【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
推荐试题
【单选题】
下列属于继发性不孕的情况是___
A. 育龄妇女,未避孕,婚后性生活正常,未避孕,同居2年未孕者
B. 育龄妇女,婚后性生活正常,未避孕,同居1年未孕者
C. 夫妇同居,性生活正常,曾有自然流产一次,未避孕,2年未孕者
D. 夫妇同居,性生活正常,曾有自然流产一次,后未避孕,1年未孕者
E. 夫妇同居后1年未孕,一方有无法纠正的解剖生理缺陷者
【单选题】
腮腺炎病毒属于___
A. 副黏病毒
B. 疱疹病
C. 肠道病
D. 柯萨奇病毒
E. 埃可病毒
【单选题】
适宜用胎头吸引术的情况是___
A. 第二产程延长
B. 严重头盆不称
C. 宫颈口未开全
D. 胎先露棘上3cm
E. 额先露
【单选题】
阴道豆渣样白带见于___
A. 老年性阴道炎
B. 念珠菌阴道炎
C. 滴虫阴道炎
D. 慢性宫颈炎
E. 外阴炎
【单选题】
复种脊髓灰质炎疫苗的年龄是___
A. 1岁
B. 2岁
C. 3岁
D. 4岁
E. 5岁
【单选题】
为判断呼吸衰竭患者代谢紊乱情况,首选的辅助检查是___
A. 血常规
B. 血细胞涂片
C. 血气分析
D. 尿常规
E. 肺功能测
【单选题】
溃疡病最重要的发病因素是___
A. 胃酸分泌过多
B. 幽门螺杆菌感染
C. 胃粘膜屏障损害
D. 遗传因素
E. 精神神经因素
【单选题】
急性乳腺炎主要原因是___
A. 乳头抬高
B. 乳头凹陷
C. 首次哺乳
D. 乳管畸形
E. 乳汁淤积
【单选题】
有机磷农药中毒的死因主要是___
A. 休克
B. 脑水肿
C. 心脏骤停
D. 呼吸衰竭
E. 电解质紊乱
【单选题】
下列关于左、右主支气管的描述中错误的是___
A. 气管在隆凸处分为左、右主支气管
B. 右主支气管较左主支气管粗、短、直
C. 进行气管插管时,若插入过深时易误插入右主支气管
D. 异物易吸入左主支气管
E. 肺脓肿好发于右肺与右主支气管的结构特点有关
【单选题】
慢性心力衰竭最常见的诱因是___
A. 妊娠
B. 水电解质平衡紊乱
C. 服用洋地黄药物
D. 感染
E. 过度劳累
【单选题】
小儿乳牙出齐的年龄为___
A. 1~1.5岁
B. 1.5~2岁
C. 2~2.5岁
D. 4~6个月
E. 7~12个月
【单选题】
PPD试验有助于诊断的疾病是___
A. 营养不
B. 佝偻病
C. 糖尿病
D. 结核病
E. 肾病
【单选题】
预防接种属于___
A. 非特异性免疫
B. 自然主动免疫
C. 自然被动免
D. 人工主动免疫
E. 人工被动免
【单选题】
前囟饱满多见于___
A. 佝偻病
B. 头小畸
C. 呆小病
D. 脑积水
E. 甲状腺功能减低症
【单选题】
腺病毒肺炎发病年龄最多见于___
A. 新生儿
B. 2~6个月婴
C. 6~12个月婴儿
D. 6~24个月小儿
E. 任何年龄
【单选题】
正常情况下,脐带中的静脉条数是___
A. 5条
B. 4条
C. 3条
D. 2条
E. 1条
【单选题】
成人每日内生水的量为___
A. 100ml
B. 200ml
C. 300ml
D. 400ml
E. 500ml
【单选题】
急性肾衰少尿期死因多是___
A. 高血钾
B. 碱中毒
C. 肺水肿
D. 钠潴留
E. 尿潴留
【单选题】
新生儿期应接种的疫苗___
A. 麻疹减毒活疫苗
B. 破伤风抗毒素
C. 乙脑疫苗
D. 百、白、破疫苗
E. 卡介苗、乙肝疫苗
【单选题】
下列哪项是促使子宫复旧的因素___
A. 胎膜残留
B. 盆腔感染
C. 经产妇
