【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
推荐试题
【判断题】
在电力线路上工作,应按下列方式进行:填用第一种工作票、填用第二种工作票
A. 对
B. 错
【判断题】
填用第一种工作票的工作为:在停电线路[或在双回线路中的一回停电线路]上的工作;在全部的配电变压器台架上或配电变压器室内的工作
A. 对
B. 错
【判断题】
所谓全部停电,系指供给该配电变压器台架或配电变压器室内的所有电源线路均已全部断开者
A. 对
B. 错
【判断题】
填用第二种工作票的工作为:带电作业;带电线路杆塔上的工作;在运行中的配电变压器台上或配电变压器室内的工作
A. 对
B. 错
【判断题】
许可开始工作的命令,必须通知到工作负责人,其方法可采用:当面通知、电话传达、派人传达
A. 对
B. 错
【判断题】
操作可以约时停、送电
A. 对
B. 错
【判断题】
填用第二种工作票的工作,不需要履行工作许可手续
A. 对
B. 错
【判断题】
完成工作许可手续后,工作负责人[监护人]应向工作班人员交待现场安全措施、带电部位和其他注意事项。工作负责人[监护人]必须始终在工作现场,对工作班人员的安全应认真监护,及时纠正不安全的动作。分组工作时,每个小组应指定小组负责人[监护人]。在线路停电时进行工作,工作负责人[监护人]在班组成员确无触电危险的条件下,不可以参加工作班工作
A. 对
B. 错
【判断题】
如工作负责人必须离开工作现场时,应临时指定负责人,并设法通知全体工作人员及工作许可人。原工作负责人返回工作地点时,也应履行同样的交接手续。若工作负责人需要长时间离开现场,应由原工作票签发人变更工作负责人,两工作负责人应做好必要的交接
A. 对
B. 错
【判断题】
在工作中遇雷、雨、大风或其他任何情况威胁到工作人员的安全时,工作负责人或监护人可根据情况,不需停止工作
A. 对
B. 错
【判断题】
白天工作间断时,工作地点的全部接地线仍保留不动。如果工作班须暂时离开工作地点,则必须采取安全措施和派人看守,不让无关人员接近施工现场以及负载的起重和牵引机械装置等。恢复工作前,应检查接地线等各项安全措施的完整性
A. 对
B. 错
【判断题】
填用数日内工作有效的第一种工作票,每日收工时如果要将工作地点所装的接地线拆除,次日重新验电装接地线恢复工作,均须得到工作许可人许可后方可进行。如果经电力调度允许的连续停电、夜间不送电的线路,工作地点的接地线可以不拆除,但次日恢复工作前应派人检查
A. 对
B. 错
【判断题】
全部工作完毕后,工作班应清扫、整理现场。工作负责人[包括小组负责人]必须进行周密检查线路、变电所设备检修地段的状况以及在设备内外部、杆塔上导线上及瓷瓶上有无遗留的工具、材料等,通知并查明全部工作人员确由触网杆塔上撤下和撤离变电所后,再命令拆除接地线。接地线拆除后,应即认为线路带电,不准任何人再登杆和接触设备进行任何工作。再向值班员讲清所修项目、发现的问题、试验结果和存在的问题等,并与值班人员共同检查设备状况有无遗留物件,是否清洁等,然后在工作票上填明工作终结时间,经双方签名后,工作票方可终结
A. 对
B. 错
【判断题】
已结束的工作票,保存二个月
A. 对
B. 错
【判断题】
进行线路、变电所作业前,应作好下列停电措施:断开变电所[包括用户]线路断路器[开关]和隔离开关[刀闸];断开需要工作班操作的线路各端断路器[开关]、隔离开关[刀闸]和熔断器[保险];断开危及该线路停电作业,且不能采取安全措施的交叉跨越、平行和同杆线路的断路器[开关]和隔离开关[刀闸];断开有可能返回低压电源的断路器[开关]和隔离开关[刀闸]
A. 对
B. 错
【判断题】
