【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
DE
解析
暂无解析
相关试题
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
推荐试题
【判断题】
我国行政执法类公务员非领导职务分为:巡视员.副巡视员.调研员.副调研员.主任科员.副主任科员.科员和办事员。
A. 对
B. 错
【判断题】
行政执法类公务员级别由低至高依次分为一级到二十七级。
A. 对
B. 错
【判断题】
新录用行政执法类公务员任职定级,应在规定的机构规格.编制.职数限额以及主任科员以下及其他相当职务层次的非领导职务范围内,按照拟任职职务及其对应的级别进行。
A. 对
B. 错
【判断题】
行政执法类公务员奖励坚持物质奖励与精神奖励相结合.以物质奖励为主的原则。
A. 对
B. 错
【判断题】
公务员因工作需要在机关外兼任职务的,应当经有关机关批准,并不得领取兼职报酬。
A. 对
B. 错
【判断题】
公务员解除处分后,晋升工资档次.级别和职务不再受原处分的影响。但是,解除降级.撤职处分的,不视为恢复原级别.原职务。
A. 对
B. 错
【判断题】
根据《中华人民共和国公务员法》规定,国家实行工资调查制度,定期进行公务员和企业相当人员工资水平的调查比较,并将工资调查比较结果作为调整公务员工资水平的依据。
A. 对
B. 错
【判断题】
在年度考核中,连续两年被确定为不称职的公务员应予以辞退。
A. 对
B. 错
【判断题】
机关聘任公务员可以参照公务员考试录用的程序进行公开招聘,也可以从符合条件的人员中直接选聘。机关聘任公务员可突破规定的编制限额和工资经费限额。
A. 对
B. 错
【判断题】
公务员考核坚持客观公正.注重实绩的原则,实行领导与群众相结合,平时与定期相结合,定性与定量相结合的方法。
A. 对
B. 错
【判断题】
根据《公务员考核规定(试行)》,行政执法类公务员在年度考核中累计两年被确定为称职以上等次的,在所任职务对应级别范围内晋升一个级别。
A. 对
B. 错
【判断题】
根据《公务员考核规定(试行)》,行政执法类公务员在年度考核中被确定为基本称职等次的,本考核年度不计算为按年度考核结果晋升级别和级别工资档次的考核年限。
A. 对
B. 错
【判断题】
根据《公务员考核规定(试行)》,行政执法类公务员年度考核被确定为不称职等次的,降低一个职务层次任职。
A. 对
B. 错
【判断题】
根据培养锻炼公务员的需要,应当有计划在下级机关或者上级机关.其他地区机关以及国有企业事业单位之间进行公务员转任。
A. 对
B. 错
【判断题】
与西方公务员制度相比较,我国公务员制度坚持党的领导,不搞“政治中立”,不实行“两官分途”做法。
A. 对
B. 错
【判断题】
公务员制度的建立,不仅标志着具有中国特色人事管理制度的形成也标志着我国人事分类管理制度的确立。
A. 对
B. 错
【判断题】
从世界各国看,各国公务员的范围各不相同,大体有宽大范围型.中等范围型和狭小范围型三种类型。中等范围型,如美国,公务员是指联邦和州政府机关中所有公职人员。
A. 对
B. 错
【判断题】
从世界各国看,各国公务员的范围各不相同,大体有宽大范围型.中等范围型和狭小范围型三种类型。狭小范围型,如英国,公务员仅指中央政府行政系统中非选任和非委任的事务官员。
A. 对
B. 错
【判断题】
根据我国公务员制度的规定,我国各民主党派机关和工商联的各级机关行政人员不纳入公务员队伍。
A. 对
B. 错
【判断题】
公务员制度作为一种完整的.系统的现代人事行政制度,最早产生于19世纪70年代的美国,后来为英国.日本.德国.法国等主要资本主义国家仿效。
