【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
A
解析
暂无解析
相关试题
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
推荐试题
【单选题】
男,22岁,途中突遭暴风雪,-20度冰雪中迷路半天后送至野战医院,暴露部位皮肤呈苍白色,已昏迷。复温后患者肛温32度应___
A. 继续复温
B. 对患肢进行按摩
C. 继续温水浸泡
D. 不能用镇静剂
E. 停止复温
【单选题】
男性,25岁,因工事倒塌压砸伤右小腿2小时候后自行爬出查体:生命体征平稳,右小腿红肿明显,成角畸形,局部皮肤有水泡形成,无皮肤破损,局部。患者最可能的初步诊断是___
A. 右小腿骨筋膜室综合症,右胫腓骨骨折
B. 右胫腓骨骨折,右小腿血管损伤
C. 右小腿骨筋膜室综合症,右小腿皮肤挫裂伤
D. 右小腿毁损伤
E. 右胫腓骨骨折伴血管神经损伤
【单选题】
男性,25岁,因工事倒塌压砸伤右小腿2小时候后自行爬出查体:生命体征平稳,右小腿红肿明显,成角畸形,局部皮肤有水泡形成,无皮肤破损,局部。目前最重要的救治措施是___
A. 静脉补液抗感染.防休克
B. 口服镇痛药,必要时注射吗啡
C. 右小腿牵引复位夹板固定制动
D. 右小腿骨筋膜室切开减压
E. 右小腿闭合复位、外支架固定术
【单选题】
男性,25岁,因工事倒塌压砸伤右小腿2小时候后自行爬出查体:生命体征平稳,右小腿红肿明显,成角畸形,局部皮肤有水泡形成,无皮肤破损,局部。针对挤压伤的处置原则错误的是___
A. 解除挤压
B. 减轻受挤压部位组织坏死
C. 防治休克
D. 尽早确定性手术
E. 防治肾功能衰竭
【单选题】
23岁,因工事垮塌,骨盆被重物挤压查体:BP90/50mmHg,P120/min,面色苍白,下腹部有压痛骨盆挤压分离试验阳性,无尿,留置尿管仅有50ml尿夜流出,呈淡红色腹部膨胀,移动性浊音阳性。现场救治最恰当的是___
A. 解除挤压,骨盆制动
B. 给予注射抗感染药物
C. 口服镇痛药
D. 行腹腔穿刺
E. 暂不处理
【单选题】
23岁,因工事垮塌,骨盆被重物挤压查体:BP90/50mmHg,P120/min,面色苍白,下腹部有压痛骨盆挤压分离试验阳性,无尿,留置尿管仅有50ml尿夜流出,呈淡红色腹部膨胀,移动性浊音阳性。下列哪种内脏的损伤可能性大___
A. 肾损伤
B. 膀胱损伤
C. 尿道损伤
D. 直肠损伤
E. 输尿管损伤
【单选题】
23岁,因工事垮塌,骨盆被重物挤压查体:BP90/50mmHg,P120/min,面色苍白,下腹部有压痛骨盆挤压分离试验阳性,无尿,留置尿管仅有50ml尿夜流出,呈淡红色腹部膨胀,移动性浊音阳性。应进一步行哪项检查___
A. CT
B. B超
C. 膀胱造影
D. 尿道造影
E. 腹腔动脉造影
【单选题】
23岁,因工事垮塌,骨盆被重物挤压查体:BP90/50mmHg,P120/min,面色苍白,下腹部有压痛骨盆挤压分离试验阳性,无尿,留置尿管仅有50ml尿夜流出,呈淡红色腹部膨胀,移动性浊音阳性。后送至专科医院应选择下列哪项治疗措施___
A. 尿道修补术
B. 腹穿抽吸腹腔积液治疗
C. 耻骨上膀胱造瘘术
D. 剖腹探查行膀胱修补术
E. 继续临床观察
【单选题】
男性,28岁,火焰烧伤总面积为70%,颜面部.颈部.前胸及双上肢为Ⅲ度烧伤(30%),伤后1小时被后送往专科医院。休克期判断输液是否得当的简单而有效的指标是___
A. 神志
B. 呼吸
C. 脉搏
D. 血压
E. 尿量
【单选题】
男性,28岁,火焰烧伤总面积为70%,颜面部.颈部.前胸及双上肢为Ⅲ度烧伤(30%),伤后1小时被后送往专科医院。如果患者合并呼吸困难,应考虑___
A. 给氧
B. 输血
C. 气管切开
D. 输入代血浆
E. 广谱抗生素
【单选题】
男性,28岁,火焰烧伤总面积为70%,颜面部.颈部.前胸及双上肢为Ⅲ度烧伤(30%),伤后1小时被后送往专科医院。双上肢环形Ⅲ度烧伤,清创后应及时采取的处理是___
A. 患肢抬高防止水肿
B. 红外线照射暴露
C. 外涂1%SD-AG混悬液包扎
D. 1%SD-AG冷霜外涂包扎
E. 焦痂切开减压
【单选题】
岸边边发现一男性战士,耳.口.鼻出血,胸腹部疼痛,未发现明显外伤查体:意识模糊,血压:60/42mmHg心率:120次/分,呼吸:32次/分,体温:36.1摄氏度。伤员最可能的伤类是___
A. 挤压伤
B. 冲击伤
C. 烧伤
D. 冻伤
E. 淹溺
【单选题】
岸边边发现一男性战士,耳.口.鼻出血,胸腹部疼痛,未发现明显外伤查体:意识模糊,血压:60/42mmHg心率:120次/分,呼吸:32次/分,体温:36.1摄氏度。现场救治正确的是___
