【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
推荐试题
【简答题】
新时代我国社会主要矛盾是什么?
【简答题】
“两步走”战略是什么?
【简答题】
什么是五大发展理念?
【简答题】
什么是五个文明?
【简答题】
什么是一带一路?
【简答题】
什么是两个绝对?
【简答题】
温州开展“9+4”专项整治中的“4”是什么?
【简答题】
温州对哪8个领域“量身定制”了开展主题教育的《指导书》?
【简答题】
温州主题教育动员令“一承诺两封信”分别是什么?
【简答题】
温州开展“9+4”专项整治,建立了怎样的整改机制?
【简答题】
温州开展“三助三红”专项活动中的“三红”是指什么?
【简答题】
温州建立健全市县领导“四联”服务机制是哪“四联”?
【单选题】
经党支部党员大会通过、基层党委审批接收的预备党员,自___,即取得党籍
A. 通过之日起
B. 签字之日起
C. 档案调取之日起
【单选题】
对因私出国并在国外长期定居的党员,出国学习研究超过___年仍未返回的党员,一般予以停止党籍
A. 3
B. 5
C. 6
D. 4
【单选题】
对与党组织失去联系___个月以上、通过各种方式查找仍然没有取得联系的党员,予以停止党籍
A. 3
B. 6
C. 5
D. 4
【单选题】
党员工作单位、经常居住地发生变动的,或者外出学习、工作、生活___个月以上并且地点相对固定的,应当转移组织关系
A. 3
B. 5
C. 6
D. 4
【单选题】
对缺乏革命意志,不履行党员义务,不符合党员条件,但本人能够正确认识错误、愿意接受教育管理并且决心改正的党员,党组织应当作出限期改正处置,限期改正时间不超过___
A. 半年
B. 一年
C. 一年半
D. 两年
【单选题】
高校党组织对组织关系保留在学校的高校毕业生流动党员,应当继续履行管理职责。党员组织关系保留时间一般不超过___年,对符合转出组织关系条件的及时转出
A. 1
B. 2
C. 3
D. 4
【单选题】
公务员职级序列按照___职位类别分别设置
A. 综合管理类
B. 专业技术类
C. 行政执法类
D. 以上都是
【单选题】
党的___是党的根本性建设,决定党的建设方向和效果
A. 政治建设
B. 思想建设
C. 组织建设
D. 作风建设
【单选题】
___是中国特色社会主义最本质的特征,是中国特色社会主义制度的最大优势
A. 党的领导
B. 人民当家作主
C. 人民代表大会制度
D. 以上都不是
【单选题】
加强党的政治建设,关键是要提高各级各类组织和党员干部的___
A. 学习能力
B. 业务能力
C. 政治能力
【单选题】
___政治性是群团组织的灵魂
A. 先进性
B. 专业性
C. 政治性
D. 时代性
【单选题】
《关于加强和改进中央和国家机关党的建设的意见》要求,建立党支部委员履职培训制度,新任党支部书记须在任职___个月内接受集中培训
A. 1
B. 3
C. 5
D. 6
【单选题】
《关于加强和改进中央和国家机关党的建设的意见》要求,选树先进党支部和优秀党支部书记典型,坚持以先进带中间、督后进,用___年左右时间有效解决一些基层党组织弱化、虚化、边缘化问题
A. 1
B. 3
C. 5
D. 6
【单选题】
查阅档案应当___人以上,一般均为党员
A. 2
B. 3
C. 5
D. 6
【单选题】
中央确定基层减负年是___
A. 2017
B. 2018
C. 2019
D. 2020
【单选题】
《中国共产党纪律检查机关监督执纪工作规则》要求,审查调查工作应当依照规定由___人以上进行
A. 1
B. 2
C. 3
D. 4
【单选题】
《中国共产党纪律检查机关监督执纪工作规则》规定,审查调查期间,对被审查调查人以___相称
A. 嫌疑人
B. 被询问人
C. 同志
D. 犯罪分子
【单选题】
党的纪律是党的各级组织和全体党员必须遵守的___,是维护党的团结统一、完成党的任务的保证
A. 行为规则
B. 行动指南
C. 行为标准
D. 工作标准
【单选题】
运用监督执纪“四种形态”,让___成为常态,党纪处分、组织调整成为管党治党的重要手段,严重违纪、严重触犯刑律的党员必须开除党籍
A. 红红脸、出出汗
B. 照镜子、正衣冠
C. 洗洗澡、治治病
D. 咬咬耳、扯扯袖
【单选题】
党委(党组)书记每年至少讲___次党课
A. 1
B. 2
C. 3
D. 4
【单选题】
书面报告视情采用___等方式
A. 正式报告
B. 信息
C. 简报
D. 以上都是
【单选题】
中国共产党人的初心和使命是___
A. 为中国人民谋幸福
B. 为中华民族谋复兴
C. 为中国人民谋幸福, 为中华民族谋复兴
D. 实现共产主义
【单选题】
“不忘初心、牢记使命”主题教育的根本任务是___
A. 深入学习贯彻新时代中国特色社会主义思想
B. 锤炼忠诚干净担当的政治品格
C. 团结带领全国各族人民为实现伟大梦想共同奋斗
D. 以上都是
【单选题】
“不忘初心、牢记使命”主题教育以___为重点
A. 全体党员干部
B. 党的高级干部
C. 县处级以上领导干部
【单选题】
“不忘初心、牢记使命”主题教育从2019年___月,自上而下分两批开展
A. 5
B. 6
C. 7
D. 8
【单选题】
发现党员有思想、工作、生活、作风和纪律方面苗头性倾向性问题的,以及群众对其有不良反映的,党组织负责人应当及时进行提醒谈话,___
A. 抓大放小
B. 抓早抓小
C. 防微杜渐
D. 抓早抓小、防微杜渐
【单选题】
加强党的政治建设,必须坚持___指导地位
A. 马克思主义
B. 列宁主义
C. 马列主义
D. 共产主义
【单选题】
___是党最根本、最重要的纪律,是净化政治生态的重要保证
A. 组织纪律
B. 政治纪律
C. 工作纪律
D. 廉洁纪律