【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
推荐试题
【单选题】
接触网检修作业车(W201)、接触网辅助作业车(W202)、接触网检修平台车(P201)、接触网综合检测车(W203)要___检修(维保)1次并填写《接触网作业车、辅助作业车(平台作业车)》(详见附件9)、《接触网检测车检修记录》(详见附件10)。
A. 半个月
B. 每月、
C. 每2个月
D. 每季度
【单选题】
刚柔过渡处两支刚性悬挂中间悬挂点处接触线应等高,高差不大于2mm;转换悬挂点非工作支不得低于工作支,可比工作支高出___mm,受电弓在双向通过时应平滑过渡,无撞击和拉弧现象;在刚柔过渡交界点处,汇流排对接触线不应产生下压或上抬。
A. 3~6
B. 3~5、
C. 4~6
D. 5~8
【单选题】
柔性接触线下锚绝缘子边缘距受电弓包络线不应小于___mm,刚性悬挂带电体距柔性悬挂下锚底座、下锚支接地体等不应小于150mm。
A. 100
B. 150、
C. 200
D. 250
【单选题】
刚柔过渡装置连接线夹的螺栓紧固力矩为___N•m;防雨罩安装稳固,对露天汇流排覆盖完全。
A. 25
B. 30、
C. 44
D. 45
【单选题】
刚柔过渡装置两支悬挂点的拉出值为±100mm,间距为200mm,允许误差±___mm。
A. 5
B. 10、
C. 20
D. 30
【单选题】
埋入杆件安装位置正确,允许误差±100mm;螺纹外露不少于___mm,镀锌防腐良好;化学锚栓螺孔填充密实,化学药剂填充处无渗水漏水现象。
A. 10
B. 20、
C. 30
D. 50
【单选题】
硅橡胶绝缘横撑金属连接件与芯棒连接应可靠,密封应良好;硅橡胶伞裙完整无破损;C型汇流排定位线夹的U型螺栓距接地体、接地线不得小于___mm。
A. 100
B. 150、
C. 200
D. 250
【单选题】
支持装置带电体距混凝土及接地体的绝缘距离,静态值不小于___mm。
A. 100
B. 150、
C. 200
D. 250
【单选题】
槽钢底座、悬吊槽钢、绝缘横撑、悬垂吊柱、T型头螺栓等构件无变形、镀锌层完整;T型头螺栓应留有不少于___mm的调节余量(净空限制地段除外),所有外露螺栓长度应满足电气绝缘距离,静态值不小于150mm。
A. 10
B. 15、
C. 20
D. 30
【单选题】
T型头螺栓的头部长边应基本垂直于安装槽道,T型头螺杆距邻近绝缘子裙边不小于___mm。
A. 50
B. 60、
C. 100
D. 150
【单选题】
汇流排定位绝缘子安装端正,表面光滑、清洁,无裂纹、破损、缺釉、斑点等缺陷,瓷釉剥落总面积不大于___mm2。
A. 150
B. 250、
C. 300
D. 500
【单选题】
汇流排终端到相邻悬挂点的距离为___mm,允许误差:+200mm,-100mm。
A. 1500
B. 1600、
C. 1800
D. 2500
【单选题】
接触线在锚段末端汇流排外余长为100~150mm,沿汇流排终端方向顺延,水平夹角一般不小于为___°;接触线端头对接地体的距离不小于150mm;困难情况不小于115mm。
A. 25
B. 30、
C. 45
D. 60
【单选题】
中心锚结处于汇流排中心线的正上方,基座中心偏离汇流排中心不大于___mm。
A. 25
B. 30、
C. 45
D. 60
【单选题】
中心锚结绝缘子表面应无损伤,接地端至带电体、汇流排距离一般情况下应不小于150mm;困难情况不应小于___mm。中心锚结线夹处接触线的工作面应平顺无负弛度。
A. 60
B. 100、
C. 115
D. 120
【单选题】
中心锚结绝缘子及拉杆受力均衡,与汇流排的夹角一般不大于___°;中心锚结线夹与汇流排固定牢靠,调整螺栓处于可调状态。
A. 25
B. 30、
C. 45
D. 60
【单选题】
悬挂点处接触线拉出值范围为±___mm,误差不应大于±10mm。关键悬挂点的拉出值与设计值一致,其它一般悬挂点的拉出值仅作调整参考,但必须保证汇流排平滑过渡,且拉出值的绝对值不得大于300mm。