D. 产褥体操
E. 以上都不对
【单选题】
女性骨盆的出口横径平均值约___
A. 9cm
B. l0cm
C. 12cm
D. 13cm
E. 15cm
【单选题】
6个月婴儿,在儿科门诊检查,下列哪项情况认为是发育异常___
A. 前囟未闭
B. 头围44cm
C. 乳牙未萌出
D. 俯卧时不能抬胸
E. 两手不会传递玩具
【单选题】
妇科盆腔检查常采用的体位是___
A. 平卧位
B. 膀胱截石位
C. 膝胸卧位
D. 臀高头低位
E. 自由体位
【单选题】
下列关于甲型肝炎病毒的描述,正确的是___
A. 属于DNA病毒
B. 感染后机体获得的免疫力不持久
C. 只有一个抗原抗体系统
D. 可引起慢性肝炎
E. 病毒抵抗力弱
【单选题】
引起猩红热的病原体是___
A. 乙群A型溶血性链球菌
B. 金黄色葡萄球菌
C. 肺炎链球菌
D. 疱疹病毒
E. 柯萨奇病毒
【单选题】
成人男性贫血,Hb的诊断标准是___
A. Hb<150g/L
B. Hb<120g/L
C. Hb<110g/L
D. Hb<90g/L
E. Hb<60g/L
【单选题】
下列哪项不属于新生儿抽搐的特殊表现___
A. 眼球震颤
B. 斜视
C. 尖叫
D. 握拳
E. 呼吸暂停
【单选题】
多器官功能障碍综合征必须是___
A. 三个系统或(和)器官的急性功能障碍
B. 一个系统的两个器官的急性功能障碍
C. 一个系统的两个以上器官急性功能障碍
D. 一个系统或(和)器官为另一个系统或器官的发病原因
E. 一个以上系统或(和)器官在急性疾病过程中相继出现急性功能障碍
【单选题】
上消化道出血最常见的原因___
A. 门脉高压症
B. 出血性胃炎
C. 消化性溃疡D.胃癌
D. 胃癌
E. 胆道出血
【单选题】
关于胎儿循环系统特点,正确的是___
A. 有脐静脉2条,脐动脉1条
B. 卵圆孔位于左、右心室之间
C. 进入胎儿右心房的下腔静脉血是混合
D. 卵圆孔开口处位于上腔静脉入口
E. 胎儿体内存在纯动脉血
【单选题】
原发性肾病综合征的常见并发症是___
A. 心力衰竭
B. 高血压脑病
C. 肾功能不全
D. C.肾功能不全
E. 感染
【单选题】
口服避孕药的作用是___
A. 非细菌性异物反应
B. 使宫颈黏液变稀薄
C. 减少子宫内膜前列腺素的形成
D. 抑制排卵
E. 抑制输卵管蠕
【单选题】
胎盘小叶一般有___
A. 5~10个
B. 10-15个
C. 15~20个
D. 20~25个
E. 25~30个
【单选题】
下列有关流行性乙型脑炎流行病学的描述,错误的是___
A. 以显性感染为主
B. 主要通过蚊虫叮咬传播
C. 主要流行于夏秋季
D. 感染后可获持久免疫力
E. 人对乙脑病毒普遍易感
【单选题】
某患儿所在幼儿园老师反映其身高、体重均远远低于其同龄儿,为了解其骨骼发育情况,应作下列哪项检查___
A. 血常规
B. 胸部X线摄片
C. 肝功能
D. 腰椎穿刺
E. 腕部X线照片
【单选题】
深部浓肿诊断的主要依据是___
A. 有波动感
B. 局部有深压痛高
C. 白细胞增高
D. 穿刺抽到脓液
E. 患处运动障碍
【单选题】
女性,36岁,从高处坠落时臀部着地造成腰椎骨折,其致伤原因是___
A. 直接损伤
B. 间接损伤
C. 肌肉牵拉
D. 积累损伤
E. 骨骼疾病
【单选题】
小儿无尿是指24小时尿量低于___
A. 30ml
B. 50ml
C. 80ml
D. 100ml
E. 120ml
【单选题】
以下药物中对再生障碍性贫血的发生没有明显影响的是___
A. 氯霉素
B. 阿司匹林
C. 保泰松
D. 磺胺
E. 青霉素