【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
推荐试题
【单选题】
全党要不断增强党的_____,确保我们党永葆旺盛生命力和强大战斗力。___
A. 群众领导力、思想组织力、社会凝聚力、政治向心力
B. 政治领导力、思想引领力、群众组织力、社会号召力
C. 政治领导力、思想引领力、群众发展力、社会号召力
D. 政治领导力、思想引领力、群众组织力、社会向心力
【单选题】
中国共产党人的初心和使命,就是为中国人民____ ,为中华民族____。这个初心和使命是激励中国共产党人不断前进的根本动力。___
A. 谋幸福,谋未来
B. 谋生活,谋复兴
C. 谋幸福,谋复兴
D. 谋生活,谋未来
【单选题】
中国共产党第十九次全国代表大会,是在全面建成小康社会决胜阶段、中国特色社会主义进入( )的关键时期召开的一次十分重要的大会。___
A. 新时期​
B. 新阶段​
C. 新征程​
D. 新时代​
【单选题】
五年来,我们统筹推进“( )”总体布局、协调推进“( )”战略布局,“十二五”规划胜利完成,“十三五”规划顺利实施,党和国家事业全面开创新局面。___
A. 五位一体四个全面​
B. 四位一体五个全面​
C. 五个全面四位一体​
D. 四个全面五位一体​
【单选题】
中国特色社会主义进入新时代,我国社会主要矛盾已经转化为人民日益增长的( )需要和( )的发展之间的矛盾。___​
A. 美好生活 不充分不平衡​
B. 幸福生活 不平衡不充分​
C. 幸福生活 不充分不平衡​
D. 美好生活 不平衡不充分​
【单选题】
必须认识到,我国社会主要矛盾的变化,没有改变我们对我国社会主义所处历史阶段的判断,我国仍处于并将长期处于( )的基本国情没有变,我国是世界最大发展中国家的国际地位没有变。​___
A. 社会主义阶段​
B. 社会主义初级阶段​
C. 社会主义中级阶段​
D. 社会主义高级阶段​
【单选题】
新时代中国特色社会主义思想,明确坚持和发展中国特色社会主义,总任务是实现社会主义现代化和中华民族伟大复兴,在全面建成小康社会的基础上,分( )在本世纪中叶建成富强民主文明和谐美丽的社会主义现代化强国。​___
A. 两步走​
B. 三步走​
C. 四步走​
D. 五步走​
【单选题】
新时代中国特色社会主义思想,明确中国特色社会主义最本质的特征是___。
A. “五位一体”总体布局​
B. 建设中国特色社会主义法治体系​
C. 人民利益为根本出发点​
D. 中国共产党领导​
【单选题】
发展是解决我国一切问题的基础和关键,发展必须是科学发展,必须坚定不移贯彻( )的发展理念。​___
A. 创新、协调、绿色、开放、共享​
B. 创造、协调、生态、开放、共享​
C. 创新、统筹、绿色、开放、共享​
D. 创造、统筹、生态、开放、共享​
【单选题】
( )是中国特色社会主义的本质要求和重要保障。___​
A. 全面依法治国​
B. 全面从严治党​
C. 全面发展经济​
D. 全面可持续发展​
【单选题】
( )是一个国家、一个民族发展中更基本、更深沉、更持久的力量。​___
A. 道路自信​
B. 理论自信​
C. 制度自信​
D. 文化自信​
【单选题】
必须统筹国内国际两个大局,始终不渝走和平发展道路、奉行( )的开放战略。​___
A. 互利共赢​
B. 互相合作​
C. 包容互信​
D. 开放共赢​
【单选题】
从现在到二〇二〇年,是全面建成小康社会___。​
A. 决战期​
B. 决胜期​
C. 关键期​
D. 攻坚期​
【单选题】
从( )到( ),是“两个一百年”奋斗目标的历史交汇期。___​
A. 二〇二〇年二〇三五年​
