【填空题】
45.___是国防强大的基础。
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
经济发展
解析
暂无解析
相关试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
推荐试题
【单选题】
42岁男性患者,常有中上腹隐痛6年余,消化不良症状明显。检查:肝、脾未及,肝功能正常。最大胃酸分泌量为3.5mmol/h。可能为下列哪种疾病___
A. 慢性浅表性胃炎
B. 慢性萎缩性胃炎
C. 慢性肥厚性胃炎
D. 十二指肠球部溃疡
E. 溃疡型胃癌
【单选题】
儿童,5岁,吃饭时常把饭碗打破,屡受家长斥责。一次吃饭时,其母发觉小孩眼睛发直,随即饭碗坠地,数秒钟后正常,最有可的诊断是___
A. 癫癎小发作
B. 晕厥
C. 癔病
D. 精神病
E. 精神运动性发作意病
【单选题】
在高血压病发病中占主导地位的因素是___
A. 水钠滞留
B. 肾素一血管紧张素一醛固酮系统失调
C. 肾上腺素、去甲肾上腺素增多
D. 血管内皮功能异常
E. 高级神经中枢功能紊乱
【单选题】
急性特发性血小板减少性紫癜特点___
A. 急性未治可颅内出血
B. 急性未治半年后转为慢性
C. 急性未及时治疗可发生胃出血
D. 急性治疗者仍可急性心梗死亡
E. 80%未治者半年内自愈
【单选题】
羊羊,6个月。因阵发性哭闹伴呕吐8h来诊,体格检查:体温36.5℃,腹部稍隆,右侧腹部可触及一腊肠样肿块,有触痛,直肠指检发现指套上染有果酱样黏液便。应首先考虑___
A. 急性肠炎
B. 小肠扭转
C. 急性肠套叠
D. 阑尾周围脓肿
E. 蛔虫性肠梗阻
【单选题】
某中年女性患者,中午服敌百虫农药半杯,晚7时被家人发现,随即送来就诊,检查:躁动不合作、流涎、出汗、心率64次/min、呼吸28次/min、瞳孔1.5mm,不宜采用___
A. 催吐
B. 1:5000高锰酸钾溶液洗胃
C. 吸氧
D. 灌入50%硫酸镁导泻
E. 按医嘱立即注射阿托品
【单选题】
曹先生,38岁。6日前因溃疡穿孔行穿孔修补术,术后体温持续在38~39℃之间,今出现排便次数增多,伴里急后重。应考虑为___
A. 急性肠炎
B. 膈下脓肿
C. 盆腔脓肿
D. 肠襻间脓肿
E. 髂窝脓肿
【单选题】
热射病的主要临床特征为___
A. 体温高达40~42℃
B. 面色潮红,皮肤灼热
C. 常发生弥散性血管内凝血
D. 大脑温度达40~42℃,体温并不一定增高
E. 谵妄、惊厥、昏迷
【单选题】
谢女士,患糖尿病,胰岛素治疗期间突然心悸、饥饿、出汗,随即意识不清首要的措施为___
A. 加大胰岛素剂量
B. 加用优降糖
C. 静脉注射50%葡萄糖
D. 静脉滴注碳酸氢钠
E. 应用呼吸兴奋剂
【单选题】
正常人心尖搏动的位置在___
A. 左第5肋间锁骨中线内侧0.5~1cm
B. 左第5肋间锁骨中线外侧0.5~1cm
C. 右第5肋间锁骨中线内侧0.5~1cm
D. 右第5肋间锁骨中线外侧0.5~1cm
E. 左第4肋间锁骨中线外1.0cm
【单选题】
沈小姐,25岁。上腹部疼痛伴恶心、呕吐已8日,考虑为"急性胰腺炎"。此时,最具诊断价值的实验室检查是___
A. 血清淀粉酶
B. 尿淀粉酶
C. 血清脂肪酶
D. 血钙
E. 血糖
【单选题】
甲状腺功能亢进病人服用抗甲状腺功能亢进药物为什么不能立即见效___
A. 药物是缓释型
B. 药量小需积累
C. 对已合成的甲状腺素无作用
D. 药物尚未分布全身各脏器
E. 逐渐解决不宜快
【单选题】
配制混合胰岛素时,必须先抽吸短效胰岛素是为了防止___
A. 发生中和反应
B. 加速胰岛素降解
C. 丧失短效胰岛素的速效特性
D. 降低鱼精蛋白锌胰岛素药效
E. 增加胰岛素的不良反应