【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
BC
解析
暂无解析
相关试题
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
推荐试题
【单选题】
全血的含量占体重的___
A. 10%
B. 15%
C. 8%
D. 60%
E. 5%
【单选题】
将血浆蛋白置于pH8.6的缓冲液中进行醋酸纤维膜电泳时,泳动最快的是___
A. α1–球蛋白
B. α2–球蛋白
C. β–球蛋白
D. γ–球蛋白
E. 清蛋白
【单选题】
血浆中最主要的抗体是___
A. IgA
B. IgD
C. IgE
D. IgG
E. IgM
【单选题】
可激活凝血酶原(PT)使之生成凝血酶(T)的是___
A. 因子Xa
B. Ca2+ - PL(磷脂)复合物
C. 因子Va
D. Ca2+
E. Xa — Ca2+ —Va复合物
【单选题】
凝血因子I的功能是___
A. 激活因子Ⅶ
B. 形成纤维蛋白凝胶
C. 激活剂
D. 催化因子X生成因子Xa
E. 催化因子Ⅱ生成Ⅱa
【单选题】
凝血因子XⅢa的功能是___
A. 活化因子V
B. 催化因子Ⅲ释放
C. 催化纤维蛋白共价交联
D. 催化凝血酶原激活物的形成
E. 促进因子X的活化
【单选题】
免疫球蛋白主要分布在___
A. α1–球蛋白
B. α2–球蛋白
C. β–球蛋白
D. 清蛋白
E. γ–球蛋白
【单选题】
干扰血红素合成的物质是___
A. 维生素C
B. 铅
C. 氨基酸
D. Fe2+
E. 葡萄糖
【单选题】
ALA合酶的辅酶是___
A. 菸酰胺腺嘌呤二核苷酸(NAD+)
B. 黄素腺嘌呤二核苷酸(FAD)
C. 黄素单核苷酸(FMN)
D. 硫胺素焦磷酸酯(TPP)
E. 磷酸吡哆醛
【单选题】
合成血红素的哪一步反应在胞液中进行?___
A. ALA的生成
B. 原卟啉原的生成
C. 尿卟啉原Ⅲ的生成
D. 血红素的生成
E. 原卟啉Ⅸ的生成
【单选题】
凝血酶原及因子Ⅶ、Ⅸ、Ⅹ均由肝合成,合成过程需下列哪种维生素作为辅助因子?___
A. Vit K
B. Vit B1
C. Vit B6
D. Vit B2
E. Vit PP
【单选题】
催化纤维蛋白原成纤维蛋白的物质是___
A. 凝血酶
B. 因子Ⅲ
C. Ca2+
D. 因子Ⅴ
E. 因子Xa
【单选题】
粒细胞主要的糖代谢途径是___
A. 有氧氧化
B. 磷酸戊糖途径
C. 糖酵解
D. 糖醛酸途径
E. 多元醇途径
【单选题】
在体内,纤维蛋白被下列哪种酶降解?___
A. 蛋白激酶
B. 磷酸酶
C. 凝血酶
D. 纤溶酶
E. 尿激酶
【单选题】
合成血红素的基本原料是___
A. 乙酰CoA、Fe2+
B. 珠蛋白、Fe2+
C. 琥珀酰CoA、Fe2+
D. 乙酰CoA、甘氨酸、Fe2+
E. 琥珀酰CoA、甘氨酸、Fe2+
【单选题】
血浆中运输胆红素的载体是___
A. 清蛋白
B. Y蛋白
C. Z蛋白
D. α–球蛋白
E. γ–球蛋白
【单选题】
血红素的合成部位在造血器官的___
A. 线粒体
B. 胞液与内质网
C. 微粒体与核糖体
D. 线粒体与胞液
E. 内质网与线粒体
【单选题】
红细胞内的抗氧化物主要是___
A. NADH
B. CoQH2
C. GSH
D. FADH2
E. FMNH2
【单选题】
血浆清蛋白的功能应除外___
A. 营养作用
B. 缓冲作用
C. 运输作用
D. 免疫功能
E. 维持血浆胶体渗透压
【单选题】
在血浆内含有的下列物质中,肝脏不能合成的是___
A. 清蛋白
B. 免疫球蛋白
C. 凝血酶原
D. 高密度脂蛋白
E. 纤维蛋白原
【单选题】
绝大多数血浆蛋白质的合成场所是___