A. 防治外伤性窒息清除口.鼻腔分泌物,保持呼吸道畅通;改善呼吸功能和鼓励清醒的伤员咳
B. 伤口清创.包扎
C. 复温
D. 建立静脉通道,补液防止休克
E. 吸氧,镇痛,抗感染
【单选题】
岸边边发现一男性战士,耳.口.鼻出血,胸腹部疼痛,未发现明显外伤查体:意识模糊,血压:60/42mmHg心率:120次/分,呼吸:32次/分,体温:36.1摄氏度。正确的后送体位是___
A. 平卧位后送
B. 头高卧位后送
C. 侧卧位后送
D. 搀扶后送
E. 俯卧位后送
【单选题】
岸边边发现一男性战士,耳.口.鼻出血,胸腹部疼痛,未发现明显外伤查体:意识模糊,血压:60/42mmHg心率:120次/分,呼吸:32次/分,体温:36.1摄氏度。后送至野战医院行胸部X光片后提示右肺压缩超过50%,有液平,此时最正确的处理是___
A. 用呋塞米(速尿)或依他尼酸(利尿酸)利尿
B. 立即气管切开
C. 行胸腔闭式引流术
D. 立即开胸手术
E. 继续观察,吸氧,作动脉血气分析
【单选题】
岸边边发现一男性战士,耳.口.鼻出血,胸腹部疼痛,未发现明显外伤查体:意识模糊,血压:60/42mmHg心率:120次/分,呼吸:32次/分,体温:36.1摄氏度。伤员右小腿发现有2cm×2cm弹屑残留,表面伤口已闭合,无感染,患肢感觉.活动正常如何处理弹屑残留___
A. 立即手术取出异物
B. 继续观察,待全身情况稳定后取出
C. 继续观察,无特殊情况不建议单纯取出异物
D. 无论任何情况都不需要取出异物
E. 以上处理都不对
【单选题】
男性,22岁,右小腿冻伤致肿胀.疼痛.活动受限,查体见,生命体征平稳,体温36摄氏度,右小腿皮肤水泡,呈浆液性,疱底呈鲜红色,痛觉过敏,触觉迟钝局部皮温低,肢端血运差。患者为几度冻伤___
A. 1度
B. 2度
C. 3度
D. 4度
E. 以上都不是
【单选题】
男性,22岁,右小腿冻伤致肿胀.疼痛.活动受限,查体见,生命体征平稳,体温36摄氏度,右小腿皮肤水泡,呈浆液性,疱底呈鲜红色,痛觉过敏,触觉迟钝局部皮温低,肢端血运差。早期治疗以下措施错误的是___
A. 迅速将伤员送入温暖的室内,口服热饮料,脱掉或剪除潮湿和冻结的衣服.鞋袜,尽早用40~44℃的1:1000氯已定(洗必泰) 或1:1000呋喃西林溶液浸泡,使伤部快速复温,直到伤部充血或体温正常为止
B. 条件不允许时可用雪搓或火烤使肢体复温
C. 擦干创面,涂不含酒精(无刺激性)的消毒剂,用无菌厚层敷料包扎,不要挑破水泡,指(趾)间用无菌纱布隔开,防止粘连
D. 防治休克,口服或注射止痛药物
E. 预防感染,肌肉注射抗感染药物
【单选题】
男性,22岁,右小腿冻伤致肿胀.疼痛.活动受限,查体见,生命体征平稳,体温36摄氏度,右小腿皮肤水泡,呈浆液性,疱底呈鲜红色,痛觉过敏,触觉迟钝局部皮温低,肢端血运差。复温时温水浸泡的温度为___
A. 60-64度之间
B. 50-55度之间
C. 45-54度之间
D. 40-44度之间
E. 37-42度之间
【单选题】
男性,22岁,右小腿冻伤致肿胀.疼痛.活动受限,查体见,生命体征平稳,体温36摄氏度,右小腿皮肤水泡,呈浆液性,疱底呈鲜红色,痛觉过敏,触觉迟钝局部皮温低,肢端血运差。患者右小腿出现坏死组织,最恰当的处理方式是___
A. 继续换药
B. 坏死组织与正常组织的分界线清楚后,及时做坏死组织切除术
C. 加强抗感染治疗
D. 尽早截肢,防止坏死组织进一步扩散
E. 以上处理都不对
【单选题】
男性,22岁,右小腿冻伤致肿胀.疼痛.活动受限,查体见,生命体征平稳,体温36摄氏度,右小腿皮肤水泡,呈浆液性,疱底呈鲜红色,痛觉过敏,触觉迟钝局部皮温低,肢端血运差。冻伤病人复温过程中不容易出现的并发症是___
A. 心室纤颤
B. 酸中毒
C. 肺水肿
D. 肾功能障碍
E. 双下肢深静脉血栓
【单选题】
有关子宫内膜异位症的概念,正确的是___
A. 异位的内膜不受卵巢激素的影响
B. 异位的内膜不发生周期性变化
C. 异位的内膜侵入子宫体的肌壁层时,称为子宫腺肌病
D. 异位的内膜对周围组织具有侵入性和破坏性,在组织学上属恶性行为
E. 子宫内膜异位症多见于未生育的妇女
【单选题】
女性,34岁,胸部损伤,胸腔穿刺时抽出不凝固血液,其原因是___
A. 出血量太大
B. 胸腔内存在抗凝物质
C. 凝血因子减少
D. 肺及膈肌运动的去纤维化作用
E. 胸腔内渗出液的稀释作用
【单选题】
某女士,35岁,诊断为甲状腺功能亢进症(甲亢)。清晨测得脉率90次/分,血压120/60mmHg。计算其基础代谢率是___
A. 正常
B. 正常范围偏高
C. 重度甲亢
D. 中度甲亢
E. 轻度甲亢