【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
推荐试题
【单选题】
对于正常类贷款,贷款经办行可定期进行贷后检查抽查,抽查比例一般为每季度( )。___
A. 0.4
B. 0.2
C. 0.1
D. 0.05
【单选题】
关于资产组合风险监控的关键风险指标,下列说法错误的是( )。___
A. 贷款迁徙率指标主要指正常及关注类贷款迁徙率
B. 不良资产率一般是指可疑类和损失类贷款之和与信贷资产总额之比
C. 不良贷款拨备覆盖率是准备金占不良贷款余额的比例
D. 风险管理运营效率指标主要包括审批处理量变动、审批通过率变动、催收成功率变动等
【单选题】
根据《个人贷款管理暂行办法》规定,贷款银行调查人应履行尽职调查职责,对个人贷款申请内容和相关情况的真实性、准确性、( )进行调查核实,形成调查评价意见。___
A. 风险性
B. 合法性
C. 合规性
D. 完整性
【单选题】
根据《个人贷款管理暂行办法》规定,贷款人应加强对贷款的发放管理,遵循_____分离的原则,设立_____放款管理部门或岗位,负责落实放款条件,发放满足约定条件的个人贷款。( )___
A. 前台与后台;独立的
B. 调查与审查;专门的
C. 审贷与放贷;专门的
D. 审贷与放贷;独立的
【单选题】
关于个人贷款还款方式变更,下列说法正确的是( )。___
A. 借款人可通过电话或书面方式提出还款方式变更申请
B. 各种还款方式之间可以随意相互变更
C. 借款人贷款账户中应没有拖欠本息及其他费用
D. 借款人可在变更还款方式后归还当期贷款本息
【单选题】
借款人委托其他自然人代办个人贷款的划付时,代理人需要持有的证件或材料不包括( )。___
A. 本人身份证件
B. 借款人身份证件
C. 借款人授权委托书
D. 个人住房贷款审批表
【单选题】
个人耐用消费品贷款的贷款期限一般为( )。___
A. 半年以内,最长不超过 2 年
B. 一年以内,最长不超过 2 年
C. 一年以内,最长不超过 3 年
D. 两年以内,最长不超过 3 年
【单选题】
银行在受理借款人个人抵押授信贷款业务时,不能接受的抵押物是( )。___
A. 借款人全额购买的期房
B. 借款人自有住房
C. 借款人自有商用房
D. 借款人抵押在银行的住房
【单选题】
借款合同签订以后,如果( ),则允许变更借款合同。___
A. 借款人不履行借款合同,贷款难以收回
B. 借款人已经申请破产,进入清算程序
C. 借款人因不可抗拒的意外事故致使合同无法履行
D. 经借贷双方协商同意
【单选题】
关于借款合同的变更与解除.下列说法错误的是( )。___
A. 借款合同依法需要变更的,必须经借贷双方协商同意,协商未达成之前借款合同继续有效
B. 如需办理抵押变更登记的,借款人应到原抵押登记部门办理变更抵押登记手续及其他相关手续
C. 当借款保证人失去保证能力时,借款人可申请以信用贷款替代原贷款
D. 借款人在还款期限内丧失民事行为能力后,如果没有财产继承人和受遗赠人,贷款银行有权提前收回贷款,并依法处分抵押物或质物,用以归还未清偿部分
【单选题】
( )不是商用房贷款借款人应具备的基本条件。___
A. 以借款人拟购商用房向贷款人提供抵押担保
B. 在银行开立个人结算账户
C. 具有稳定的职业和收入.具备还款意愿和还款能力
D. 发放对象是持有工商行政管理机关核发的非法人营业执照的个体
【单选题】
关于商用房贷款的还款方式,表述错误的是( )。___
A. 一笔贷款只能选择一种还款方式
B. 借款人可根据需要选择还款方式
C. 借款人如想提前偿还全部或部分贷款本息,应提前 15 个工作日向贷款银行提出申请
D. 合同签订后.还款方式未经贷款银行同意不得更改
【单选题】
贷款人受理借款人商用房贷款申请后,应对商用房贷款申请内容和相关情况的( )进行调查核实。___
A. 真实性、准确性、可靠性
B. 风险性、可靠性、真实性
C. 真实性、准确性、完整性
D. 风险性、收益性、流动性
【单选题】
关于个人经营贷款的说法,不正确的是( )。___
A. 发放对象为从事合法生产经营的法人企业或个体工商户
B. 借款人是具有完全民事行为能力的自然人
C. 相对个人住房贷款,个人经营类贷款风险更容易控制
D. 借款人可将该贷款用于定向购买商用房
【单选题】
个人经营贷款的特点不包括( )。___
A. 贷款期限相对较短
B. 风险控制难度较大
C. 适用面窄
D. 贷款用途多样.影响因素复杂
【单选题】
不属于贷款人通过面谈应该了解的情况的是( )。___
A. 申请人的基本情况
B. 抵押物的对立面、内部结构和周边环境情况
C. 贷款用途
D. 还款意愿和还款能力
【单选题】
赵先生在信用社连续 3 次进入黑名单,现在想在信用社用信,以下对的是___
A. 客户经理直接进行黑名单删除
B. 汇报经联社删除
C. 不影响办理贷款
D. 无法删除且无法办理贷款
【单选题】
下列对个人经营贷款操作风险的理解中,错误的是( )。___
A. 贷款流程执行不严格
