【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
推荐试题
【单选题】
对处于已开盘到交付完成期间的项目,下属公司对项目舆情实施有效管控,表现为___,则作为奖励对象。
A. 政府关系维护良好
B. 主流媒体关系维护良好
C. 无负面
D. 第三方神秘巡检达到90分以上
【单选题】
各下属公司须如实做好舆情预警上报工作。每___出具《商业地产集团月度舆情预警事项汇总清单》、《项目舆情月报》上报集团品牌舆情管理工作小组。
A. 半月
B. 一个月
C. 季度
D. 年度
【单选题】
下属公司的品牌舆情管理考核奖励分配比例为:公司总经理,营销分管领导,其他人员分别占比___。
A. 50%;20%;30%
B. 30%;50%;20%
C. 20%;30%;50%
D. 50%;30%;20%
【单选题】
下属公司执行画面设计、软文投放。线上线下投放画面、日常海报、软文等均需经过相关审批人___确认后方可对外输出。
A. 审核并签字
B. 审核并口头答应
C. 审核并微信回复
D. 仅审核
【单选题】
舆情事件处理闭环后,需对舆情处理全过程进行评估。以下哪一个不是评估对象?___
A. 政府
B. 舆情事件处理情况
C. 媒体
D. 公众
【单选题】
一旦发现媒体在未提前预约的情况下,对公司相关场所进行拍摄,现场工作人员应___内通知上报下属公司品牌舆情管理工作小组。
A. 30分钟
B. 10分钟
C. 2个小时
D. 6小时
【单选题】
在媒体关系与舆情管控评分中,扣分41-100分的区域/片区/项目公司责任事件部门负责人应向奥园慈善基金会捐赠___
A. 10000 元/人次
B. 5000 元/人次
C. 20000元/人次
D. 3000 元/人次
【单选题】
品牌舆情管理处罚中,处 ___以上处罚或累计处罚超过()的相关人员在绩效考评时,取消其评 A 资格,同时,按规定处罚。
A. 2类;11分(含)
B. 3类;31分(含)
C. 4类;41分(含)
D. 5类;100分(含)
【单选题】
新项目定位启动会后,召开各项会议的顺序是:___
A. 共创会、定位会、运营会
B. 运营会、定位会、共创会
C. 共创会、运营会、定位会
D. 定位会、共创会、运营会
【单选题】
不同的付款方式,对逾期有不同的标准,针对按揭付款:从客户认购之日起,银行按揭贷款超过( )未回款、公积金贷款超过___未回款视为逾期。
A. 30天;70天  
B. 50天;90天   
C. 60天;120天   
D. 80天;140天
【单选题】
针对已逾期的应收账款,逾期超过___营销部发催告短信、电话催收;逾期超过( )营销部发催告函催收;逾期超过( )营销部门、财务部报法务部签发律师函催收;逾期超过( )法务部通过诉讼手段催收。
A. 1日,5日;15日,20日
B. 1日,15日;30日,45日
C. 7日,10日;30日,60日
D. 7日,15日;25日,45日
【单选题】
置业顾问销售过程中的开场阶段拟达到的主要目的是:___
A. 寻找客户
B. 取得客户信任
C. 确认需求和问题
D. 介绍说明
【单选题】
户外广告不具备的___特点。
A. 长期性
B. 固定性
C. 覆盖率高
D. 集中
【单选题】
在产品引导期和公开期,广告主题多以产品的___为主
A. 物业管理
B. 规划优势和地段特征
C. 价格攻势
D. 配套设施
【单选题】
以下哪项不是房地产广告策划的工作内容___
A. 媒体现状、市场态势分析
B. 项目自身、竞争对手、目标客户分析
C. 广告效果与反馈
D. 楼盘案名和文化定位
【单选题】
以下哪种不属于线下类媒体?___
A. 户外牌
B. 夹报
C. 公交车身广告
D. 网络论坛
【单选题】
常规工地围挡,所设置的要求为___。
A. 地块重点人流、车流路侧,设置3-5米喷画围挡(镀锌板),不设置射灯
B. 地块人流较少、车流路侧,设置5米喷画围挡(镀锌板),设置射灯
C. 地块重点人流、车流路侧,设置3米喷画围挡(镀锌板),设置射灯
D. 地块人流较少、车流路侧,设置6米喷画围挡(镀锌板),设置射灯;
【单选题】
消费者的生活方式属于市场细分因素中的___
A. 地理因素
B. 人口因素
C. 心理因素
D. 行为因素
【单选题】
关于项目公司定价方案等,说法错误的是___
A. 项目公司在首开/批次推售产品7天前,需完成《项目定价方案》的撰写;
B. 《项目定价方案》必须由项目公司财务部与集团财务管理中心针对利润率进行确认;
C. 项目定价方案必须在首开前15天完成审批,首开前7天完成明源审批并录入价格;
D. 项目定价方案需召开定价会议,经集团营销、财务投资
【单选题】
下属公司印章的刻制与注销,该流程是由___终审
A. 商业集团董事长
B. 商业集团分管人事行政副总裁
C. 项目公司负责人
D. 商业集团办公室主任
【单选题】
项目公司内部展示物料如品牌墙画面、围墙画面、楼体广告等,在上报流程时是由___终审
A. 人力资源管理中心总经理
B. 品牌营销管理中心总经理
C. 项目公司负责人
D. 项目营销负责人
【单选题】
营销物料管理中,策划部的主要职责为___