A. 200
B. 250、
C. 300
D. 350
【单选题】
汇流排横截面中轴线应垂直于所在处的轨道平面,偏斜不应大于___°。
A. 1
B. 2、
C. 3
D. 5
【单选题】
锚段关节两支接触线在关节中间悬挂点处应等高,其高差不大于___mm;转换悬挂点非工作支比工作支高出3~6mm,受电弓在双向通过时应平滑过渡,无撞击和拉弧现象。
A. 1
B. 2、
C. 3
D. 5
【单选题】
分段绝缘器中心偏离线路中心线不应大于___mm。
A. 10
B. 20、
C. 30
D. 50
【单选题】
分段绝缘器紧固件连接牢固可靠,滑板连接螺栓紧固力矩为___N•m。
A. 25
B. 30、
C. 44
D. 50
【单选题】
分段绝缘器中心距相邻悬挂定位点的距离为___mm,允许误差±500mm。
A. 500
B. 800
C. 1000
D. 1500
【单选题】
测量机构箱内电磁离合器电阻,其阻值为___Ω,误差为±5Ω。
A. 25
B. 30、
C. 35
D. 36
【单选题】
隔离开关触头带电部分至顶部建筑物距离,不应小于___mm;至隧道壁不应小于150mm。
A. 250
B. 300
C. 500
D. 1000
【单选题】
隔离开关底座和操作机构底座应呈水平状态,安装牢固;靠近线路侧至线路中心线不得小于___mm。操作机构底座安装高度距地面1000~1200mm为宜。操作机构箱应密封良好,门锁和钥匙完好齐全。
A. 1500
B. 1800
C. 1900
D. 2000
【单选题】
电连接线的安装位置允许偏差为±200mm,距相邻绝缘子最小距离不小于___mm,在任何情况下均应满足带电距离要求。
A. 50
B. 60
C. 100
D. 150
【单选题】
150mm2电缆绝缘层剥开长度为___mm;400mm2电缆绝缘层剥开长度为90mm;电缆导体不得损伤。
A. 50
B. 60、
C. 70
D. 100
【单选题】
150mm2电缆卡子间距不大于___mm;400mm2电缆卡子间距不大于1000mm。
A. 50 0
B. 600、
C. 700
D. 800
【单选题】
电连接电缆弯曲半径150mm2不小于___mm, 400mm2不小于800mm。
A. 250 0
B. 300、
C. 500
D. 800
【单选题】
电连接线的安装位置允许偏差为±___mm,距相邻绝缘子最小距离不小于60mm,在任何情况下均应满足带电距离要求。
A. 100 0
B. 200、
C. 250
D. 300
【单选题】
架空地线的弛度应符合安装曲线,其允许偏差为+5%至-___%。
A. 1
B. 2、
C. 2.5
D. 3
【单选题】
架空地线不得有___股以上的断股,同一锚段内,断股补强数和接头数均不超过4个。
A. 1
B. 2、
C. 3
D. 4
【单选题】
架空地线下锚处调整螺栓长度处于可调节范围内,并有不少于___mm的调节余量。
A. 15
B. 20、
C. 30
D. 50
【单选题】
接地线及其固定螺栓、电缆卡子等对接触网带电体的距离不小于150mm,对受电弓的瞬时距离不小于___mm,且不得侵入行车限界。
A. 50
B. 100、
C. 150
D. 250
【单选题】
运行中的避雷器___预防性试验。
A. 每年一次
B. 每年在雷雨季节前需做一次、
C. 每两年一次
D. 视情况做
【单选题】
放电间隙___mm,放电铜棒应无严重烧伤变形。
A. 2-3
B. 2.5-3、
C. 2.5-3.5
D. 3-6
【单选题】
简单悬挂的吊索回头不小于___mm,吊索压板紧固良好。
A. 20
B. 30
C. 50
D. 100
【单选题】
柔性接触网定位器及定位管坡度为___。
A. 1/10-1/6
B. 1/10-1/5
C. 1/6-1/5
D. 1/10-1/7
【单选题】
2号线共有___处接触网刚柔过渡装置。
A. 1
B. 2
C. 3
D. 4
【单选题】
2号线共有___座牵引变电所(含车辆段停车场)。
A. 11
B. 12
C. 13
D. 14