B. 十九大二十大​
C. 二十大二十一大​
D. 二〇三五年本世纪中叶​
【单选题】
综合分析国际国内形势和我国发展条件,从二〇二〇年到本世纪中叶可以分两个阶段来安排。第一个阶段,从( )到( ),在全面建成小康社会的基础上,再奋斗十五年,基本实现社会主义现代化。​___
A. 二〇二〇年二〇三五年​
B. 二〇二五年二〇四〇年​
C. 二〇三〇年二〇四五年​
D. 二〇三五年本世纪中叶​
【单选题】
综合分析国际国内形势和我国发展条件,从二〇二〇年到本世纪中叶可以分两个阶段来安排。第二个阶段,从( )到( ),在基本实现现代化的基础上,再奋斗十五年,把我国建成富强民主文明和谐美丽的社会主义现代化强国。___
A. 二〇二〇年二〇三五年​
B. 二〇三五年二〇五〇年​
C. 二〇三〇年二〇四五年​
D. 二〇三五年本世纪中叶​
【单选题】
从全面建成小康社会到基本实现现代化,再到全面建成( ),是新时代中国特色社会主义发展的战略安排。​___
A. 创新型国家​
B. 社会主义现代化强国​
C. 社会主义现代化大国​
D. 世界一流强国​
【单选题】
实现“两个一百年”奋斗目标、实现中华民族伟大复兴的中国梦,不断提高人民生活水平,必须坚定不移把( )作为党执政兴国的第一要务。​___
A. 创新​
B. 改革​
C. 发展​
D. 开放​
【单选题】
我国经济已由( )阶段转向( )阶段,正处在转变发展方式、优化经济结构、转换增长动力的攻关期,建设现代化经济体系是跨越关口的迫切要求和我国发展的战略目标。___
A. 高速增长 高水平发展​
B. 高速发展 高水平发展​
C. 高速增长 高质量发展​
D. 高速发展 高质量发展​
【单选题】
贯彻新发展理念,建设现代化经济体系,必须坚持质量第一、效益优先,以( )为主线。___
A. 转变发展方式​
B. 优化经济结构​
C. 供给侧结构性改革​
D. 转换增长动力​
【单选题】
( )是引领发展的第一动力,是建设现代化经济体系的战略支撑。​___
A. 改革
B. 创新​
C. 开放​
D. 科技​
【单选题】
坚持党的领导、人民当家作主、依法治国有机统一。( )是社会主义民主政治的本质特征。___
A. 党的领导​
B. 人民当家作主​
C. 依法治国​
D. 政治体制改革​
【单选题】
加强人民当家作主制度保障。( )是坚持党的领导、人民当家作主、依法治国有机统一的根本政治制度安排。___​
A. 人民代表大会制度​
B. 多党合作和政治协商制度​
C. 民族区域自治制度​
D. 基层群众自治制度​
【单选题】
我们要牢固树立社会主义生态文明观,推动形成( )现代化建设新格局,为保护生态环境作出我们这代人的努力!___​
A. 人与自然和谐共生​
B. 人与环境和谐发展​
C. 人与自然和谐发展​
D. 人与环境和谐共生​
【单选题】
发挥社会主义协商民主重要作用。( )是具有中国特色的制度安排,是社会主义协商民主的重要渠道和专门协商机构。___​
A. 政党协商​
B. 人大协商​
C. 基层协商​
D. 人民政协​
【单选题】
解决台湾问题、实现祖国完全统一,是全体中华儿女( ),是中华民族( )所在。___
A. 一致愿望 根本利益​
B. 共同愿望 本质利益​
C. 一致愿望 本质利益​
D. 共同愿望 根本利益​
【单选题】
( )是两岸关系的政治基础。​___
A. “九二共识”​
B. 反对“台独”​
C. 一个中国原则​
D. 和平统一​
【单选题】
我们呼吁,各国人民同心协力,构建人类命运共同体,建设( )的世界。___​
A. 持久和平、普遍安全、共同繁荣、开放包容、公平正义​
