【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
推荐试题
【多选题】
推动供给侧结构性改革、振兴实体经济发展的重要力量是___
A. 高素质的企业家
B. 工匠
C. 劳模
D. 工程师
【多选题】
十八大提出“五位一体”总体布局是指哪些___
A. 经济建设
B. 政治建设
C. 文化建设
D. 社会建设
【多选题】
坚持质量第一、效益优先,以供给侧结构性改革为主线,推动经济发展___
A. 质量变革
B. 效率变革
C. 动力变革
D. 提高全要素生产率
【多选题】
现代化经济体系主要内容有___
A. 建设创新引领、协同发展的产业体系
B. 建设统一开放、竞争有序的市场体系
C. 建设体现效率、促进公平的收入分配体系
D. 建设彰显优势、协调联动的城乡区域发展体系
【多选题】
建设现代化经济体系,需要扎实管用的政策举措和行动。当前,要突出抓好的工作有___
A. 大力发展实体经济
B. 加快实施创新驱动发展战略
C. 激发各类市场主体活力
D. 积极推动城乡域协调发展
【多选题】
走中国特色社会主义政治发展道路,必须坚持___有机统一
A. 党的领导
B. 人民当家作主
C. 依法治国
D. 以德治国
【多选题】
坚持党的领导,就要___
A. 发挥党总揽全局、协调各方的领导核心作用
B. 改进党的领导方式
C. 保证党领导人民有效治理国家
D. 改进党的执政方式
【多选题】
实现人民当家作主,就要___
A. 扩大人民有序政治参与
B. 保证人民依法实行民主选举、民主协商、民主决策、民主管理、民主监督
C. 巩固基层政权,完善基层民主制度
D. 保障人民知情权、参与权、表达权、监督权
【多选题】
坚持依法治国,就要___
A. 维护国家法制统一、尊严、权威
B. 加强人权法治保障
C. 保证人民依法享有广泛权利和自由
D. 健全依法决策机制,构建决策科学、执行坚决、监督有力的权力运行机制
【多选题】
我国基本政治制度是指___
A. 中国共产党领导的多党合作和政治协商制度
B. 人民代表大会制度
C. 民族区域自治制度
D. 基层群众自治制度
【多选题】
发展协商民主,必须___
A. 推进协商民主广泛多层制度化发展
B. 统筹政党协商、政府协商、政协协商
C. 积极开展人大协商、基层协商、人民团体协商,逐步探索社会组织协商,构建程序合理、环节完整的社会主义协商民主体系
D. 确保协商民主有制可依、有规可守、有章可循、有序可遵,不断提高协商民主的科学性和实效性
【多选题】
如何巩固和发展爱国统一战线___
A. 坚持长期共存、互相监督、肝胆相照、荣辱与共,支持民主党派按照中国特色社会主义参政党要求更好履行职能
B. 深化民族团结进步教育,铸牢中华民族共同体意识
C. 全面贯彻党的宗教工作基本方针,坚持我国宗教的中国化,积极引导宗教与社会主义社会相适应
D. 牢牢把握大团结大联合的主题,做好统战工作。
【多选题】
全面准确贯彻“一国两制”方针,必须始终___
A. 准确把握“一国”和“两制”的关系
B. 依照宪法和基本法办
C. 聚焦发展这个第一要务
D. 维护和谐稳定的社会环境
【多选题】
扎实推进祖国和平统一进程,对台工作大政方针有___
A. 坚持“和平统一、一国两制”方针
B. 推动两岸关系和平发展
C. 坚持一个中国原则和“九二共识”
D. 坚决反对和遏制任何形式的“台独”
【多选题】
掌握意识形态工作领导权,要___
A. 旗帜鲜明坚持马克思主义指导地位
B. 加快构建中国特色哲学社会科学
C. 坚持正确的舆论导向
D. 建设好网络空间
【多选题】
舆论导向正确是党和人民之福,舆论导向错误是党和人民之祸。好的舆论可以成为___
A. 发展的“推进器”
B. 民意的“晴雨表”
C. 社会的“粘合剂”
D. 道德的“风向标”
【多选题】
舆论导向正确是党和人民之福,舆论导向错误是党和人民之祸。不好的舆论可以成为___
A. 民众的“迷魂汤”
B. 社会的“分离器”
C. 杀人的“软刀子”
D. 动乱的“催化剂”
【多选题】
核心价值观内容是___
A. 富强、民主、文明、和谐,
B. 自由、公平、公正、法治,
C. 爱国、敬业、诚信、友善
D. 自由、平等、公正、法治
【多选题】
社会主义核心价值体系内容是___
A. 马克思主义指导思想
