【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
推荐试题
【单选题】
大叶性肺炎病人体温40.2℃,脉搏细速,血压12/8kPa(90/60mmHg),观察病情时应特别警惕发生___
A. 昏迷
B. 晕厥
C. 休克
D. 心律失常
E. 惊厥
【单选题】
服磺胺类药多饮水的目的是___
A. 避免损害神经系统
B. 减轻服药引起的恶心
C. 增加药物疗效
D. 避免尿中结晶析出
E. 避免影响血液酸碱度
【单选题】
为女性病人导尿时,符合无菌要求的操作是___
A. 2次外阴部的消毒均是由内向外、自上而下
B. 打开导尿包后应先铺洞巾后戴手套
C. 手套污染后应立即用乙醇消毒
D. 导尿管误插入阴道后应拨出重插
E. 应留取中段尿液5ml作培养检查
【单选题】
静脉输液时溶液不滴的原因不包括___
A. 压力过低
B. 静脉痉挛
C. 针头阻塞
D. 针头紧贴血管壁
E. 针头滑出血管外
【单选题】
禁用鼻饲法的病人是___
A. 食管静脉曲张
B. 拒绝进食者
C. 昏迷
D. 早产儿
E. 口腔疾患
【单选题】
某人冬季用煤球取暖,但因烟囱阻塞而煤气中毒,病人处于昏迷状态,大小便失禁,抢救时首要措施是___
A. 急救车送医院
B. 立即吸氧
C. 输液
D. 就地人工呼吸
E. 移离现场
【单选题】
使用人工呼吸机注意事项中,错误的一项是___
A. 定期做血气分析和电解质测定
B. 做好口腔及皮肤护理
C. 保持呼吸道通畅
D. 呼吸器的湿化器应每周清洁、消毒
E. 病室空气每日消毒1~2次
【单选题】
超声雾化吸入器产生超声波声能的部位是___
A. 超声波发生器
B. 透声膜
C. 晶体换能器
D. 雾化罐
E. 雾化器电子元件
【单选题】
关于病人对疼痛的反应叙述错误的是___
A. 新生儿对疼痛的刺激是敏感的
B. 老年人有时疼痛的反应会增加
C. 性格外向者对疼痛的忍耐性较差
D. 癔症性格的人容易受其他疼痛者的暗示
E. 婴幼儿不能很好地表达疼痛
【单选题】
取避污纸的正确方法是___
A. 掀页撕取
B. 由页面抓取
C. 由别人代取再传递
D. 须掀起页面再抓取
E. 随便撕取无影响
【单选题】
当T.A.T过敏试验为阳性,但病情又需要注射时,脱敏注射的原则是___
A. 将TAT含量逐渐递增,稀释液是逐渐递减
B. 将T.A.T分成相等的4份
C. 将T.A.T含量逐渐递减,稀释液是逐渐递增
D. 将T.A.T分成2份注射
E. 以上都不对
【单选题】
慢性菌痢病人在保留灌肠时应采取的卧位是___
A. 右侧卧位
B. 左侧卧位
C. 俯卧位
D. 仰卧位
E. 膝胸卧位
【单选题】
脱隔离衣错误的是___
A. 先松开腰带在前面打活结
B. 塞好衣袖再刷手
C. 刷手后解衣领
D. 从袖里拉下衣袖,勿使清洁的手污染
E. 脱下的隔离衣应污染面朝外投入污物袋中
【单选题】
依赖性护理措施是指___
A. 源于医嘱的措施
B. 融入其他学科专家意见的措施
C. 护士独立提出的措施
D. 源于病人意愿的措施
E. 源于家属建议的措施
【单选题】
女,44岁,因车祸胸部严重外伤入院,病人存在多方面的需要,按照人的基本需要层次论,应首先满足的需要是___
A. 安全的需要
B. 自尊的需要
C. 生理的需要
D. 爱与归属的需要
E. 自我实现的需要
【单选题】
患者李某,66岁,因老年慢性支气管炎,痰液黏稠不易咳出,为帮助祛痰,给予氧气雾化吸入,下列操作中,错误的一项是___
A. 吸入前嘱病人先漱口
B. 用蒸馏水稀释药液至5ml
C. 氧流量需6~10L/min
D. 雾化剂吸入器进气口接氧气,湿化瓶中加入蒸馏水
E. 嘱病人呼气时移开出气口
【单选题】
护士与一糖尿病病人及其家属共同研究病人出院后的饮食安排,此时护士的角色是___
A. 教育者
B. 治疗者
C. 帮助者
D. 咨询者
E. 策划者
【单选题】
乙醇拭浴的溶液浓度是___
A. 10%~20%
B. 25%~35%
C. 45%~50%
D. 70%~75%
E. 95%
【单选题】
