【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
D
解析
暂无解析
相关试题
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
推荐试题
【多选题】
科学崇高的理想信念对人生价值的实现具有重要意义。在确立理想信念时,应该___。
A. 把崇高的理想和坚定的信念结合起来
B. 学会对不同的理想信念进行辨别和选择
C. 把个人的理想信念与社会的理想信念结合起来
D. 离开人的生活体验和实际行动,单纯地读书学习
【多选题】
原河北省政府办公厅秘书、河北省国税局局长李真因受贿、贪污罪于2003年10月9日被河北省高级人民法院终审判处死刑。当法官宣布了上述判决后,李真的双腿抖了一抖。他反思自己走向毁灭的根源时说:“人可以没有金钱,但不能没有信念,丧失信念,就要毁灭一生”。李真的经历,说明理想信念对人生具有以下重要作用:___。
A. 满足人生的全部愿望
B. 指引人生的奋斗目标
C. 成为人生的精神支柱
D. 提升人生的精神境界
【多选题】
在人类历史进程中,当社会主义发展遇到暂时的困难和曲折时,也要坚定社会主义必胜的信念。这是因为___。
A. 对理想目标的追求不能因为行动中的暂时失败而动摇
B. 科学信念是建立在对事物发展规律的正确认识基础上的
C. 社会主义必然代替资本主义是不以人的意志为转移的客观规律
D. 任何事物的发展都不可能一帆风顺,社会主义的发展也会出现曲折和反复
【多选题】
从l848年《共产党宣言》问世到1917年建立第一个社会主义国家经历了70年。多少艰难的尝试,多少惨痛的失败,但社会主义和共产主义的理想与实践不但没有被扼杀掉,相反焕发出更强大的生命力。到20世纪80年代末90年代初,东欧巨变、苏联解体,世界社会主义运动遭受重大挫折,然而,社会主义并未如西方有些人预言的那样走进历史的博物馆。中国人民坚定不移地走自己的路,中国特色社会主义的成功实践使社会主义运动展现了光明的前景。由此可见___。
A. 理想实现的路途是艰难曲折的
B. 共产主义是一种渺茫的幻想,可望不可及
C. 远大理想的实现需要一代一代人的不懈努力
D. 社会主义必然代替资本主义是不依人的主观意志为转移的客观规律
【多选题】
理想与现实的关系是___
A. 理想来源于现实,是对现实的反映
B. 理想高于现实,是现实的升华
C. 理想是基于对客观事物的发展规律的认识,对事物发展趋势的一种特殊放映,是对现实存在的一种扬弃的反映
D. 理想可以转化为现实
E. 理想总是带有不切实际的部分
【多选题】
建设有中国特色社会主义,是现阶段我国各族人民的共同理想。这种共同理想包括的内容有___。
A. 诚实劳动,争取美好生活的职业理想
B. 追求文明、健康、科学生活方式的生活理想
C. 民族团结、社会进步、人民幸福的道德理想
D. 现代化建设、振兴中华、统一祖国的社会理想
E. 爱好和平、反对分裂的政治理想
【多选题】
理想是否合理、进步与科学的判断标准是___
A. 是否反映客观事物发展规律
B. 是否具有现实可能性
C. 是否合乎历史发展规律
D. 是否有益于社会的发展和进步
E. 是否为社会的大多数人谋利益
【多选题】
社会理想是指一定社会的阶级或个人对未来___的追求、向往和设想,包括对未来社会的政治、经济、文化结构的设想和规划。
A. 自身生活
B. 社会体制
C. 文化发展
D. 社会制度
E. 政治结构
【多选题】
信念与信仰的关系是___。
A. 信仰是一个人做什么和不做什么的根本标准和态度
B. 信念是非要去做、去执行的坚决态度
C. 信仰属于信念
D. 信仰是信念的最高表现形式
E. 信念属于信仰
【多选题】
下面关于爱国主义的论述正确的是___。
A. 爱国主义的基本要求是:爱祖国的大好河山,爱自己的骨肉同胞,爱祖国的文化,爱自己的国家
B. 不同历史时期产生的爱国主义有不同的内涵
C. 在共产主义社会,爱国主义会失去存在的条件和意义
D. 在阶级社会,爱国主义具有阶级性
【多选题】
下面关于爱国主义优良传统的正确论述是___。
A. 维护统一,反对分裂
B. 同仇敌忾,抵御外辱
C. 热爱祖国,矢志不渝
D. 天下兴亡,匹夫有责
E. 追求真理,善于创新
【多选题】
爱国主义的时代价值表现在___。
A. 爱国主义是中华民族继往开来的精神支柱
B. 爱国主义是维护祖国统一和民族团结的纽带
C. 爱国主义是实现中华民族伟大复兴的动力
D. 爱国主义是个人实现人生价值的力量源泉
【多选题】
在现阶段,爱国主义主要表现为___
A. 献身于社会主义建设
B. 献身于保卫社会主义现代化事业
C. 献身于促进祖国统一的事业
D. 献身于促进国家和平统一
E. 献身于促进社会民主富强。
【多选题】
弘扬和培育民族精神的原则是___。
A. 要以全新的眼光看待弘扬和培育民族精神
B. 要以宽阔的眼光看待弘扬和培育民族精神
C. 要以实践的眼光看待弘扬和培育民族精神
D. 要以创新的眼光看待弘扬和培育民族精神
【多选题】
时代精神___。
A. 体现了民族的特质
B. 形成和发展于新的历史条件下
C. 是中华民族的伟大创造
D. 是顺应时代潮流的思想观念、行为方式、价值取向、精神风貌和社会风尚的总和
E. 与民族精神紧密相连,是民族精神的时代性体现