【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
推荐试题
【多选题】
全党同志一定要永远与人民____,永远把人民对美好生活的向往作为奋斗目标,以永不懈怠的精神状态和一往无前的奋斗姿态,继续朝着实现中华民族伟大复兴的宏伟目标奋勇前进。___
A. 同呼吸
B. 共命运
C. 手牵手
D. 心连心
【多选题】
全党要更加自觉地增强____,既不走封闭僵化的老路,也不走改旗易帜的邪路,保持政治定力,坚持实干兴邦,始终坚持和发展中国特色社会主义。___
A. 道路自信
B. 理论自信
C. 制度自信
D. 文化自信
E. 思想自信
【多选题】
党的十九大报告指出,必须坚持和完善我国社会主义基本经济制度和分配制度,____。___
A. 毫不动摇巩固和发展公有制经济
B. 毫不动摇发展混合所有制经济
C. 毫不动摇限制非公有制经济发展
D. 毫不动摇鼓励、支持、引导非公有制经济发展
【多选题】
关于把握经济发展新常态,下列说法正确的有____。___
A. 新常态不是一个事件,不要用好或坏来判断
B. 新常态虽然主要表现在经济领域,但在文化、旅游、城市管理等领域也有体现
C. 新常态不是一个避风港,不要把不好做或难做好的工作都归结于新常态
D. 新常态不是不要国内生产总值增长,而是要更好发挥主观能动性、更有创造精神地推动发展
【多选题】
全面深化改革,要重点把握和处理好以下几个重大关系____。___
A. 解放思想和实事求是的关系
B. 整体推进和重点突破的关系
C. 全局和局部的关系
D. 顶层设计和摸着石头过河的关系
E. 胆子要大和步子要稳的关系
F. 改革发展稳定的关系
【多选题】
党政军民学,东西南北中,党是领导一切的。必须增强____,自觉维护党中央权威和集中统一领导,自觉在思想上政治上行动上同党中央保持高度一致。___
A. 政治意识
B. 大局意识
C. 核心意识
D. 看齐意识
E. 纪律意识
【多选题】
“四个全面”战略布局是____。___
A. 全面建成小康社会
B. 全面深化改革
C. 全面依法治国
D. 全面从严治党
E. 全面建设现代化国家
【多选题】
贯彻新发展理念首先要深入理解、科学把握其科学内涵和实践要求。下列说法正确的有________。___
A. 创新是引领发展的第一动力
B. 协调是持续健康发展的内在要求
C. 绿色是永续发展的必要条件
D. 开放是国家繁荣发展的必由之路
E. 共享是中国特色社会主义的本质要求
【多选题】
习近平主席在2017年新年贺词中列举了我国4项重大科技成果,主要是________、神州十一号和天宫二号对接。___
A. “中国天眼”500米口径球面射电望远镜
B. “墨子号”量子科学实验卫星
C. C919大型客机
D. 暗物质粒子探测卫星“悟空”
【多选题】
十九大党章增写要实施____,将这些重大战略与科教兴国战略、人才强国战略、可持续发展战略并提。___
A. 创新驱动发展战略
B. 乡村振兴战略
C. 区域协调发展战略
D. 军民融合发展战略
【多选题】
党的十九大报告提出,要统筹城乡发展、区域发展、____,调整经济结构,转变经济发展方式,推进供给侧结构性改革。___
A. 产业平衡发展
B. 经济社会发展
C. 人与自然和谐发展
D. 国内发展和对外开放
【多选题】
打赢供给侧结构性改革这场硬仗,要按照党的十九大的部署,把提高供给为主攻方向,着力___、降成本、补短板,同时还要重点在破立降上下功夫。___
A. 去产能
B. 去库存
C. 去顺差
D. 去杠杆
【多选题】
党的十八大以来,我国开放型经济新体制逐步健全,____稳居世界前列。___
A. 对外贸易
B. 对外投资
C. 外汇储备
D. 外汇支出
【多选题】
______问题是关系国计民生的根本性问题,必须始终把解决好“三农”问题作为全党工作重中之重。___
A. 农业
B. 农村
C. 农民
D. 农田
【多选题】
坚决打好精准脱贫攻坚战,要坚持精准扶贫、精准脱贫基本方略,坚持 ____“三位一体”大扶贫格局。___
A. 专项扶贫
B. 行业扶贫
C. 社会扶贫
D. 对口扶贫
【多选题】
下列哪些选项构成了中国政治制度的核心内容和基本框架,是社会主义民主政治的集中体现:____。___
A. 人民代表大会制度
B. 中国共产党领导的多党合作和政治协商制度
C. 民族区域自治制度
D. 基层群众自治制度
【多选题】
我国社会主义民主政治制度具有鲜明品格和巨大优势,表现在____。___
A. 能够有效保证人民广泛参加国家治理和社会治理
B. 能够有效调节国家政治关系
C. 能够集中力量办大事
D. 能够有效维护国家主权、安全、发展利益
【多选题】
巩固和发展爱国统一战线,坚持______,支持民主党派按照中国特色社会主义参政党要求更好履行职能。___
A. 长期共存
B. 互相监督
C. 肝胆相照
D. 荣辱与共
【多选题】
人民政协是具有中国特色的制度安排,要围绕团结和民主两大主题,把协商民主贯穿____全过程,完善协商议政内容和形式,着力增进共识、促进团结。___
