【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
推荐试题
【单选题】
___是邓小平理论的活的灵魂,是邓小平理论的精髓。
A. 社会主义本质理论
B. 四项基本原则
C. 解放思想、实事求是的思想路线
D. 改革开放理论
【单选题】
党的___系统地论述了社会主义初级阶段理论
A. 12 大
B. 13 大
C. 14 大
D. 15 大
【单选题】
党的___报告提出了党在社会主义初级阶段的基本路线
A. 12 大
B. 13 大
C. 14 大
D. 15 大
【单选题】
社会主义的根本任务是___
A. 共同富裕
B. 发展生产力
C. 坚持党的领导
D. 实现共产主义
【单选题】
提出“科学技术是第一生产力”的是___
A. 马克思
B. 毛泽东
C. 邓小平
D. 江泽民
【单选题】
我国全面改革开始,通过《中共中央关于经济体制改革的决定》文件的是___
A. 十一届三中全会
B. 十二届三中全会
C. 十三届三中全会
D. 十四届三中全会
【单选题】
邓小平理论的主要内容有___个方面。
A. 8
B. 9
C. 10
D. 12
【单选题】
邓小平明确提出“建设有中国特色社会主义”这一基本命题是在党的___
A. 十一届三中全会
B. 十二大
C. 1979 年党的理论工作务虚会
D. 十三大
【单选题】
邓小平理论首要的基本理论问题是___
A. 什么是社会主义,怎样建设社会主义
B. 什么是社会主义本质,怎样认识社会主义本质
C. 什么是社会主义初级阶段,怎样认识社会主义初级阶段
D. 什么是社会主义的根本任务,怎样完成社会主义的根本任务
【单选题】
邓小平对党的思想路线最大的新贡献是强调___
A. 实践是检验真理的唯一标准
B. 解放思想
C. 实事求是
D. 尊重群众的新创造
【单选题】
1992 年春邓小平在南方谈话中提出了___
A. 实践标准
B. 人民利益标准
C. 生产力标准
D. “三个有利于”标准
【单选题】
社会主义社会发展的直接动力是___
A. 改革
B. 革命
C. 阶级斗争
D. 发展生产力
【单选题】
我国实行改革开放政策的理论基础和依据是___
A. 社会主义初级阶段的基本国情
B. 社会主义社会的基本矛盾
C. 社会主义社会的主要矛盾
D. 我国经济发展所遇到的问题
【单选题】
坚持改革的正确方向,就是要坚持___这个立国之本
A. 实事求是
B. 邓小平理论
C. 毛泽东思想
D. 四项基本原则
【单选题】
属于中国特色社会主义理论体系的开篇之作的是___
A. 毛泽东思想
B. 邓小平理论
C. “三个代表”重要思想
D. 科学发展观
【单选题】
邓小平指出,“一个党,一个国家,一个民族,如果一切从本本出发,思想僵化,迷信盛行,那它就不能前进,它的生机就停止,就要亡党亡国。”这段话非常深刻的阐明了___
A. 实事求是的重要性
B. 解放思想的重要性
C. 与时俱进的重要性
D. 尊重实践的重要性
【单选题】
1978 年,邓小平支持和领导的真理标准问题大讨论,具体针对的问题是___
A. 以阶级斗争为纲
B. “文革”
C. “两个凡是”
D. 家庭联产承包责任制
【单选题】
实事求是思想路线的重新确立是在党的___
A. 第七次全国代表大会上
B. 第八次全国代表大会上
C. 十一届三中全会上
D. 第十二次全国代表大会上
【单选题】
邓小平在批判“两个凡是”错误观点时,提出必须___
A. 完整地正确地理解毛泽东思想
B. 完整地理解毛泽东思想
C. 正确地理解毛泽东思想
D. 完整地准确地理解毛泽东思想
【单选题】
我国处在社会主义初级阶段,我们将从实际出发建设社会主义,最大的实际就是___
A. 社会主义初级阶段的基本国情
B. 中国人口多,底子薄
C. 中国人均资源水平低
D. 生产力发展极不平衡
