【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
推荐试题
【填空题】
73.机组运行中发生故障时,___应保持冷静,根据仪表指示和报警信息,正确地判断事故原因,果断迅速采取措施,首先解除对人身、电网及设备的威胁,防止事故扩大蔓延,限制事故范围,必要时立即解列或停运发生故障的设备,确保非故障设备正常运行,消除故障根本原因,迅速恢复机组正常运行。
【填空题】
74.当运行人员到就地检查设备或寻找故障点时,未与检查人取得联系之前,不允许对被检查设备___。
【填空题】
75. 当运行人员到就地检查设备或寻找故障点时,如果发生的事故危及人身、设备安全时,必须按照规程的有关规定,迅速消除对人身和设备的危害。当确认设备不具备继续运行的条件或继续运行对人身、设备有直接危害时,应___。
【填空题】
76.故障处理中,运行人员应力争设法保证厂用电的安全运行,尤其应保证事故保安段电源的可靠性,以确保___设备的正常可靠运行。
【填空题】
77.在故障处理过程中,接到命令后应进行___,如果不清,应及时问清楚,操作应正确、迅速。操作完成后,应迅速向发令者汇报。
【填空题】
78.事故运行情况下,运行人员必须坚守岗位,如故障发生在交接班时间内,不得进行交接班,交班的运行人员应继续工作,接班人员应该协助交班人员进行事故处理,但不得___。当机组恢复正常运行状态或事故处理至机组运行稳定状态后,根据值长命令方可进行运行交接班。
【填空题】
79.事故处理完毕后,值长必须收集事故过程中的___,保存资料以备事后分析。80.事故处理后,运行人员必须实事求是地将事故发生的时间、现象及处理过程中所采取的措施详细地___。事后必须按照“四不放过”的原则对所发生的事故原因及处理过程进行认真分析总结,并写在异常分析记录薄内。
【填空题】
81.事故处理完毕,应将所观察到的现象、汇报的内容、接受的命令及发令人、事故发展的过程和对应时间及采取的处理措施等进行___,并将事故发生及处理过程中的有关数据记录收集备齐,以备故障分析。
【填空题】
发电机定子电压最高不得大于额定电压的___,最低电压一般不应低于额定电压的___,并应满足___电压的要求。
【填空题】
我公司发电机型号___,冷却方式___,励磁方式___。
【填空题】
我公司主变型号___
【填空题】
发电机正常运行频率应保持在___Hz,允许变化范围为___Hz,可以按额定容量连续运行。频率变化时,定子电流、励磁电流及各部分温度不得超过___。
【填空题】
我公司发电机定子额定电压___,定子额定电流___。
【填空题】
我公司额定励磁电压___,额定励磁电流___。
【填空题】
发电机定子电压允许在额定值范围___内变动,当功率因数为额定值时,其额定容量不变,即定子电压在该范围内变动时,定子电流可按比例相反变动。但当发电机电压低于额定值的___时,定子电流长期允许的数值不得超过额定值___。
【填空题】
发电机运行的氢气纯度不得低于___,含氧量小于___。
【填空题】
发电机转子额定电压___,转子额定电流___。
【填空题】
发电机并列后有功负荷增加速度决定于___,无功负荷增加速度___,但是应监视定子电压变化。
【填空题】
发电机转子绕组绝缘电阻用___摇表测量,绝缘值不得小于___。
【填空题】
定子三相电流不平衡时,就一定会产生___电流。
【填空题】
发电机在升压过程中检查定子三相电压应___上升,转子电流不应超过___。
【填空题】
发电机转子空载电压___,转子空载电流___。
【填空题】
发电机逆功率保护,用于保护___。
【填空题】
发电机正常运行时,定子电流三相不平衡值一般不能超过定子额定值的___。
【填空题】
水内冷发电机定子线棒层间最高和最低温度间的温度差达___℃或定子线棒引水管出水温差达8℃时应报警并查明原因,此时可降负荷处理。水内冷发电机定子线棒温差达14℃或定子引水管出水温差达___℃,或任一定子槽内层间测温元件温度超过___℃或出水温度超过___℃时,在确认测温元件无误后,为避免发生重大事故,应立即停机,进行___及有关检查处理。
【填空题】
在汽轮发电机中,由于定子磁场的不平衡或大轴本身带磁,当出现交变磁通时,在轴上感应出一定的电压,称为___。轴电压由轴颈、油膜、轴承、机座及基础底层构成通路,当油膜被破坏时,就在此回路内产生一个很大的电流,称为___。
【填空题】
发电机突然甩负荷后,会使端电压___,使铁芯中的磁通密度增加,导致铁芯损耗增加、温度___。
【填空题】
系统短路时,瞬间发电机内将流过数值为额定电流数倍的___电流,对发电机本身将产生有害的、巨大的___力,并产生高温。
【填空题】
当系统发生不对称短路时,发电机绕组中将有___电流出现,在转子上产生___频率的电流,有可能使转子局部___或造成损坏。
【填空题】
为了防止结露和可能的振动增加,发电机冷氢温度正常应保持在___,但冷氢温度最低不得低于___。
【填空题】
正常运行时发电机定子线圈温度不大于___,定子线圈出水温度不大于___。
【填空题】
发电机进相运行期间,6kV厂用母线电压不能低于___,否则停止继续降低无功负荷。
【填空题】
发电机运行期间周波的变化范围为___,能保证发电机在额定出力下运行。
【填空题】
电网发生事故时发电机最低频率不得低于___。
【填空题】
电网发生事故时发电机最高频率不得高于___。
【填空题】
发电机的额定氢压为___,在额定氢压下运行时的漏氢量应不大于___。
【填空题】
感性无功电流对发电机磁场起___作用,容性无功电流对发电机的磁场起___作用。
【填空题】
负序磁场扫过同步发电机表面,将在___上感应出___HZ 的电流。
【填空题】
运行发电机失去励磁使转子___消失,一般叫做发电机的___。
【填空题】
发电机失磁瞬间,发电机的电磁力矩减小,而原动机传过来的主力矩没有变,于是出现了___力矩,使发电机转速___而失去同步。