B. 操作风险是贷款发放之前的风险
C. 审批人员放松审批条件向关系人发放贷款
D. 未严格执行商业银行授权管理制度,超权限审批发放贷款
【单选题】
下列关于农户贷款的表述,错误的是( )。___
A. 农户贷款仅可用于生产经营用途
B. 依据贷款审查结果,确定授信额度,作出审批决定,在办结时限以前,将贷款审批结果及时、主动告知借款人
C. 贷中审查应当对贷款调查内容的合规性和完备性进行全面审查
D. 农村金融机构应当遵循审慎性与效率原则,建立完善独立审批制度
【单选题】
下列不可以作为个人经营贷款申请材料中个人收入证明的是( )。___
A. 个人纳税证明
B. 在银行近 3 个月内的存款
C. 工资薪金证明
D. 个人在经营实体的分红证明
【单选题】
在个人经营贷款中,借款人变更还款方式需要满足的条件不包括( )。___
A. 借款人应向银行提交还款方式变更申请书
B. 借款人的贷款账户未拖欠本息及其他费用
C. 借款人具备还款意愿和还款能力
D. 借款人在变更还款方式前应归还当期的贷款本息
【单选题】
个人信用贷款的特点不包括( )。___
A. 贷款额度小
B. 准入条件严格
C. 贷款风险较低
D. 贷款期限短
【单选题】
个人贷款可采用多种担保形式,其中不正确的是( )___
A. 保证担保
B. 信用担保
C. 抵押担保
D. 质押担保
【单选题】
不良个人住房贷款的处置方式不包括( )。___
A. 通过拍卖行竞拍
B. 申请强制执行
C. 向法院提起诉讼
D. 与借款人协商变卖
【单选题】
借款人变更还款方式,需要满足的条件不包括( )。___
A. 借款人收入水平、工作单位未发生变化
B. 向银行提交还款方式变更申请书
C. 借款人的贷款账户中没有拖欠本息及其他费用
D. 借款人在变更还款方式前应归还当期的贷款本息
【单选题】
对个人经营贷款借款人的生产经营收入,应重点调查的内容不包括( )。___
A. 经营收入的合法性
B. 经营收入的稳定性
C. 未来收入预期的合理性
D. 经营成本的稳定性
【单选题】
在个人信用报告中,个人贷款 24 个月还款状态记录中,________ 表示担保人代还,即借款人的该笔贷款已由担保人代还,包括担保人按期代还与担保人代还部分贷款。( )___
A. *
B. N
C.
D.
【单选题】
个人贷款调查应以()方式为主。___
A. 电话查询
B. 间接查询
C. 信息查询
D. 实地查询
【单选题】
下列不属于按照担保方式划分的个人贷款产品的是()。___
A. 个人抵押贷款
B. 个人质押贷款
C. 个人信用贷款
D. 个人流动资金贷款
【单选题】
下列关于个人贷款合同的说法,错误的是()。___
A. 应使用统一格式的个人贷款的有关合同文本
B. 对不准备填写内容的空白栏不需再做处理
C. 同笔贷款的合同填写人与合同复核人不得为同一人
D. 对采取抵押担保方式的,应要求抵押物共有人在相关合同文本上签字
【单选题】
在个人贷款业务中,下列主体可能具有担保资格的是( )。___
A. 与借款人有关系的自然人
B. 不具有代偿能力的法人
C. 有重大违法行为损害银行利益的法人
D. 三年内连续亏损的法人
【单选题】
关于个人贷款还款方式变更,下列说法正确的是( )。___
A. 借款人可通过电话或书面方式提出还款方式变更申请
B. 各种还款方式之间可以随意相互变更
C. 借款人贷款账户中应没有拖欠本息及其他费用
D. 借款人可在变更还款方式后归还当期贷款本息
【单选题】
依照我国现行法,下列自然人中为限制民事行为能力或无民事行为能力人的是()。___
A. 张某,双耳失聪
B. 王某.精神失常
C. 李某,高位截瘫
D. 赵某.双目失明
【单选题】
个人基础数据库信用信息查询主体不包括( )。___
A. 个人
B. 企业
C. 商业银行
D. 政府机构
【单选题】
中国人民银行征信管理部门应当在收到个人异议申请的( )个工作日内将异议申请转交征信服务中心,征信服务中心应当在接到异议申请的( )个工作日内进行内部核查。___
A. 2;2
B. 2;5
C. 5;5
D. 5;10
【单选题】
征信报告中逾期记录保存的年限是( )___
A. 2 年
B. 3 年
C. 5 年
D. 10 年
【单选题】
个人住房贷款,在等额本金还款法下,借款人每月等额偿还本金,贷款利息则随本金余额逐月递减,因此还款总额()。___
A. 逐月递增
B. 不变
C. 逐月递减
D. 不定
【单选题】
个人综合消费贷款的期限最长不超过()。___
A. 1 年(含)
B. 2 年(含)
C. 3 年(含)
D. 5 年(含)
【单选题】
个人贷款资金应当采用受托支付方式向借款人交易对象支付,但借款人无法事先确定具体交易对象且金额不超过____元人民币的,可以采取自主支付方式。___
A. 20 万
B. 30 万
C. 50 万
D. 100 万
【单选题】
“金燕快贷通”按照“随用随贷余额控制周转使用阳光操作”的办法进行动态管理。()___
A. 一次核定
B. 双人核定
C. 一次申请
D. 金额不限