【单选题】
社会主义初级阶段是指___
A. 任何国家进入社会主义都要经历的起始阶段
B. 发达国家进入社会主义所要经历的起始阶段
C. 发展中国家进入社会主义都要经历的特定阶段
D. 我国在生产力落后商品经济不发达条件下建立社会主义所要经历的特殊阶段
【单选题】
社会主义初级阶段的起点是___
A. 1949 年中华人民共和国成立后
B. 1956 年社会主义改造基本完成后
C. 1978 年党的十一届三中全会后
D. 1987 年提出社会主义初级阶段理论后
【单选题】
我们党明确概括和全面阐述党在社会主义初级阶段基本路线是在党的___
A. 十一届三中全会
B. 八大
C. 十三大
D. 十五大
【单选题】
社会主义初级阶段基本路线的核心和主体是___
A. “一个中心,两个基本点”
B. 经济建设
C. 改革开放
D. 四项基本原则
【单选题】
坚持四项基本原则,核心是___
A. 坚持社会主义
B. 坚持党的领导
C. 坚持马列主义,毛泽东思想
D. 坚持人民民主专政
【单选题】
能采取正确政策,那就体现不出社会主义的___
A. 优越性
B. 本质
C. 目标
D. 基本特征
【单选题】
对社会主义的本质进行论述,并作出基本概括的人是___
A. 马克思
B. 列宁
C. 毛泽东
D. 邓小平
【单选题】
邓小平“发展才是硬道理”的著名论断,提出于___
A. 1978 年十一届三中全会
B. 党的十二大
C. 党的十三大
D. 92 年南方谈话
【单选题】
在社会主义社会的初级阶段,我们面临许多问题,解决这些问题的关键是___
A. 靠党的领导
B. 靠自己发展
C. 靠他国帮助
D. 靠改革开放
【单选题】
邓小平首次提出“社会主义的本质”的概念是在___
A. 1978 年
B. 1980 年
C. 1985 年
D. 1992 年
【单选题】
建国以来我们在社会主义建设中所经历的曲折和失误,归根到底就在于没有完全搞清楚___
A. 阶级斗争与经济建设的关系
B. 解放生产力与发展生产力的关系
C. 什么是社会主义,怎样建设社会主义
D. 计划与市场的关系
【单选题】
我国改革开放的伟大开端是___
A. 十一届三中全会
B. 十二大
C. 十三大
D. 十四大
【单选题】
我国改革的性质是___
A. 中国的第二次革命
B. 社会主义制度的自我完善与发展
C. 计划经济体制的全面改革
D. 建设中国特色社会主义的全面探索
【单选题】
邓小平理论形成和发展的时代特征是___
A. 改革与开放
B. 战争与和平
C. 和平与发展
D. 科技与创新
【单选题】
邓小平理论走向成熟的标志是___
A. 《解放思想,实事求是,团结一致向前看》
B. 《坚持四项基本原则》
C. 邓小平南方谈话和党的十四大
D. 党的十五大报告
【单选题】
《实践是检验真理的惟一标准》一文最早发表于___
A. 《光明日报》
B. 中央党校《理论动态》
C. 《人民日报》
D. 《红旗》杂志
【单选题】
坚持党在社会主义初级阶段的基本路线不动摇,关键是坚持___
A. 以经济建设为中心不动摇
B. 改革开放不动摇
C. 四项基本原则不动摇
D. 自力更生不动摇
【单选题】
四项基本原则是我国社会主义现代化建设的___
A. 强国之路
B. 立国之本
C. 物质保证
D. 发展动力
【单选题】
“解放思想,实事求是”中的“解放思想”是指___
A. 在马克思主义指导下 打破习惯势力和主观偏见的束缚,研究新情况解决新问题
B. “大胆地试、大胆地闯”
C. 一切从实际出发,走自己的路
D. 排除姓“资”姓“社”抽象理论的干扰
【多选题】
邓小平理论形成条件主要包括___
A. 和平与发展成为时代主题
B. 总结我国社会主义胜利和挫折的历史经验
C. 借鉴其他社会主义国家兴衰成败历史经验
D. 我国改革开放和现代化建设的实践中