【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
CE
解析
暂无解析
相关试题
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
推荐试题
【单选题】
始终做到“三个代表”,是我们党的立党之本、执政之基、力量之源。这里的“本”、“基”、“源”,是指___
A. 人民群众的支持和拥护
B. 不断解放和发展生产力
C. 增强国家的经济实力
D. 不断创新、与时俱进
【单选题】
胡锦涛在2003年“七一”讲话中指出,实现人民的愿望,满足人民的需要,维护人民的利益,是“三个代表”思想的___
A. 根本出发点和落脚点
B. 关键
C. 本质
D. 灵魂
【单选题】
中国共产党坚持先进性增强创造力的决定性因素是 ___
A. 坚持发展作为党执政兴国的第一要务
B. 坚持党的基本路线不动摇
C. 坚持党的群众工作路线
D. 坚持党的思想路线,解放思想、实事求是、与时俱进
【单选题】
当前我国发展的阶段性特征,是___在新世纪新阶段的具体表现。
A. 社会主义初级阶段基本路线
B. 社会主义初级阶段基本国情
C. 社会主义初级阶段基本纲领
D. 社会主义初级阶段基本形势
【单选题】
全面发展是科学发展观的基本要求之一,就是要以___为中心,全面推进经济、政治、文化建设,实现经济发展和社会全面进步。
A. 经济建设
B. 科学文化发展
C. 人民群众的素质
D. 改革开放的深度
【单选题】
树立和落实科学发展观,是我国改革开放实践经验的总结,是战胜___给我们的重要启示,也是推进全面建设小康社会的迫切要求。
A. 自然灾害
B. 非典疫情
C. 经济危机
D. 汶川地震
【单选题】
深入贯彻落实科学发展观,要坚持把___同四项基本原则、改革开放这两个基本点统一于发展的伟大实践,任何时候都决不能动摇。
A. 以经济建设为中心
B. 改善民生
C. 以人的发展为中心
D. 以经济建设和人的全面发展为中心
【单选题】
办实事,做到___。
A. 权为民所用、心为民所系、利为民所享
B. 权为民所享、情为民所系、利为民所谋
C. 权为民所用、情为民所系、利为民所谋
D. 权为民所享、心为民所系、利为民所谋
【单选题】
新民主主义革命的胜利,社会主义基本制度的建立,为当代中国一切发展进步___。
A. 奠定了主权国家的基础
B. 提供了前提条件
C. 奠定了根本政治前提和制度基础
D. 提供了物质基础
【单选题】
党的十八大报告明确指出:“必须更加自觉地把全面协同可持续作为深入贯彻落实科学发展观的基本要求,全面落实___五位一体总体布局,促进现代化建设各方面相协调,促进生产关系与生产力、上层建筑与经济基础相协调,不断开拓生产发展、生活富裕、生态良好的文明发展道路。”
A. 经济建设、政治建设、文化建设、社会建设、生态文明建设
B. 经济建设、政治建设、文化建设、法制建设、生态文明建设
C. 经济建设、政治建设、精神文明建设、社会建设、生态文明建设
D. 经济建设、政治建设、精神文明建设、法制建设、生态文明建设
【单选题】
党的十一届三中全会以来,我们党在发展问题上经历了从“发展是硬道理”到“把发展作为党执政兴国的第一要务”,再到科学发展观的认识过程。这表明___
A. 先进的科学的社会意识对社会存在起推动作用
B. 事物的变化发展是内因和外因共同作用的结果
C. 想问题办事情必须坚持一切从实际出发
D. 我们党对社会主义现代化建设客观规律认识不断深化
【单选题】
科学发展观创造性的回答了___的问题。
A. 什么是社会主义、怎样建设社会主义
B. 实现什么样的发展、怎样发展
C. 建设什么样的党、怎么样建设党
D. 什么是马克思主义、怎么样对待马克思主义
【单选题】
中国共产党第十九次全国代表大会,是在全面建成小康社会决胜阶段、中国特色社会主义进入___的关键时期召开的一次十分重要的大会
A. 新时期
B. 新阶段
C. 新征程
D. 新时代
【单选题】
2、党的十八大以来,党和国家事业取得了全方位的开创性的历史性成就。下面说法不正确的是___。
A. 经济保持高速增长,综合国力和国际影响力显著提升,经济总量稳居世界第一位
B. 全面深化改革蹄疾步稳,压茬拓展广度和深度,全面深化改革的主体框架基本确立。
C. 现代公共文化体系建设步入发展快车道,中国故事吸引世界目光。
D. 坚定不移“打虎”“拍蝇”“猎狐”,反腐斗争压倒性态势已经形成并巩固发展。
【单选题】
党的十八大以来,党和国家事业所取得的,全方位的,开创性的历史性成就,带来了中国社会全方位的变革。下列说法不正确的是___。
A. 党的领导被忽视、淡化、削弱的状况得到明显改变
B. 有法不依、执法不严、司法不公问题严重的状况得到明显改变
C. 人民军队中一度存在的不良政治状况没有得到明显改变
D. 管党治党宽松软状况得到明显改变
【单选题】
改革开放以来,我党全部理论和实践的鲜明主题是___。
A. “一个中心,两个基本点”的基本路线。
B. 科学技术是第一生产力。
C. 什么是社会主义,怎样建设社会主义
D. 坚持和发展中国特色社会主义
【单选题】
十八大以来的五年,经济保持中高速增长,在世界主要国家中名列前茅,国内生产总值从五十四万亿元增长到___万亿元,稳居世界第二,对世界经济增长贡献率超过百分之三十。
A. 六十
B. 七十
C. 八十
D. 九十
【单选题】
十八大以来的五,我们统筹推进“ ”总体布局、协调推进“ ”战略布局,“十二五”规划胜利完成,“十三五”规划顺利实施,党和国家事业全面开创新局面___。
A. 五位一体 四个全面
B. 四位一体 五个全面
C. 五个全面 四位一体
D. 四个全面 五位一体
【单选题】
中国特色社会主义进入新时代,我国社会主要矛盾已经转化为人民日益增长的 需要和 的发展之间的矛盾。___
A. 美好生活 不充分不平衡
B. 幸福生活 不平衡不充分
C. 幸福生活 不充分不平衡
D. 美好生活 不平衡不允分
【单选题】
党的19大明确指出,我国社会主要矛盾已经转化为___。
A. 人民对于建立先进的工业国的要求,对落后的农业国的现实之间的矛盾
B. 人们对于经济迅速发展的需要,同当前的经济文化不能满足人民需要的状况之间的矛盾
C. 人民日益增长的物质文化需要同落后的社会生产之间的矛盾
D. 人民日益增长的美好生活需要和不平衡不充分的发展之间的矛盾
【单选题】
必须认识到,我国社会主要矛盾的变化,没有改变我们对我国社会主义所处历史阶段的判断,我国仍处于并将长期处于___的基本国情没有变,我国是世界最大发展中国家的国际地位没有变。
A. 社会主义阶段 C.社会主义中级阶段
B. 社会主义初级阶段 D.社会主义高级阶段