A. 肾脏
B. 骨髓
C. 肝脏
D. 肌肉
E. 脾脏
【单选题】
有一种参与血液凝固的因子正常时血中不能检出,直到组织受创、血凝启动才会出现,它是___
A. 凝血酶
B. 纤维蛋白原
C. 因子Ⅻ
D. 抗血友病因子(因子Ⅷ)
E. 纤维蛋白稳定因子(因子ⅩⅢ)
【单选题】
在生理条件下合成血红素的限速步骤是___
A. 胆色素原
B. 线状四吡咯
C. 原卟啉Ⅸ
D. 尿卟啉原Ⅲ
E. δ–氨–γ–酮戊酸
【单选题】
下列哪一种因素不参与血红素合成代谢的调节___
A. 促红细胞生成素(EPO)
B. 线状四吡咯
C. ALA合酶
D. 亚铁螯合酶
E. ALA脱水酶
【单选题】
成熟红细胞的主要能量来源是___
A. 2,3–BPG支路
B. 脂肪酸β氧化
C. 糖的有氧氧化
D. 糖酵解
E. 磷酸戊糖途径
【单选题】
对成熟红细胞来说,下列哪项说法是正确的?___
A. 具有分裂增殖的能力
B. 存在RNA和核糖体
C. 具有催化磷酸戊糖途径的全部酶系
D. 能合成蛋白质及核酸
E. 除存在于血液外,还大量见于造血器官
【单选题】
成熟红细胞内磷酸戊糖途径所生成的NADPH的主要功能是___
A. 合成膜上胆固醇
B. 促进脂肪合成
C. 提供能量
D. 维持还原型谷胱甘肽(GSH)的正常水平
E. 使MHb(Fe3+)还原
【单选题】
肝的不同部位中肝细胞代谢表现是___
A. 中央静脉周围的肝细胞获取的愧疚和营养物质最充足
B. 所有的肝细胞均可获取同样的营养供应
C. 终末微血管周围的肝细胞获取的氧和营养物质最充足
D. 肝小叶周围的肝细胞获取的氧和营养物质最充足
E. 血窦周围的肝细胞获取的氧和营养物质均同样充足
【单选题】
在肝细胞分泌排泄胆汁中起重要作用的是___
A. 肝细胞物质代谢活跃
B. 相邻肝细胞微小间隙形成
C. 肝细胞的孔隙较大
D. 肝脏供血供氧较其它器官丰富
E. 肝细胞含有成倍量的高尔基体
【单选题】
肝受损时,血中蛋白质的主要改变是___
A. 清蛋白含量升高
B. 球蛋白含量下降
C. 球蛋白含量升高,球蛋白含量下降
D. 清蛋白含量下降,球蛋白含量升高或相对升高
E. 清蛋白和球蛋白含量都正常
【单选题】
肝功障碍时,血浆胆固醇的主要改变是___
A. 血胆固醇总量增加
B. 血胆固醇总量正常
C. 血中自由胆固醇量下降
D. 血中胆固醇酯/胆固醇比值升高
E. 血中胆固醇酯/胆固醇比值下降
【单选题】
正常人在肝合成血浆蛋白质,量最多的是___
A. 纤维蛋白原
B. 凝血酶原
C. 清蛋白
D. 球蛋白
E. 脂蛋白
【单选题】
下列哪种物质是肝细胞特异合成的___
A. ATP
B. 蛋白质
C. 糖元
D. 尿素
E. 脂肪
【单选题】
下列哪种氨基酸不在肝内进行活跃进代谢___
A. 酪氨酸
B. 缬氨酸
C. 鸟氨酸
D. 苯丙氨酸
E. 色氨酸
【单选题】
饥饿时肝中哪个途径的活性增强___
A. 磷酸戊糖途径
B. 脂肪合成
C. 糖酵解
D. 糖有氧氧化
E. 糖异生
【单选题】
能由脂肪酸合成酮体的部位是___
A. 红细胞
B. 脑
C. 骨骼肌
D. 肝
E. 肾
【单选题】
肝是生成尿素的唯一器官,是由于肝细胞含有___
A. 谷氨酸脱氢酶
B. 谷丙转氨酶
C. CPS–Ⅱ
D. 精氨酸酶
E. 谷草转氨酶
【单选题】
下列哪种胆汁酸是次级胆汁酸___
A. 甘氨鹅脱氧胆酸
B. 甘氨胆酸
C. 牛磺鹅脱氧胆酸
D. 脱氧胆酸
E. 牛磺胆酸
【单选题】
下列哪种胆汁酸是初级胆汁酸___
A. 胆酸,脱氧胆酸
B. 甘氨胆酸,石胆酸
C. 牛磺胆酸,脱氧胆酸
D. 石胆酸,脱氧胆酸
E. 甘氨鹅脱氧胆酸,牛磺鹅脱氧胆酸
【单选题】
胆汁固体成分中含量最多的是___
A. 胆固醇
B. 胆色素
C. 脂类
D. 磷脂
E. 胆汁酸盐