【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
推荐试题
【单选题】
"电子转单 "是指通过系统网络,将产地检验检疫机构和()的相关信息相互连通。___
A. 报检地检验检疫
B. 查验
C. 口岸检验检疫
D. 核实
【单选题】
()对于跨境电子商务的销售来说非常关键,也是店铺赢利的核心策略。___
A. 产品选择
B. 产品定位
C. 产品定价
D. 产品市场调研
【单选题】
()是按照装货重量成交的货物,在装运时出口商必须向进口商提供的一种证明文件,它证明所装货物的重量与合同规定相符,货到目的港有缺重量时出口商不负责任。___
A. 重量单
B. 装箱单
C. 尺码单
D. 货物清单
【单选题】
()是表明出口货物的包装形式、包装内容、数量、质量、体积或件数的单据___
A. 重量单
B. 装箱单
C. 尺码单
D. 货物清单
【单选题】
()是对原发盘的否定和重新修改。___
A. 发盘
B. 询盘
C. 还盘
D. 受盘
【单选题】
()是海关总署联合国家外汇管理总局共同开发的出口收汇核销单和出口收汇报关单联网核查系统。___
A. 出口计费系统
B. 出口审计系统
C. 出口结汇系统
D. 出口收汇系统
【单选题】
()是衡量电商企业盈利能力的指标,是销售毛利与销售收入的比值。___
A. 毛利率
B. 销售毛利
C. 利润率
D. 效率
【单选题】
()是交易的一方通过口头或函电方式,无条件地同意对方在发盘或还盘中所提的交易条件和按此订立合同的一种表示。___
A. 发盘
B. 询盘
C. 还盘
D. 接受
【单选题】
()是交易一方向另一方就某项商品的出售或购买,愿意按一定交易条件和贸易方式成交订约的表示。___
A. 发盘
B. 询盘
C. 还盘
D. 受盘
【单选题】
()是交易一方向另一方通过口头或函电方式发出的,想购买或想出售某项商品的一种表示,是买卖双方磋商交易的开始。___
A. 发盘
B. 询盘
C. 还盘
D. 受盘
【单选题】
()是由进出口货物收发货人或其代理人填制,并向海关提交的申报货物状况的法律文书,是海关依法监管货物进出口、征收关税、编制海关统计及处理其他海关业务的重要凭证。___