B. 持久和平、普遍安全、共同繁荣、公平正义、清洁美丽​
C. 持久和平、普遍安全、共同繁荣、开放包容、清洁美丽​
D. 持久和平、普遍安全、公平正义、开放包容、清洁美丽​
【单选题】
深刻认识党面临的( )的尖锐性和严峻性,坚持问题导向,保持战略定力,推动全面从严治党向纵深发展。___​
A. 精神懈怠危险、能力不足危险、脱离群众危险、消极腐败危险​
B. 精神懈怠危险、封闭僵化危险、脱离群众危险、消极腐败危险​
C. 精神懈怠危险、能力不足危险、官僚主义危险、消极腐败危险​
D. 精神懈怠危险、能力不足危险、脱离群众危险、腐化堕落危险​
【单选题】
党的( )是党的根本性建设,决定党的建设方向和效果。___​
A. 思想建设​
B. 政治建设​
C. 组织建设​
D. 制度建设​
【单选题】
( )是党的基础性建设。革命理想高于天。共产主义远大理想和中国特色社会主义共同理想,是中国共产党人的精神支柱和政治灵魂,也是保持党的团结统一的思想基础。___
A. 作风建设​
B. 理论建设​
C. 思想建设​
D. 制度建设​
【单选题】
要把坚定理想信念作为党的思想建设的( ),教育引导全党牢记党的宗旨,挺起共产党人的精神脊梁,解决好世界观、人生观、价值观这个“总开关”问题,自觉做共产主义远大理想和中国特色社会主义共同理想的坚定信仰者和忠实实践者。___​
A. 首要任务​
B. 根本任务​
C. 重要手段​
D. 基本途径​
【单选题】
( )是近代以来中华民族最伟大的梦想。中国共产党一经成立,就把实现共产主义作为党的最高理想和最终目标,义无反顾肩负起实现中华民族伟大复兴的历史使命,团结带领人民进行了艰苦卓绝的斗争,谱写了气吞山河的壮丽史诗。​ ___
A. 实现共同富裕​
B. 实现社会主义现代化
C. 全面建成小康社会​
D. 实现中华民族伟大复兴​
【单选题】
中国特色社会主义道路是实现社会主义现代化、创造人民美好生活的必由之路,中国特色社会主义理论体系是指导党和人民实现中华民族伟大复兴的正确理论,中国特色社会主义制度是当代中国发展进步的根本制度保障,()是激励全党全国各族人民奋勇前进的强大精神力量。___​
A. 中国特色社会主义新思想 ​
B. 中国特色社会主义文化​
C. 中国传统文化
D. 中华民族精神​
【单选题】
建设现代化经济体系,必须把发展经济的着力点放在( )上,把提高供给体系质量作为主攻方向,显著增强我国经济质量优势。___​
A. 虚拟经济​
B. 实体经济​
C. 共享经济​
D. 市场经济​
【单选题】
从全面建成小康社会到基本实现现代化,再到全面建成社会主义现代化强国,是新时代中国特色社会主义发展的___。​
A. 战略方向​
B. 战略目标​
C. 战略手段​
D. 战略安排​
【单选题】
十八大以来的五年,是党和国家发展进程中极不平凡的五年,五年来的成就是全方位的、开创性的,五年来的变革是深层次的、___。
A. 根本性的
B. 划时代的​
C. 决定性的
D. 历史性的
【单选题】
过去五年,经济保持中高速增长,在世界主要国家中名列前茅,国内生产总值稳居世界第二,对世界经济增长贡献率超过百分之___。​
A. 10
B. 20
C. 30
D. 40
【单选题】
党的十九大报告指出,十八大以来共推出了( )项改革举措。___
A. 500多项
B. 1000多项
C. 1500多项
D. 2000多项
【单选题】
十九大的主题是:不忘初心,( ),高举中国特色社会主义伟大旗帜,决胜全面建成小康社会,夺取新时代中国特色社会主义伟大胜利,为实现中华民族伟大复兴的中国梦不懈奋斗。​___
A. 继续前进​
B. 牢记使命​
C. 方得始终​
D. 砥砺前行​