【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
推荐试题
【判断题】
对不良贷款管理及相应调查、催收、诉讼、清收处置等形成的纸质资料还应按户扫描,建立电子档案,及时入档保存
A. 对
B. 错
【判断题】
不良贷款诉讼由法人机构统一组织办理,实行诉讼案件管理责任制。
A. 对
B. 错
【判断题】
对不良贷款还款义务人应逐一建立信息库,主要内容不仅包括借款人、担保人及相关人员的基本信息。公司类还款义务人还包括法定代表人、股东、财务人员信息。
A. 对
B. 错
【判断题】
不良贷款清收处置可选择一种或综合运用多种方式,在同等条件下,非现金清偿优先于现金清偿。
A. 对
B. 错
【判断题】
不良贷款管理和清收处置人员的薪酬分配与不良贷款清收处置绩效挂钩。对与不良贷款清收处置岗位无关的内部有功人员可以进行奖励。
A. 对
B. 错
【判断题】
不良贷款转为正常贷款的,由资产管理业务条线移交给信贷管理业务条线,称为正移交。
A. 对
B. 错
【判断题】
集中管理不良贷款不能在三个月内移交的,经不良资产管理委员会批准,可适当延迟移交,但最长不能超过六个月。
A. 对
B. 错
【判断题】
国家税务总局《关于金融企业涉农贷款和中小企业贷款损失税前扣除的公告》(2015年第25号),对逾期1年以上的涉农贷款和中小企业贷款损失税前扣除政策进行了调整,实施简易税前扣除的限额由300万元提高到500万元;
A. 对
B. 错
【判断题】
贷款核销后必须坚持账销案存的管理原则,即核销后的贷款虽不再在银行资产负债表上进行会计确认和计量,但银行与借款人之间的借贷关系仍然存续(法律、法规规定债权与债务关系完全终结的除外)。
A. 对
B. 错
【判断题】
贷款核销只是银行账面上的处理,并未免除借款人应向银行承担的还款义务,并不表明银行放弃债权,银行应继续积极催收和追偿,最大限度地保护银行资产少受损失,切实维护银行的合法权益。
A. 对
B. 错
【判断题】
抵债金额是指取得抵债资产实际抵偿银行债务的金额。
A. 对
B. 错
【判断题】
抵债资产净值是指抵债资产账面余额扣除抵债资产减值准备后的净额。
A. 对
B. 错
【判断题】
取得抵债资产支付的相关税费是指银行收取抵债资产过程中所缴纳的契税、车船使用税、印花税、房产税等税金,以及所支出的过户费、土地出让金、土地转让费、水利建设基金、交易管理费、资产评估费等直接费用。
A. 对
B. 错
【判断题】
以物抵债管理应遵循严格控制、合理定价、妥善保管、及时处置的原则
A. 对
B. 错
【判断题】
银行在办理抵债资产接收后应采取上收保管方式
A. 对
B. 错
【判断题】
银行要根据抵债资产的性质和状况不定期进行检查和维护,及时掌握抵债资产实物形态及价值形态的变化情况,及时发现影响抵债资产价值的风险隐患并采取有针对性的防范和补救措施。
A. 对
B. 错
【判断题】
银行每半年应至少组织一次对抵债资产的账实核对,并作好核对记录。
A. 对
B. 错
【判断题】
以抵债协议书生效日,或法院、仲裁机构裁决抵债的终结裁决书生效日,为抵债资产取得日,不动产和股权应自取得日起1年内予以处置.
A. 对
B. 错
【判断题】
银行处置抵债资产应坚持公开透明的原则,避免暗箱操作,防范道德风险。
A. 对
B. 错
【判断题】
农商银行呆账核销应当遵循“符合认定条件、提供有效证据、账销案存、权在力催”的原则。对于核销后的呆账,要继续尽职追偿,尽最大可能实现回收价值最大化。
A. 对
B. 错
【判断题】
资产管理部门负责人负责对集中管理不良贷款的移交负责监交。
A. 对
B. 错
【判断题】
非集中管理不良贷款在贷款管理部门内部岗位之间移交,由原贷款管理责任人制作移交清单,向不良贷款清收处置责任人移交相关贷款资料。
A. 对
B. 错
【判断题】
集中管理不良贷款不能在三个月内移交的,经资产管理部门批准,可适当延迟移交,但最长不能超过六个月。
A. 对
B. 错
【判断题】
债权转让程序应严格按照有关债权转让办法执行,坚持公开操作、市场竞价的原则,审慎使用公开拍卖的处置方式。
A. 对
B. 错
【判断题】
内部员工及公职人员承贷及担保的贷款不得进行债权转让。
A. 对
B. 错
【判断题】
债权转让中受让方分期支付价款的,收到部分转让价款后,农村商业银行应向受让方先行移交债权凭证。
A. 对
B. 错
【判断题】
原则上,债权转让最终付款的时间不能超过债权转让协议生效后6个月。
A. 对
B. 错
【判断题】
债务重组适用于农商银行的次级、可疑、损失类贷款。央行票据置换不良贷款、整体处置不良贷款、已核销不良贷款不得实施债务重组。
A. 对
B. 错
【判断题】
不良贷款债务重组实行授权决策制度,决策人对不良资产管理委员会表决同意的结果可以否决,对表决不同意的结果不得同意处置。
A. 对
B. 错
【判断题】
农户、个体工商户等自然类不良贷款的债务重组,可以经农商行有权决策人授权后简化程序办理,无须经过不良资产管理委员会审议。
A. 对
B. 错
【判断题】
不良资产推介是指农商行通过公开形式,对不良资产进行展示、介绍和营销,以增强市场认知度的行为。
A. 对
B. 错
【判断题】
不良资产处置定价中,参与定价人员必须以中立的身份进行定价,不受业务各方的左右和影响。
A. 对
B. 错
【判断题】
不良资产处置定价小组的人数为3人以上的单数。
A. 对
B. 错
【判断题】
假设清算法是指在假定对债务企业或责任关联方进行清算的情况下,对企业整体资产进行评估和对负债进行确认,再根据被评估债权的性质,对被评估债权可能收回的程度进行分析判断的方法。
A. 对
B. 错
【判断题】
对非持续经营甚至关停倒闭、且财务资料严重缺失,但仍有证据表明该债权仍有潜在的出售价格,可以采用专家判断法确定该债权的处置价格。
A. 对
B. 错
【判断题】
农商行应当按照有关制度办法的规定加强抵债资产管理,本着不良资产处置效益最大化的原则,就是否同意以资抵债及时进行决策。
A. 对
B. 错
【判断题】
采用诉讼追偿方式清收不良贷款的,对违法、显失公平的判决、裁决或裁定,可视情况进行上诉。
A. 对
B. 错
【判断题】
委托第三方清收处置不良资产的,农商行应当对自然人类和公司类不良贷款实行同等对待,并结合不良资产追偿的难易程度等,合理确定委托费用。
A. 对
B. 错
【判断题】
资产经营中心开展不良贷款处置、诉讼等工作实行授权制,超授权范围的,根据权限进行决策。
A. 对
B. 错
【判断题】
对已核销不良资产继续执行责任追究制度,不因核销而免除责任人的责任。
A. 对
B. 错