A. 采购申请、出入库、验收
B. 采购申请、验收、物品处置
C. 出入库、验收、库存盘点、保管
D. 采购、验收、盘点、保管
【单选题】
续销项目的招聘海报,需经___审核通过后使用
A. 人力资源管理中心
B. 品牌营销管理中心
C. 项目公司负责人
D. 项目公司综合办主任
【单选题】
关于新项目案名提报及审批流程,错误的是___
A. 新项目定位确定后10天内,项目需上报候选案名
B. 策划部上报候选案名是,不得少于3个
C. 上报案名时,需注明主推、次推、备选案名及案名提报原因
D. 候选案名徐大气、易读、易记
【单选题】
商业地产集团下属公司印章刻制、注销流程的终审人___
A. 项目公司综合办主任
B. 集团品牌营销管理中心总经理
C. 集团分管人事行政副总裁
D. 集团董事长
【单选题】
下属公司策划线条,策划专员的绩效考评定级终审人为___
A. 策划经理
B. 项目公司营销线条负责人
C. 项目综合办主任
D. 项目公司责任人(项目总经理)
【单选题】
月度回款目标的公式,以下哪个是对的?___
A. 月度回款目标=(上月末逾期欠款金额-可减免逾期欠款金额+预计本月到期 应收款金额)+本月销售目标*20%
B. 月度回款目标=(上月末逾期欠款金额-可减免逾期欠款金额+预计本月到期 应收款金额)+本月销售目标*10%
C. 月度回款目标=(上月末逾期欠款金额-可减免逾期欠款金额+预计本月到期 应收款金额)+本月实际销售额*20%
D. 月度回款目标=(上月末逾期欠款金额-可减免逾期欠款金额+预计本月到期 应收款金额)+本月实际销售额*10%
【单选题】
城市公司每月定期召___以上的回款工作会议,汇报回款工作完成情况、催收计划及需协调解决的问题。会议纪要应在会后( )内发集团职能中心相关回款工作人员。
A. 两次;两天
B. 两次;三天
C. 一次;两天
D. 一次;三天
【单选题】
___收齐按揭资料并送至银行,( )负责跟进按揭审批和放款。变更按揭银行,需( )同意。
A. 营销部;财务资金部;营销部
B. 营销部;财务资金部;财务资金部
C. 营销部;营销部;财务资金部
D. 财务资金部;财务资金部;营销部
【单选题】
按揭银行要求我司承担担保责任的应收按揭款,客户超过___仍未归还的,法务部通过诉讼手段催收。
A. 30天
B. 35天
C. 40天
D. 45天
【单选题】
房屋销售款(首付款、分期款、装修款、一次性房款、补面积差房款等)逾期超过1日的___
A. 营销部发催告函催收
B. 营销部发催告短信、电话催收
C. 营销部门、财务资金部报法务部签发律师函催收
D. 法务部通过诉讼手段催收
【单选题】
客户原因导致无法按照合同约定办理好按揭付款,逾期超过30日仍未支付的___
A. 营销部发催告函催收
B. 营销部发催告短信、电话催收
C. 营销部门、财务资金部报法务部签发律师函催收
D. 法务部通过诉讼手段催收
【单选题】
回款完成率达到120%≤X<150%的城市公司,奖励或处罚金额___
A. 奖励金额=(4*1.5)万元
B. 奖励金额=(4*1.4)万元
C. 奖励金额=(4*1.2)万元
D. 奖励金额=(4*1.0)万元
【单选题】
回款目标完成率达到100%以上且回款金额超过5000 万的项目,在原有奖励的基础上,再按回款贡献奖励系数进行奖励,其中,回款金额5000 万≤X<10000 万,奖励系数为___
A. 1.2
B. 1.5
C. 1.8
D. 2
【多选题】
以下关于合同更名说法正确的是?___
A. 内部员工若购买该房产时有逾期支付款项,缴齐逾期支付款项后,可办理合同更名
B. 超过规定的日期尚未签署《商品房买卖合同》,不予办理合同更名
C. 有其他违反认购书约定或公司其他规定的行为,不予办理合同更名
D. 已取得竣备手续后,经按公司制度审批通过,可办理合同更名
E. 已经办理网签手续,原则上不允许更名
【多选题】
关于面积测绘的管控要求以下说法正确的是:___
A. 必须委托房管局或房管局下属测绘队进行销售物业的面积预测和实测;
B. 预测与实测应为同一家测绘单位;
C. 必须确保预测与实测的测绘原则一致;
D. 若实测面积超出±3%,应在出实测报告之前,及时沟通解决;
【多选题】
项目发放入伙通知书应满足哪些条件?___
A. 发放入伙通知的房源应全款已付清
B. 应取得竣工验收备案证明
C. 经商业地产质监中心验收合格并取得入伙许可
D. 地方要求综合验收合格的也应满足
【多选题】
房屋交付时项目公司应向业主收取的费用(包括代收代缴费用)有哪些?___
A. 面积补差款
B. 契税/公共维修基金
C. 产权登记费
D. 物业费
E. 装修保证金
【多选题】
入伙方案应包括下列哪些内容?___
A. 入伙期区指标完成情况
B. 入伙前取证、验收、准备工作节点计划
C. 交房动线及包装方案
D. 入伙流程及人员分工
E. 风险问题梳理及应对措施
【多选题】
以下互斥原则的是___
A. 促销折扣与特例折扣
B. 分期付款折扣与按揭付款折扣(均为开盘报告中折扣)
C. 特例折扣与大客户折扣(此大客户折扣是指单独申请的定向折扣)
D. 特例折扣与多套购买折扣(多套购买折扣是开盘报告中折扣)