【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AB
解析
暂无解析
相关试题
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
推荐试题
【判断题】
国境口岸公共场所临时参加工作并直接为顾客服务的人员可以不持有“健康合格证”。
A. 对
B. 错
【判断题】
公共场所的法定代表人或者负责人是其经营场所卫生安全的第一责任人。
A. 对
B. 错
【判断题】
患有痢疾、伤寒、病毒性肝炎、活动期肺结核、化脓性或者渗出性皮肤病以及其他有碍公共卫生的疾病的,治愈前不得从事直接为顾客服务的工作。
A. 对
B. 错
【判断题】
公共场所经营单位或个人违反《公共场所卫生管理条例》规定的行政处罚有警告、罚款、停业整顿、吊销“卫生许可证”。
A. 对
B. 错
【判断题】
公共场所可根据需要合理设置自动售烟机。
A. 对
B. 错
【判断题】
国际航行船舶卫生监督包括询问、查阅证书和现场检查两个环节
A. 对
B. 错
【判断题】
《船舶国际医疗指南》是根据《海事劳工公约》强制要求船方配备的。
A. 对
B. 错
【判断题】
出入境邮轮保育设施存在的主要风险包括有设计缺陷的儿童保育设施、训练不足的保育员、不适用的预防和控制程序都可能对船上旅行人群和儿童下船返回后对所在社区公共卫生造成危险。
A. 对
B. 错
【判断题】
海关实施船舶检查和(或)控制措施的条件有限,船方对检查未尽到配合义务或阻扰检查的,海关有权判定为不合格船舶。
A. 对
B. 错
【判断题】
公共场所经营者应当每两年对公共场所的空气、微小气候、水质等进行卫生检测。
A. 对
B. 错
【判断题】
公共场所卫生许可证有效期限为4年。
A. 对
B. 错
【判断题】
公共场所经营者需要延续卫生许可证的,应当在卫生许可证有效期届满 30日前,向原发证卫生行政部门提出申请。
A. 对
B. 错
【判断题】
公共场所危害健康事故,指公共场所内发生的传染病疫情或者因空气质量、水质不符合卫生标准、用品用具或者设施受到污染导致的危害公众健康事故。
A. 对
B. 错
【判断题】
对未依法取得公共场所卫生许可证擅自营业的,由县级以上地方人民政府卫生行政部门责令限期改正,给予警告,并处以五百元以上五千元以下罚款。
A. 对
B. 错
【判断题】
出入境列车的列车长抵制卫生监督时,可以警告,不得罚款。
A. 对
B. 错
【判断题】
公共场所经营者必须具备检测能力的。
A. 对
B. 错
【判断题】
口岸内环境微小气候和空气卫生质量的监测不包括口岸内航空食品供应单位。
A. 对
B. 错
【判断题】
公共场所经营者应当制定公共场所危害健康事故应急预案。
A. 对
B. 错
【判断题】
货物储存场地应有完整的隔离带,地面应平整硬化,通风良好,卫生应清洁,无医学媒介生物孳生场所,不应饲养家禽家畜。
A. 对
B. 错
【判断题】
储存场地卫生监督检查评为差的企业,填写《现场卫生监督笔录》和《限期卫生整改通知书》,在规定期限内完成整改并提交整改报告,整改期限结束时进行现场检查复核。
A. 对
B. 错
【判断题】
中国籍邮轮上的食品生产经营单位、公共场所应当取得海关颁发的国境口岸卫生许可证后方可从事生产经营活动。
A. 对
B. 错
【判断题】
进出境船舶不必具备消毒、除虫、除鼠药械及装置。
A. 对
B. 错
【判断题】
进出境船舶卫生监督更注重客舱的清洁卫生,不需关注货舱。
A. 对
B. 错
【判断题】
国际航行邮轮检查时应注意检查其船上流感样症状和急性消化道疾病等传染病预防控制预案,其中包括个案信息,数据收集,报告,响应及卫生控制等内容,有助于在进行个案检查时验证其预案的符合度。
A. 对
B. 错
【判断题】
国际航行船舶宿舱存在风险主要是宿舱的设计、构造、管理及运营可能会导致公共卫生风险发生。
A. 对
B. 错
【判断题】
压舱水舱存在风险主要是携带大量的动植物、细菌、其他病原微生物等,可能对人类健康、生态安全、海洋经济等造成严重损害。
A. 对
B. 错
【判断题】
国际航行船舶卫生监督检查发现的公共卫生风险会影响人体健康,或有可能导致疾病传播风险,不需要将发现的证据和需要采取的控制措施通知下一入境口岸主管当局。
A. 对
B. 错
【判断题】
出入境邮轮经风险评估,检疫风险较低的,经邮轮负责人或者其代理人申请,海关可以实施电讯检疫。
A. 对
B. 错
【判断题】
出入境邮轮发生突发公共卫生事件时,应当遵循统一指挥、职责明确、科学高效、反应及时、优先救治的原则。海关应当对人员医疗救治工作给予检疫便利。
A. 对
B. 错
【判断题】
入出境客车卧具应保持清洁整齐,一班次一换。
A. 对
B. 错
【判断题】
受入境检疫的列车和其他车辆到达站、关口后,卫生监督员首先登车。
A. 对
B. 错
【判断题】
如果列车在原停车地点不宜实施卫生处理,站长可以选择站内其他地点实施卫生处理。
A. 对
B. 错
【判断题】
出入境列车车厢内的微小气候和空气质量应符合国家规定的GB9673-1996标准。
A. 对
B. 错
【判断题】
卫生监督员在列车抵达或离开前,应了解入出境列车的基本信息,包括车次、国籍、始发站、沿途站、终点站、抵达或离开的时间、载客(货)情况等。
A. 对
B. 错
【判断题】
国境口岸卫生监督员在检查列车厨房前戴上口罩和帽子。
A. 对
B. 错
【判断题】
采集供理化指标检测的水样前应先用水样荡洗采样器。
A. 对
B. 错
【判断题】
采集供微生物指标检测的水样前应先用水样涮洗采样瓶。
A. 对
B. 错
【判断题】
凡装载有毒物品和食品的货车,应当分开按指定地点存放,防止污染,货物卸空后应当进行彻底洗刷。
A. 对
B. 错
【判断题】
对不符合卫生要求的入境、出境交通工具,必须接受当地市场监督管理局的督导立即进行改进。
A. 对
B. 错
【判断题】
交通工具上必须备有急救药物、急救设备及消毒、杀虫、灭鼠药物。
A. 对
B. 错