B. 中国特色社会主义共同理想
C. 以爱国主义为核心的民族精神和以改革创新为核心的时代精神
D. 社会主义荣辱观
【多选题】
培育和践行社会主义核心价值观,要___
A. 把社会主义核心价值观融入社会生活各个方面
B. 坚持全民行动、干部带头,从家庭做起、从娃娃抓起
C. 立足中华优秀传统文化和革命文化
D. 发扬中国人民在长期奋斗中培育、继承、发展起来的伟大民族精神
【多选题】
建设社会主义文化强国,必须___
A. 培养高度的文化自信
B. 大力发展文化事业
C. 提高国家文化软实力
D. 大力发展文化产业
【多选题】
提高国家文化软实力,要___
A. 努力弘扬中华文化,推进中华文化创新发展
B. 讲好中国故事,传播好中国声音,阐释好中国特色
C. 增强对外话语的创造力、感召力和公信力,提高国际话语权
D. 加强当代中国价值观念的提炼与阐释,拓展对外传播平台和载体
【多选题】
文化强国是指一个国家具有强大的文化力量。这种力量表现为___
A. 高度文化素养的国民
B. 发达的文化产业
C. 文化自信
D. 强大的文化软实力
【多选题】
提高保障和改善民生水平的主要内容有___
A. 优先发展教育事业
B. 提高就业质量和人民收入水平
C. 加强社会保障体系建设
D. 坚决打赢脱贫攻坚战
【多选题】
加强和创新社会治理的主要内容有___
A. 创新社会治理体制
B. 改进社会治理方式
C. 加强社区治理体系建设
D. 加强社会心理服务体系建设
【多选题】
坚持总体国家安全观主要内容是指___
A. 完善国家安全体系
B. 健全公共安全体系
C. 推进平安中国建设
D. 加强国家安全能力建设
【多选题】
形成人与自然和谐发展新格局要 做到___
A. 把节约资源放在首位
B. 坚持保护优先、自然恢复为主
C. 着力推进绿色发展、循环发展、低碳发展
D. 形成节约资源和保护环境的空间格局、产业结构、生产方式、生活方式
【多选题】
加快生态文明体制改革主要内容是___
A. 推进绿色发展
B. 着力解决突出环境问题.
C. 加大生态系统保护力度
D. 改革生态环境监管体制
【多选题】
保持香港、澳门长期繁荣稳定,必须全面准确贯彻___的方针。
A. “一国两制”
B. “港人治港”
C. “澳人治澳”
D. 高度自治
【多选题】
巩固和发展爱国统一战线。坚持___,支持民主党派按照中国特色社会主义参政党要求更好履行职能。
A. 长期共存
B. 互相监督
C. 肝胆相照
D. 荣辱与共
【多选题】
加强社会治理制度建设,完善党委领导、政府负责、社会协同、公众参与、法治保障的社会治理体制,提高社会治理___水平。
A. 社会化
B. 法治化
C. 智能化
D. 专业化
【多选题】
必须坚持___为主的方针,形成节约资源和保护环境的空间格局、产业结构、生产方式、生活方式,还自然以宁静、和谐、美丽。
A. 事先预防
B. 节约优先
C. 保护优先
D. 自然恢复
【多选题】
构建市场导向的绿色技术创新体系,发展绿色金融,壮大___
A. 节能环保产业
B. 清洁生产产业
C. 绿色科技产业
D. 清洁能源产业
【多选题】
倡导简约适度、绿色低碳的生活方式,反对奢侈浪费和不合理消费,开展创建节约型机关___等行动。
A. 绿色家庭
B. 绿色学校
C. 绿色社区
D. 绿色出行
【多选题】
提高污染排放标准,强化排污者责任,健全___等制度。
A. 环保信用评价
B. 污染企业备案
C. 信息强制性披露
D. 严惩重罚
【多选题】
完成___三条控制线划定工作。
A. 生态保护红线
B. 永久基本农田
C. 城镇开发边界
D. 国土绿化面积
【多选题】
青年兴则国家兴,青年强则国家强。青年一代___,国家就有前途,民族就有希望。
A. 有品德
B. 有理想
C. 有本领
D. 有担当
【多选题】
“中国梦”的本质是___
A. 国家富强
B. 民族振兴
C. 社会稳定
D. 人民幸福
【多选题】
实现“中国梦”必须___
A. 走中国道路
B. 弘扬中国精神
C. 凝聚中国力量
D. 对抗一切外来力量
【多选题】
“中国梦”的本质是国家富强、民族振兴、人民幸福。下列对“国家富强”的理解正确的是___
A. 我国综合国力进一步增强
B. 中国特色社会主义事业进一步发展和完善
C. 经济更加发达
D. 科技创新在经济发展中的驱动力更加强劲