A. 对
B. 错
【判断题】
我国公务员制度的建立最早可以追溯到20世纪90年代,1992年召开的党的十四大提出要尽快推行国家公务员制度。1993年8月,国务院颁布了《国家公务员暂行条例》,从此,我国公务员制度进入了正式实施阶段。
A. 对
B. 错
【判断题】
《公务员法》规定了我国公务员的管理原则之一是:国家对公务员实行科学管理,提高管理效能和科学化水平。
A. 对
B. 错
【判断题】
我国《公务员法》第一条明确了该法的立法目的和依据,即为了规范公务员的管理,保障公务员的合法权益,加强对公务员的监督,建设高素质的公务员队伍,促进勤政廉政,提高工作效能,根据宪法,制定该法。
A. 对
B. 错
【判断题】
公务员管理依照政府的权限.条件.标准和程序进行,也就是坚持依法行政原则,它是公务员制度的一个基本特征,也是人事管理制度法制化.科学化的一个重要标志。
A. 对
B. 错
【判断题】
公务员的义务,是指法律关于公务员在行使国家行政权力,执行国家公务活动中必须作出一定行为或不得作出一定行为的约束和限制。其涵义之一是公务员的义务是以其身份为前提,只有公务员才能享有,非公务员身份的其他社会群体成员不得享有。
A. 对
B. 错
【判断题】
职位分类是以“人”为中心的一种管理制度。它以公务员的职位为对象,按职位的工作性质.难易程度.责任轻重及所需资格条件,把职位划分为不同的类别和等级,作为人事管理基础的一种分类方法。
A. 对
B. 错
【判断题】
公务员辞退,应当向任免机关提出书面申请,任免机关应当在1个月内予以审批。
A. 对
B. 错
【判断题】
公务员申诉,是指公务员对机关作出的涉及本人权益的人事处理决定不服,依法向有关机关提出意见并要求复核和重新处理的行为。
A. 对
B. 错
【判断题】
辞职是公务员的一项基本权利,公务员一旦提出辞职申请便可离职,行政机关不能强制留下。
A. 对
B. 错
【判断题】
公务员的交流,是指机关根据工作需要或公务员个人意愿,通过法定形式,在机关内部调整公务员的工作职位,或者把公务员调出机关任职,或者将机关以外的工作人员调入机关担任公务员职务的管理活动。公务员交流的原则包括依法进行.个人需求第一.适才适用和合理原则。
A. 对
B. 错
【判断题】
品位分类侧重于职位的工作性质.难易程度.职位的职责和职权。
A. 对
B. 错
【判断题】
公务员考核的方法有领导考核与群众考核相结合.定性考核与定量考核相结合.个人自评与组织考评相结合等。
A. 对
B. 错
【判断题】
公务员因公致残并被确认为丧失工作能力的,应退休。
A. 对
B. 错
【判断题】
公务员撤职处分一般在三年后由原处理机关核消。
A. 对
B. 错
【判断题】
我国的公务员制度是新的管理制度,它也有政务官和事务官的区别,并进行分类管理。
A. 对
B. 错
【判断题】
委任制是由任免机关在其任免权限范围内,直接委派特定工作人员担任一定职务的任用方式。
A. 对
B. 错
【判断题】
公务员回避制度是公务员制度的重要组成部分,通过对公务员所任职务.执行公务和任职地区等方面作出限制性规定,减少因亲属关系等人为因素对工作的干扰。
A. 对
B. 错
【判断题】
公务员所在机关根据法律规定的条件.程序,在法定的管理权限内解除公务员职务关系的行政行为包括辞职.辞退.退休.开除。
A. 对
B. 错
【判断题】
公务员转任是指把国有企业事业单位.人民团体和群众团体中从事公务的人员调入机关担任领导职务或者副调研员以上及其他相当职务层次的非领导职务。
A. 对
B. 错
【判断题】
公务员保险,是劳动保险制度的一种,是指国家通过立法程序建立的,对暂时或永久丧失劳动能力的公务员给予物质帮助的制度。
A. 对
B. 错