动机其输入的有功功率应该为___
A. 小于30KW
B. 等于30KW
C. 大于30KW
【单选题】
三相交流笼型异步电动机直接启动电流是额定电流的___
A. 2-4倍
B. 4-7倍
C. 6-8倍
【单选题】
三相交流笼型异步电动机的转速同___成正比。
A. 极对数
B. 电源频率
C. 电机功率
【单选题】
三相交流笼型异步电动机的转矩与___成正比。
A. 电流
B. 电压
C. 电压平方。
【单选题】
三相异步电动机的机械特性曲线是___。
A. T=f(s)
B. T=f(n)
C. u=f(I)
【单选题】
用摇表检查低压电动机定子绕组间绝缘、绕组对机壳绝缘电阻,其数值不应低于___
A. 0.5MΩ
B. 1MΩ
C. 2MΩ
【单选题】
三相异步电动机电源接后电机不能起动,造成故障的可能原因是___。
A. 电源电压过高或过低
B. 定子绕组接线错误
C. 鼠龙电动机转子断条
【单选题】
按钮联锁正反转控制线路的优点是操作方便,缺点是容易产生电源两相短路事故。在实际工作中,经常采用___正反转控制线路。
A. 按钮联锁
B. 接触器联锁
C. 按钮、接触器联锁
【单选题】
按钮联锁正反转控制线路的优点是操作方便,缺点是容易产生___事故。
A. 电源两相短路
B. 电源两相断路
C. 停车
【单选题】
三相笼型交流异步电动机功率大于___时一般应采用降压启动。
A. 3KW
B. 7.5KW
C. 15KW
【单选题】
电磁抱闸制动的优点是此系统是在___。
A. 制动平稳
B. 失电后制动
C. 制动迅速
【单选题】
反接制动的优点是___。
A. 制动平稳
B. 失电后制动
C. 制动迅速
【单选题】
能耗制动的优点是___。
A. 制动平稳
B. 失电后制动
C. 制动迅速
【单选题】
行车、提升机采用的控制方式是___
A. 启动控制
B. 点动控制
C. 点动-启动混合控制
【单选题】
可编程序控制器简称为___。
A. CPU
B. PLC
C. CNC
【单选题】
___简称PLC。
A. 顺序控制器
B. 可编程序控制器
C. 微型计算机
【单选题】
可编程序控制器通过编程,灵活地改变其控制程序相当于改变了继电器控制的___线路。
A. 主回路和控制回路
B. 控制回路
C. 硬接线
【单选题】
可编程控制器的点数是指___。
A. 输入端子个数
B. 输出端子个数
C. 输入端子和输出端子个数的和
【单选题】
可编程控制器输入接口常接的部件有___
A. 开关量信号
B. 继电器线圈
C. 电动机
【单选题】
可编程控制器输出接口常接的部件有___
A. 开关量信号
B. 继电器线圈
C. 电动机
【单选题】
可编程控制器小型机的I/O点数是___
A. 64点一下
B. 64~256
C. 256~2048
【单选题】
可编程控制系统同继电器控制系统的主要区别在于___
A. 输入部分
B. 控制部分
C. 输出部分