【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
推荐试题
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,低压不停电接线或拆线作业应逐相完成,并恢复该相绝缘后,方可进行下一步的作业。人体不得同时接触两根线头
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,立、撤杆塔过程中,基坑内不应有人工作。除指挥人及指定人员外,其他人员应在远离杆下1.5倍杆高的距离以外
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力事故事件调查规程》,事故事件发生后,事故事件相关单位应派专人严格保护现场,未经调查和记录的现场,不得任意变动
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,装、拆接地线时,应做好记录,交接班时可不交接
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,在全部或部分带电的运行屏 柜上进行工作时,应将检修设备与运行设备前后以明显的标志隔开
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,挖到电缆保护层后,应由有经验的人员在场指导和监护,方可继续进行
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,电源侧不停电更换电能表时,直接接入的电能表不需要将出线负荷断开
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,当发现金属材料的配电箱、电表箱箱体带电时,工作人员不应直接接触箱体,应断开上一级电源将其停电,查明带电原因,并作相应处理
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,部分停电的工作,距离小于非作业安全距离的未停电设备,应装设临时遮栏
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,监护操作是指有人监护的操作
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,电缆沟的盖板开启后,应自然通风一段时间,经气体检测合格后方可下井沟工作。电缆井内工作时,禁止只打开一只井盖(单眼井除外)
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,线路作业应在良好的天气下进行,遇有恶劣气象条件时,应停止工作
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,填用数日内有效的线路第一种工作票,每日收工时若将工作地点所装设的接地线拆除,次日恢复工作前应重新验电、接地
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,除使用特殊仪器外,所有使用携带型仪器的测量工作,均应在电流互感器和电压互感器的一次侧进行
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,低压配电网设备停电后,检修或装表接电前,应在与停电检修部位或表计电气上直接相连的可验电部位验电
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,检修部分若分为几个在电气上不相连接的部分(如分段母线以隔离开关或断路器隔开分成几段),可在工作地段两端验电接地短路
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,绝缘杆的工频耐压试验周期是半年
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,危及线路停电作业安全且不能采取相应安全措施的交叉跨越、平行或同杆塔架设线路工作,低压配电网应停电
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,测量用的导线,使用相应的普通导线,其端部应有绝缘套
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,厂站内在无需高压设备停电或做安全措施配合的二次系统、动力等回路上的工作,需选用厂站第一种工作票
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,低压配电网巡视时,特殊情况时可以触碰裸露带电部位
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,填用线路第一种工作票的工作,工作负责人应在得到工作许可人的许可后,方可开始工作
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,使用固定式抱杆立、撤杆,抱杆基础应平整坚实,缆风绳应分布合理、受力均匀
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,传真方式送达的工作票许可在收到传真后履行
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,根据操作任务和调度命令或现场值班负责人指令,完成电气设备操作的一个操作任务。需选用调度操作票
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,不应采用缠绕的方法进行接地或短路。接地线应使用专用的线夹固定在导体上
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,低压不停电作业不需设专人监护
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,雷电天气时,不宜进行电气操作,但可以就地电气操作
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,电缆施工前应先查清图纸,再开挖足够数量的样洞和样沟,查清运行电缆位置及地下管线分布情况
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,配电设备中使用的普通型电缆接头,禁止带电插拔。可带电插拔的肘型电缆接头,不宜带负荷操作
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,每组接地线均应编号,并存放在固定地点
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,放线、紧线与撤线时,应采取措施,防止导(地)线由于摆(跳)动或其他原因而与带电导线间的距离不符合安全距离
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,已装设的接地线发生摆动,其与带电部分的距离不符合安全距离要求时,应采取相应措施
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,紧线、撤线前,应检查拉线、桩锚及杆塔。必要时,应加固桩锚或加设临时拉绳。拆除杆上导线前,应先检查杆根,做好防止倒杆措施,在挖坑前应先绑好拉绳
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,放线作业前应检查导线与牵引绳连接可靠牢固
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,梯子可以绑接使用。人字梯应有限制开度的措施。人在梯子上时,禁止移动梯子
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,分组工作的工作票作业终结前,工作负责人应收到所有分组负责人作业已结束的汇报,方可办理作业终结
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,室外巡视工作应由有工作经验的人担任。未经批准的人员不得一人单独巡视。偏僻山区、夜间、事故、恶劣天气巡视必须由两人进行。暑天、大雪天或必要时,应由两人进行
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,杆塔上有人工作时,可以调整或拆除拉线
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,线路工作间断时,工作地点的全部接地线可保留不动
A. 对
B. 错