【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
推荐试题
【判断题】
255判断题 BBC保税区模式的优势:缩短物流时间;集运模式,节约成本;电子通关,渠道正规
A. 对
B. 错
【判断题】
C2C主要指个人用户提供买卖交易的平台的电子商务交易业务。目前主要的C2C电子商务企业有:淘宝、易趣等
A. 对
B. 错
【判断题】
Facebook是美国的一个社交网络服务网站,于2004年2月4日上线,主要创始人为美国人马克·扎克伯格
A. 对
B. 错
【判断题】
Link不仅仅只是一个社交网站,它的商务性以及一些特殊功能已被一些商业网站用来当做营销的渠道,Linkedin真正地把社交关系变成了商业网络
A. 对
B. 错
【判断题】
M2C模式的运营模式是平台招商,它的不足是品类受限
A. 对
B. 错
【判断题】
O2O是一种电子商务的模式,被定义为将线下商务的机会与互联网结合在一起,让互联网成为线下交易的前台
A. 对
B. 错
【判断题】
SEO是一种利用搜索引擎的索索规则来提高目的网站在有关所有引擎内排名的方式
A. 对
B. 错
【判断题】
阿里巴巴的SWOT分析缺点是盈利模式单一,市场饱和度增加等
A. 对
B. 错
【判断题】
阿里巴巴多语言市场,已于2013年7月17日正式向供应商开放,现包括西班牙语、葡萄牙语、法语、俄语等15个主流语种
A. 对
B. 错
【判断题】
阿里巴巴国际站的搜索排名是时时更新的
A. 对
B. 错
【判断题】
阿里巴巴国际站的主要优势市场占有率高、市场认可度高
A. 对
B. 错
【判断题】
阿里巴巴国际站定位:大中小企业的网上贸易市场
A. 对
B. 错
【判断题】
阿里巴巴国际站定位以客户为中心的服务型企业
A. 对
B. 错
【判断题】
阿里巴巴平台可以为在阿里巴巴平台上做外贸的用户带来流量
A. 对
B. 错
【判断题】
阿里巴巴旗下一达通是跨境电子商务第三方外贸服务平台企业
A. 对
B. 错
【判断题】
阿里巴巴是大型企业的网上贸易市场
A. 对
B. 错
【判断题】
阿里巴巴提供的商业资讯信息是免费的
A. 对
B. 错
【判断题】
按照发送信息是否事先经过用户许可划分,可以将Email营销分为许可Email营销和未经许可的Email营销
A. 对
B. 错
【判断题】
按照交易主体类型可以分为B2B,B2C,C2C三种
A. 对
B. 错
【判断题】
保税货物流转管理预录入系统为企业提供各类单证的录入和申报功能,并提供数据交换接口,各区域管理系统可通过改造实现对接功能
A. 对
B. 错
【判断题】
报关单录入、申报子系统提供进出口单位通过网上填写申报委托书或者备案数据下载协议,委托有权代理报关业务的单位代其办理某项报关业务,如:报关单录入、报关单审核、报关单申报或报关单审核和申报
A. 对
B. 错
【判断题】
报关申报系统是针对专业报关企业的特殊要求而开发的,通过该系统报关企业可以方便的进行报关单的录入、申报、修改、复制、查询和统计等功能,从而有效提高报关企业的工作效率
A. 对
B. 错
【判断题】
报关业务是整个海关进出口业务的中心环节,也是电子口岸执法系统中的重要组成部分
A. 对
B. 错
【判断题】
报检人发送的电子报检信息与提供的报检单及随附单据有关内容保持一致
A. 对
B. 错
【判断题】
蚕食策略运用了需求连续性的原理
A. 对
B. 错
【判断题】
产品曝光越高,反馈一定越高
A. 对
B. 错
【判断题】
出境货物电子转单传输内容包括报检信息、签证信息及其他相关信息
A. 对
B. 错
【判断题】
出境检验检疫关系人凭报检单号、转单号及密码等到出境口岸检验检疫机构申请《出境货物换单凭证》
A. 对
B. 错
【判断题】
传统的跨境贸易大部分主要由一国的进出口商通过另一国的进出口商,至少要跨越3个渠道
A. 对
B. 错
【判断题】
从订单类型看,跨境电商具有小批量、多批次、订单分散、周期短的特点
A. 对
B. 错
【判断题】
从市场格局来看,外贸B2C等增势迅猛,但外贸B2B仍占主导地位
A. 对
B. 错
【判断题】
从长远来看,数据化物流日趋完善将进一步带动跨境电商产业链的升级
A. 对
B. 错
【判断题】
第三方海外仓会把实时的库存信息共享给卖家,卖家根据商品销量和库存预警值确定是否需要提前准备往海外仓发货
A. 对
B. 错
【判断题】
第三方物流是由物流劳务的供方、需方之外的第三方去完成物流服务的物流运作方式
A. 对
B. 错
【判断题】
第四方物流指为跨境电子商务的交易方、第三方提供物流咨询、规划、信息等服务内容,是一个供应链集成方
A. 对
B. 错
【判断题】
点击率:点击率=曝光量/点击量。点击率可以反映出您的产品或公司在搜索结果页面是否足够吸引买家
A. 对
B. 错
【判断题】
电商模式可以重组国际贸易
A. 对
B. 错
【判断题】
电商总体运营整体指标主要面向的人群电商运营的高层,通过总体运营指标评估电商运营的整体效果
A. 对
B. 错
【判断题】
电子报检人对已发送的报检申请需更改或撤消报检时,无需发更改或撤消报检申请
A. 对
B. 错
【判断题】
电子口岸建设有利于增强管理部门的管理综合效能
A. 对
B. 错