【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
推荐试题
【多选题】
衡量大学生全面发展的一个重要标准是___
A. 知识渊博
B. 品质高尚
C. 德才兼备
D. 知行统一
【多选题】
独立生活意识指___
A. 自己的事情自己处理不需要别人管
B. 自己想干什么就干什么
C. 树立自信、自律、自立、自强的精神
D. 天马行空独来独往
【多选题】
___作为社会主义核心价值体系的精髓,解决的是应当具备什么样的精神状态和精神风貌的问题。
A. 马克思主义的指导地位
B. 中国特色社会主义的共同理想
C. 民族精神和时代精神
D. 社会主义荣辱观
【多选题】
___是人才素质的综合体现.
A. 德
B. 智
C. 体
D. 美
【多选题】
当代大学生的成才的目标应当包括___。
A. 德
B. 智
C. 体
D. 美
【多选题】
社会主义荣辱观的基本内容包括___
A. 以热爱祖国为荣、以危害祖国为耻
B. 以遵纪守法为荣、以违法乱纪为耻
C. 以崇尚科学为荣、以愚昧无知为耻
D. 以诚实守信为荣、以见利忘义为耻
【多选题】
___是调节人们思想行为、协调人际关系、维护社会秩序的两种基本社会规范。
A. 法律
B. 制度
C. 道德
D. 政治
【多选题】
学风是指在一定环境或条件下形成和表现出来的带有一贯性的学习风格和行为样式,优良的学风要在___上下功夫。
A. 勤奋
B. 创新
C. 求实
D. 严谨
【多选题】
大学生活特点表现在___。
A. 大学是知识的海洋
B. 大学有教书育人的良师
C. 大学有浓厚的学习氛围
D. 大学有浓厚的成才氛围
【多选题】
新的学习理念表现在___。
A. 自主学习
B. 全面学习
C. 创新学习
D. 终身学习
【多选题】
“思想道德修养与法律基础”课是帮助大学生树立正确___的一门课程。
A. 世界观
B. 人生价值观
C. 道德观
D. 法制观
【多选题】
学习"思想道德修养与法律基础"课需要注重___
A. 学习科学理论
B. 学习和掌握思想道德与法律修养的基本知识
C. 联系实际
D. 知行统一
【多选题】
大学生活与中学生活相比发生了以下___显著变化。
A. 学习要求
B. 生活环境
C. 物质消费水平
D. 社会活动
【多选题】
社会主义核心价值体系的内容包括___。
A. 坚持马克思主义指导思想
B. 确立中国特色社会主义共同理想
C. 弘扬以爱国主义为核心的民族精神和以改革创新为核心的时代精神
D. 树立社会主义荣辱观
【多选题】
“思想道德修养与法律基础”课是一门具有以下特点的课程:___
A. 思想性
B. 政治性
C. 知识性
D. 实践性和综合性
【多选题】
当前,我国的发展所面临的挑战包括___
A. 我国自然资源保护的挑战
B. 世界科技文化发展的挑战
C. 新世纪新阶段我国发展任务的挑战.
D. 复杂多变的国际环境的挑战
【多选题】
大学生崭新形象的必备要素包括___
A. 追求真理善于创新
B. 视野开阔胸怀宽广
C. 谦虚谨慎虚心好学
D. 理想远大热爱祖国
【多选题】
学习“思想道德修养与法律基础”课有助于当代大学生___
A. 摆正德和才的位置
B. 认识立志、树德和做人的道理
C. 掌握丰富的思想道德与法律知识
D. 选择正确的成才之路
【多选题】
严谨就是要___,做到严肃、严格、严密。
A. 一丝不苟
B. 求真务实
C. 锲而不舍
D. 认真负责.
【多选题】
人们对生活在其中的世界及人与世界的关系的总的看法和根本观点就是___
A. 世界观
B. 人生观
C. 价值观
D. 历史观
【多选题】
人生观的核心是___
A. 人生意义
B. 人生目的
C. 人生态度
D. 人生价值
【多选题】
人的本质属性是___
A. 自然属性
B. 自私自利
C. 社会属性
D. 趋利避害
【多选题】
社会主义社会人生价值标准是___
A. 是否拥有金钱财富
B. 自我价值实现的程度
C. 宗教信仰是否虔诚
D. 是否为人民群众尽心尽力服务
【多选题】
回答人为什么活着___
A. 人生态度
B. 人生目的
C. 人生价值
D. 人生意义
【多选题】
表明人应当怎样对待生活___
A. 人生态度
B. 人生目的
C. 人生价值
D. 人生意义
【多选题】
判别什么样的人生才有意义___
A. 人生态度
B. 人生目的
C. 人生价值
D. 价值取向
【多选题】
下列人生态度中正确的是___
A. 认真务实
B. 看破红尘
C. 悲观消沉
D. 满足于现状
【多选题】
下列属于正确的人生目的的是___
A. 追求享乐
B. 为人民服务
C. 追求金钱
D. 追求个人利益
【多选题】
___认为,金钱可以主宰一切.
A. 享乐主义人生观
B. 拜金主义人生观
C. 功利主义人生观
D. 个人主义人生观
【多选题】
___ 认为,社会和他人是达到个人目的的手段。
A. 享乐主义人生观
B. 拜金主义人生观
C. 功利主义人生观
D. 个人主义人生观
【多选题】
___认为,人生的全部内容就在于满足感官的需求与快乐。
A. 享乐主义人生观
B. 拜金主义人生观
C. 功利主义人生观
D. 个人主义人生观
【多选题】
马克思对于人的本质的论断确立与___
A. 《关于费尔巴哈的提纲》
B. 《共产党宣言》
C. 《劳动在才从猿到人转变过程中的作用》D《论黑格尔哲学》
【多选题】
人与自然关系的实质是___
A. 人与人的关系,是社会关系
B. 人对于自然的利用和占有
C. 自然必须服务于人类社会的发展
D. 人与物的占有与被占有的关系
【多选题】
人生观与世界观的关系表现为___
A. 世界观决定人生观
B. 人生观从属于世界观
C. 人生观对于世界观的巩固、发展和变化起着重要作用
D. 人生观决定世界观
【多选题】
人生目的在人生实践中具有重要作用___
A. 人生目的决定人生道路
B. 人生目的决定人生价值标准
C. 人生目的决定人生态度
D. 人生态度决定人生目的
【多选题】
端正的人生态度表现为___
A. 人生须认真
B. 人生须务实
C. 人生应乐观
D. 人生要进取
【多选题】
用科学高尚的人生观指引人生就要___
A. 树立为人民服务的人生观
B. 反对拜金主义人生观
C. 反对享乐主义人生观
D. 反对个人主义人生观
【多选题】
价值观的内容表现为___
A. 价值取向
B. 价值追求
C. 凝结为一定的价值目标
D. 价值尺度和准则
【多选题】
评价人生价值要坚持___
A. 能力有大小与贡献须尽力相统一
B. 物质贡献与精神贡献相统一
C. 完善自身与贡献社会相统一
D. 动机与效果相统一
【多选题】
保持心理健康的方法有___
A. 树立正确的世界观、人生观、价值观
B. 掌握应对心理问题的科学方法
C. 合理调控情绪
D. 积极参加集体活动