王小姐,20岁,因急性再生障碍性贫血入院治疗。实验室检查:红细胞(RBC)2.1×10[~12.gif]/L,血红蛋白(Hb)60g/L,白细胞(WBC)3.0×10/L,血小板55×10/L。该病人最适宜静脉输注___
A. 新鲜血
B. 新鲜冰冻血浆
C. 5%白蛋白
D. 浓缩白细胞悬液
E. 库血
【单选题】
系统按是否与环境相互作用可分为___
A. 次系统和超系统
B. 人造系统和自然系统
C. 生态系统和社会系统
D. 开放系统和闭合系统
E. 输入系统和输出系统
【单选题】
"三查七对"中不包括___
A. 药物的名称
B. 药物的剂量
C. 药物的副作用
D. 药物的浓度
E. 给药时间
【单选题】
口对口人工呼吸适宜的吹气量是___
A. 500ml左右
B. 600ml左右
C. 700ml左右
D. 800ml左右
E. 900ml左右
【单选题】
护理程序的方法论基础是___
A. 信息交流理论
B. 压力与适应理论
C. 人的基本需要理论
D. 解决问题的理论
E. 学习的理论
【单选题】
使用前需测心率的药物是___
A. 洋地黄
B. 泼尼松
C. 地西泮
D. 普萘洛尔
E. 氯丙嗪
【单选题】
1919年英国率先颁布了___
A. 系统制定护理法规的参考指导大纲
B. 英国护理法
C. 职业病预防法
D. 医疗事故处理条例
【单选题】
无菌注射器和针头可以用手直接接触的部位是___
A. 针头
B. 活塞
C. 乳头
D. 针栓
E. 针梗
【单选题】
现代护理学的形成是从哪个世纪开始的___
A. 19世纪中叶
B. 17世纪中叶
C. 16世纪中叶
D. 18世纪中叶
E. 20世纪中叶
【单选题】
在沟通进行阶段应注意___
A. 可一次提多个问题
B. 尽量使用医学术语以表达准确
C. 谈话只能由医护人员引导
D. 交谈只能由病人引导
E. 一次只提一个问题
【单选题】
属于病人过去健康状况的资料是___
A. 发病时的临床症状
B. 发病的诱因
C. 院外用药情况
D. 药物过敏史
E. 病人对疾病的体验
【单选题】
哪些危重病人的护理诊断与意识障碍无直接关系___
A. 有误吸的危险
B. 有受伤的危险
C. 焦虑
D. 自理缺陷
E. 有皮肤完整性受损的危险
【单选题】
使用免疫抑制剂的病人应对其采取___
A. 严格隔离
B. 接触隔离
C. 呼吸道隔离
D. 床边隔离
E. 保护性隔离
【单选题】
下列哪项不是静脉输血的目的___
A. 降低颅内压,减轻脑水肿
B. 补充白蛋白
C. 补充凝血因子
D. 增加血红蛋白
E. 补充血容量
【单选题】
小儿头皮静脉输液时,错误的操作是___
A. 需两人以上参与
B. 用碘酊、乙醇常规消毒皮肤
C. 操作者站病儿头侧
D. 病儿可仰卧和侧卧
E. 右手持针沿静脉向心方向平行刺入
【单选题】
南丁格尔首创科学的护理事业的时间是___
A. 16世纪中叶
B. 17世纪中叶
C. 18世纪中叶
D. 19世纪中叶
E. 20世纪中叶
【单选题】
吸痰时痰液黏稠,辅助叩背的目的是___
A. 胸壁震荡促进胸肌血液循环
B. 气管震动促进IgA功能
C. 胸壁震荡提高呼吸肌功能
D. 促使痰液松动
E. 胸壁气管震动对抗气管刺激
【单选题】
肌肉注射引起硬结的主要原因是___
A. 未做到"两快一慢"
B. 同时注射多种药物
C. 病人肌肉结实
D. 注入不易吸收溶剂
E. 针头粗长,进针太深
【单选题】
穿脱隔离衣时应避免污染的部位是___
A. 腰带以下部分
B. 袖子的后面
C. 腰带以上部分
D. 胸前、背后
E. 衣领
【单选题】
在吸氧过程中,调整氧流量的方法是___
A. 调节流量开关
B. 调节总开关
C. 拔除鼻导管调节流量
D. 关总开关,再调流量
E. 分开鼻导管与玻璃接头调节流量后再接好
【单选题】
足底部不能用冷疗的原因是___
A. 影响散热或引起一过性的冠状动脉收缩
B. 引起腹泻
C. 引起腹痛
D. 引起冻伤
E. 引起关节疼痛,肌肉痉挛
【单选题】
应放在有色密盖瓶内的药物是___
A. 易氧化的药物
B. 易潮解的药物
C. 易燃烧的药物
D. 易风化的药物
E. 易挥发的药物