A. 报关单
B. 报检单
C. 通关单
D. 发票
【单选题】
()是在跨境电子商务交易过程中提供支付服务的第三方支付平台___
A. 支付企业
B. 电商平台
C. 报关企业
D. 监管场所经营人
【单选题】
()是整个海关进出口业务的中心环节,也是电子口岸执法系统中的重要组成部分。___
A. 检验检疫
B. 电子转单
C. 报关业务
D. 电子审单
【单选题】
()是指通过一定的结算工具和支付系统对于因贸易或投资发生的资金实现两个或两个以上国家或地区之间的转移行为。___
A. 支付
B. 跨境支付
C. 交易
D. 物流
【单选题】
()需求是确保数据分析过程有效性的首要条件,可以为收集数据、分析数据提供清晰的目标。___
A. 收集数据
B. 分析数据
C. 识别信息
D. 过程改进
【单选题】
()在整个跨境电子商务中的比重最大,约占整个电子商务出口的 90%,()虽只占跨境电子商务总量的 10%左右,但却是增长最为迅速的部分。___
A. B2B、 B2C
B. B2C、 B2B
C. C2B、 C2C
D. C2C、 C2B
【单选题】
()之所以成为一种新的营销模式,是因为互联网拥有巨大的用户群。___
A. 生产
B. 网络营销
C. 推销
D. 市场营销
【单选题】
()指为电商提供物流配送的企业。___
A. 物流企业
B. 电商平台
C. 报关企业
D. 监管场所经营人
【单选题】
“电子商务 ”是通过()进行销售商品、提供服务等的经营活动。___
A. 增值网
B. 虚拟网
C. 互联网
D. 局域网
【单选题】
“电子转单 ”是指通过系统网络,出境货物经()将检验检疫合格后的相关电子信息传输到出境口岸检验检疫机构。___
A. 产地检验检疫机构
B. 报检地检验检疫机构
C. 发货地检验检疫机构
D. 目的地检验检疫机构
【单选题】
“通关单联网核查 ”的基本要求一是先()后(),二是通关单纸质单证信息与通关单电子数据必须一致。___
A. 报检、报关
B. 报关、报检
C. 报检、通关
D. 报关、通关
【单选题】
《电子商务示范法》是()于 1996年通过的,这将促进协调和统一国际贸易法。___
A. 国际贸易法委员会
B. 国际商会
C. 欧盟贸易法委员会.
D. 美国贸易法委员会
【单选题】
《电子商务示范法》由谁颁发?___
A. 美国商业部国际贸易管理局
B. 中国商务部
C. 联合国国际贸易法委员会
D. 国际贸易组织机构
【单选题】
B2C跨境电商或平台的代表企业不包括 ?___
A. Ebay
B. 速卖通
C. 亚马逊
D. 兰亭集势
【单选题】
跨境进口 B2C模式是()。___
A. 台招商
B. 保税自营 +直采
C. 跨境供应链服务商
D. 海外买手制
【单选题】
O2O营销模式的特点错误的是?___
A. 获取更丰富、全面的商家及其服务的内容信息
B. 更加便捷的向商家在线咨询并进行预售
C. 获得相比线下直接消费较为便宜的价格
D. O2O可以托管代运营
【单选题】
SET协议又称为___
A. 安全套接层协议
B. 安全电子交易协议
C. 信息传输安全协议
D. 网上购物协议
【单选题】
阿里巴巴国际站的定位是什么 ?___
A. 以客户为中心的服务型企业
B. 全球中小供应商与采购商
C. 中小型企业的网上贸易市场
D. 以客户为中心的主导型企业
【单选题】
按《》需核查货证的,出境检验检疫关系人应配合出境口岸检验检疫机构完成检验检疫工作。___
A. 口岸查验管理规定
B. 出境货物换单凭证
C. 口岸检验检疫规定
D. 出境货物通关单
【单选题】
按照()贸易术语成交的出口合同,在装船前须由我进出口公司及时向保险公司办理投保手续,填制投保单。___
A. FOB
B. CIF
C. CFR
D. CNF
【单选题】
保税仓库中储存的是?___
A. 免税货物
B. 减税货物
C. 退税货物
D. 暂未纳税的货物
【单选题】
报检计费由()自动完成,接到施检部门转来的全套单据后,对照单据进行计费复核。___
A. 电子核查中心
B. 电子查验系统
C. 电子管理中心
D. 电子审单系统
【单选题】
比传统的由客户凭《出境货物换单凭证》到报关地检验检疫机构换发《出境货物通关单》的方式,()具有数据信息共享、简化操作程序、降低外贸成本、提高通关速度的优点。___
A. 电子转单
B. 电子审单
C. 电子验单
D. 电子查单
【单选题】
采用网上支付的用户,通过()查询到税费通知后,可在网上发布支付指令,银行接到支付指令后,可直接从用户在银行开设的预储帐号中划转税费,划转成功后,用户可直接办理相关通关手续。___
A. 中国电子口岸
B. 海关
C. 银行
D. 税务局
【单选题】
产地检验检疫机构检验检疫合格后,应及时通过网络将相关信息传输到___
A. 质检局
B. 货代公司
C. 电子转单中心
D. 海关
【单选题】
产地检验检疫机构签发完《》后需进行更改的,按《出入境检验检疫报检规定》的有关规定办理。___
A. 检验凭条
B. 转单凭条
C. 检验检疫认证书
D. 检验检疫结果单
【单选题】
出境货物受理电子报检后,报检人应按受理报检信息要求,在()施检时,提交报检单和随附单据。___
A. 海关
B. 检验检疫机构
C. 质量监督检验中心
D. 第三方物流
【单选题】
出口货物装运之后,出口商即应按()要求缮制单据,并在()规定的交单有效期内,向有关银行办理议付、结汇手续。___
A. 信用证
B. 发票
C. 装货清单
D. 物流单据
【单选题】
出口收汇系统为出口收汇核销单建立了电子底账数据,核销单的基本信息以及各部门对核销单的操作情况都将保存在(),供外汇管理局查询并进行核销单挂失等各项操作。___
A. 电子口岸
B. 电子审计系统
C. 电子口岸数据中心
D. 电子计费中心
【单选题】
除出口活动物、重点检查有关名单内企业申报的货物、以及国家质检总局确定的货物等必须逐批核查货证外,其他货物的口岸查验核查货证的比例为申报查验批次的___
A. 1-3%
B. 1-4%
C. 1-5%
D. 1-6%