A. 政治协商
B. 民主协商
C. 民主监督
D. 参政议政
【多选题】
全面依法治国是国家治理的一场深刻革命,必须坚持厉行法治,推进____。___
A. 科学立法
B. 严格执法
C. 公正司法
D. 全民守法
E. 遵纪守法
【多选题】
关于依法治国与以德治国的关系,下列说法正确的有____。___
A. 法律是成文的道德,道德是内心的法律
B. 要强化道德对法治的支撑作用
C. 要把道德要求贯彻到法治建设之中
D. 要用法治手段解决道德领域突出问题
【多选题】
社会主义核心价值观对个人层面的要求有____。___
A. 自由
B. 爱国
C. 敬业
D. 诚信
E. 友善
【多选题】
关于“四个全面”战略布局,下列说法正确的有_______
A. “四个全面”不是简单并列,而是有机联系、相互贯通的
B. 四个全面”既提出了战略目标,又提出了与之相匹配的战略举措
C. “四个全面”既立足整体、统筹全局,又突出重点
D. 四个全面”通过简单的并列组合,向全体人民表明中国特色社会主义的战略布局
【多选题】
要把创作生产优秀作品作为文艺工作的中心环节,坚持____相统一,加强现实题材创作,不断推出讴歌党、讴歌祖国、讴歌人民、讴歌英雄的精品力作。___
A. 思想精深
B. 艺术精湛
C. 制作精良
D. 呈现精美
【多选题】
宣传阐释中国梦要与当代中国价值紧密结合起来,注重从____等方面说清楚、讲明白,使中国梦成为传播当代中国价值的生动载体。___
A. 历史层面
B. 国家层面
C. 个人层面
D. 全球层面
【多选题】
党的十九大报告提出,要按照兜底线、织密网、建机制的要求,全面建成________可持续的多层次社会保障体系。___
A. 覆盖全民
B. 城乡统筹
C. 权责清晰
D. 保障适度
【多选题】
党的十九大报告提出,提高就业质量和人民收入水平,鼓励勤劳守法致富,就要____。___
A. 扩大中等收入群体
B. 增加低收入者收入
C. 调节过高收入
D. 取缔非法收入
【多选题】
加强社会治理制度建设,完善党委领导、政府负责、社会协同、公众参与、法治保障的社会治理体制,提高社会治理________水平。___
A. 社会化
B. 法治化
C. 智能化
D. 专业化
【多选题】
完善公共服务体系,就要通过____等方式保障基本民生,让改革成果更多更公平惠及全体人民。___
A. 基本公共服务均等化
B. 社会政策托底
C. 保护弱势群体
D. 扩大中等收入者比重
【多选题】
党的十九大报告指出,加快社会治安防控体系建设,依法打击和惩治黄赌毒黑拐骗等违法犯罪活动,保护人民_____。___
A. 人身权
B. 财产权
C. 人格权
D. 名誉权
【多选题】
党的十八大以来,我国引导应对气候变化国际合作,成为全球生态文明建设的重要____。___
A. 参与者
B. 贡献者
C. 引领者
D. 决定者
【多选题】
必须坚持____为主的方针,形成节约资源和保护环境的空间格局、产业结构、生产方式、生活方式,还自然以宁静、和谐、美丽。___
A. 事先预防
B. 节约优先
C. 保护优先
D. 自然恢复
【多选题】
党的十九大报告指出,构建市场导向的绿色技术创新体系,发展绿色金融,壮大____。___
A. 节能环保产业
B. 清洁生产产业
C. 绿色科技产业
D. 清洁能源产业
【多选题】
党的十九大报告指出,倡导简约适度、绿色低碳的生活方式,反对奢侈浪费和不合理消费,开展创建节约型机关、_____等行动。___
A. 绿色家庭
B. 绿色学校
C. 绿色社区
D. 绿色城市
E. 绿色出行
【多选题】
党的十九大报告指出,加大生态系统保护力度,完成_____三条控制线划定工作。___
A. 生态保护红线
B. 永久基本农田
C. 城镇开发边界
D. 国土绿化面积
【多选题】
党的十九大报告指出,坚持总体国家安全观,必须___,统筹外部安全和内部安全、国土安全和国民安全、传统安全和非传统安全、自身安全和共同安全,完善国家安全制度体系,加强国家安全能力建设,坚决维护国家主权、安全、发展利益。___
A. 坚持国家利益至上
B. 以人民安全为宗旨
C. 以政治安全为根本
D. 以维护社会安全为目标
【多选题】
建设一支听党指挥、能打胜仗、作风优良的人民军队,必须____,实现党在新时代的强军目标。___
A. 政治建军
B. 改革强军
C. 科技兴军
D. 依法治军
【多选题】
保持香港、澳门长期繁荣稳定,必须全面准确贯彻____的方针。___
A. “一国两制”
B. “港人治港”
C. “澳人治澳”
D. 高度自治
【多选题】
党的十九大报告提出,要支持香港、澳门融入国家发展大局,以____等为重点,全面推进内地同香港、澳门互利合作。___
A. 粤港澳大湾区建设
B. 粤港澳合作
C. 粤港澳政府合作
D. 泛珠三角区域合作
【多选题】
中国将高举___的旗帜,恪守维护世界和平、促进共同发展的外交政策宗旨。___
A. 和平
B. 发展
C. 合作
D. 共赢