【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
推荐试题
【单选题】
管饲要素饮食的输入时不正确的措施是___
A. 从低浓度开始逐渐递增
B. 液量从少量开始,速度从50ml/h开始
C. 温度不可过高维持在38℃左右
D. 保证营养液及输注用具的清洁无菌
E. 测定胃内残余量,大于150ml应暂停输注
【单选题】
患者,女性,48岁。胆石症多年,2天前因急腹痛、寒战、高热、黄疸门诊治疗,无好转,现神志不清,血压10/6.7kPa(75/50mmHg),应考虑为___
A. 急性化脓性胆管炎
B. 急性胆囊炎
C. 暴发性肝炎
D. 肝总管结石
E. 急性梗阻性化脓性胆管炎
【单选题】
下列不属于孕激素的生理功能的是___
A. 降低妊娠子宫对缩宫素的敏感性
B. 促进体内水与钠的排泄
C. 促进阴道上皮细胞脱落
D. 促进骨中钙质沉着
E. 可升高基础体温可升高03~05℃
【单选题】
患者女性,29岁。孕33周,突然阴道流血如经量,无腹痛,此时,需诊断是否前置胎盘,应建议进行___
A. 腹部触诊
B. 阴道检查
C. B超检查
D. 血常规检查
E. 后穹隆穿刺
【单选题】
患者,男性,36岁。左腰部被撞伤2小时,因左腰痛、尿色红来院就诊。查血压16/9kPa(120/70mmHg),心率80次/分,呼吸平稳,左腰部稍肿伴明显压痛,腹软无压痛。诊断肾损伤,护理中应特别强调___
A. 常规保留导尿管
B. 做好术前准备
C. 绝对卧床休息
D. 镇静、镇痛
E. 应用止血药物
【单选题】
患者,男性,57岁,暴饮后突发急性胰腺炎入院,观察时要警惕该病人可能发生的最常见并发症是___
A. 休克
B. 胰瘘
C. 上消化道大出血
D. 腹腔脓肿
E. 胰腺假性囊肿
【单选题】
下述哪项不支持胎膜早破诊断___
A. 阴道持续性流液
B. 宫缩时肛诊触不到前羊膜囊
C. 羊水涂片镜检可见羊齿状结晶
D. 阴道排液酸碱试纸检查呈弱酸性
E. 羊水涂片染色可见毳毛
【单选题】
患者,女性,确诊为系统性红斑狼疮,医嘱避免日光直射,病室紫外线消毒时应回避,外出穿长袖上衣及长裤,戴帽或撑伞遮阳。原因是___
A. 紫外线可致雌激素作用强
B. 紫外线是本病重要诱因
C. 紫外线直接破坏免疫系统
D. 紫外线加重关节骨膜炎
E. 紫外线直接损害皮肤
【单选题】
患者,男性,62岁。心前区闷痛、大汗、恶心持续40分钟来院就诊,经心电图检查确诊为急性心肌梗死收入院。24小时内病人最易发生的是___
A. 心源性休克
B. 心律失常
C. 心脏压塞
D. 心力衰竭
E. 急性肺水肿
【单选题】
患者,女性,47岁,近来发现乳头有少量血性液体流出,但乳房内并无明显肿块触及,亦无痛,可考虑___
A. 乳房囊肿
B. 乳管内乳头状瘤
C. 乳腺癌
D. 乳房囊性增生病
E. 乳腺脂肪瘤
【单选题】
孕妇,28岁,妊娠20周,采用膝胸卧位纠正胎位不正,不正确的是___
A. 双膝稍分开(与肩同宽)
B. 大腿与床面呈45°
C. 胸贴床面,臀部抬起
D. 头偏向一侧
E. 每天做2~3次,每次5~10分钟
【单选题】
患者女性,28岁。宫内妊娠39周,G[1.gif]P,骨盆外测量:髂棘间径21cm,髂嵴间径23cm,骶耻外径16cm,坐骨结节间径7cm,正确的诊断为___
A. 漏斗骨盆
B. 扁平骨盆
C. 正常骨盆
D. 横径狭小骨盆
E. 均小骨盆
【单选题】
慢性肾小球肾炎病理机制是___
A. 链球菌感染引起的化脓性炎症
B. 病毒感染引起的非化脓性炎症
C. 多种原因引起的免疫性炎症
D. 急性肾小球肾炎迁延不愈所致
E. 先天遗传性疾病
【单选题】
关于急性肾衰竭护理,下列不正确的是___
A. 尿量<400ml/d,提示肾衰竭可能
B. 少尿期饮食应取低蛋白
C. 避免使用含钾药物
D. 进入多尿期表示患者已脱离危险
E. 禁用对肾有毒性作用的药物
【单选题】
1999年,WHO/ISH对一级高血压的诊断标准是___
A. 收缩压<110mmHg,舒张压<80mmHg
B. 收缩压<120mmHg,舒张压<90mmHg
C. 收缩压140~159mmHg,舒张压90~99mmHg
D. 收缩压135~140mmHg,舒张压85~89mmHg
E. 收缩压160~175mmHg,舒张压100~105mmHg