将检修设备停电,必须把各方面的电源完全断开[任何运用中的星形接线设备中的性点,必须视为带电设备]。禁止在只经开关断电源的设备上工作。必须拉开刀闸,使各方面至少有一个明显的断开点[SF6绝缘的刀闸以其就地可靠的位置指示器显示]。与停电设备有关的变压器和电压互感器,必须从高、低压两侧断开,防止向停电检修设备反送电
A. 对
B. 错
【判断题】
应检查断开后的断路器[开关]、隔离开关[刀闸]是否在断开位置;断路器[开关]、隔离开关[刀闸]的操作机构有锁的应加锁;并应在断路器[开关]或隔离开关[刀闸]操作机构上悬挂“在此工作!”的标示牌
A. 对
B. 错
【判断题】
线路经过验明确实无电压后,各工作班[组]应立即在工作地段两端挂接地线。凡有可能送电到停电线路的各个相连接部分也要挂接地线。若有感应电压反映在停电线路上时,应加挂接地线。同时,要注意在拆除接地线时,防止感应电触电。主变电所、牵引变电所、降压变电所全部停电时,应将各个可能来电侧接地短路,其余部分不必每段都装设接地线。装设接地线可由一人进行
A. 对
B. 错
【判断题】
挂接地线时,应先接导线端,后接接地端,接地线连接要可靠,不准缠绕。拆接地线时的程序与此相反。装、拆接地线时,工作人员应使用绝缘棒或戴绝缘手套,人体不得碰触接地线
A. 对
B. 错
【判断题】
验电、装设、拆除接地线,必须由二人进行,一人操作,一人监护,其岗位等级不低于初级[包括初级]
A. 对
B. 错
【判断题】
直流验电器检验,先装配验电器,确认验电器外观完好无损。测试前对验电器进行验电功能试验是否完好;并到相同电压等级的直流电网上确认验电器功能正常
A. 对
B. 错
【判断题】
用普通的接触网接地线[柔性接地线]使用刚性接触网上,在刚性悬挂上安装有接地环,使用接地棒可以直接挂设在接地环上;
A. 对
B. 错
【判断题】
采用特制的接地棒[刚性接触网专用的],将接地线夹卡在汇流排上进行接地
A. 对
B. 错
【判断题】
柔性接地线不可用于刚性汇流排接地环处的接地
A. 对
B. 错
【判断题】
不小于2m以上的登高作业应申请,经审批同意后方可进行
A. 对
B. 错
【判断题】
一级登高作业应由班组提出申请,车间审批、登记
A. 对
B. 错
【判断题】
不小于二级的登高作业应由车间提出申请,公司质量安全部审批、登记
A. 对
B. 错
【判断题】
上海市对轨道交通行业事故管理的安全底线是不撞车、不追尾、不踩踏
A. 对
B. 错
【判断题】
事故等级分类可分为特别重大事故、重大事故、较大事故和一般事故
A. 对
B. 错
【判断题】
一般事故可分为A、B、C三类
A. 对
B. 错
【判断题】
根据集团运营实际,集团事故等级分为一般D类和一般E类事故
A. 对
B. 错
【判断题】
事故责任可分为全部责任、主要责任、同等责任、次要责任
A. 对
B. 错
【判断题】
集团修订后的《事规》于2018年1月1日开始实行
A. 对
B. 错
【判断题】
“运营时段列车信号(包括车载信号)错误升级显示。”该故障属于一般D类事故
A. 对
B. 错
【判断题】
“载客列车停站错开车门、未关闭车门且未采取相应的防护措施动车、运行中开启车门。”该事故属于一般D类事故
A. 对
B. 错
【判断题】
“错挂、漏挂、错撤、漏撤接地保护装置。”该事故属于一般E类事故
A. 对
B. 错
【判断题】
“列车刮坏行车设施设备、影响列车运行。”该事故属于一般E类事故
A. 对
B. 错
【判断题】
“浦江线对0111车故障影响运营事故”的原因是:列车转向架V型连杆松脱导致事故
A. 对
B. 错
【判断题】
通过“浦江线对0111车故障影响运营事故”,我们得到的教训是:现场人员处置不当扩大故障影响、应急响应联动处置机制不完善
A. 对
B. 错
【判断题】
“1号线133车部件脱落事故”的原因是:列车跨接线支撑座松脱导致事故
A. 对
B. 错