【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
推荐试题
【多选题】
10我们要更加坚定自觉地贯彻政治建军要求,充分发挥政治工作生命线作用。要着力培养___的新时代革命军人
A. 有灵魂
B. 有本事
C. 有血性
D. 有品德
【多选题】
11习近平发出全面实施改革强军的伟大号召,开启了我军历史上一场整体性、革命性变革。通过大变革大重塑,人民军队___。
A. 体制一新
B. 结构一新
C. 格局一新
D. 心灵一新
【多选题】
12要坚持用强军目标审视、引领、推进改革,着力解决制约国防和军队建设的___,进一步解放和发展战斗力。
A. 体制性障碍
B. 错误思路
C. 结构性矛盾
D. 政策性问题
【多选题】
13空军是空中作战行动的主体力量,要按照空天一体、攻防兼备的战略要求,着力提高___能力。
A. 战略预警
B. 空中打击
C. 空降作战
D. 防空反导
【多选题】
14新型作战力量代表着军事技术和作战方式的发展趋势,具有___等优长,是国家战略能力的前瞻力量,是生成新质战斗力的强力引擎。
A. 练兵打仗新
B. 技术平台新
C. 体系编成新
D. 制敌手段新
【多选题】
15练兵备战要扎实做好军事斗争准备,以国家核心安全需求为导向,___真抓实备、常备不懈。
A. 牢固树立练兵打仗、带兵打仗思想
B. 牢固树立战略预警机制
C. 牢固树立随时准备打仗的思想
D. 牢固树立立足现有条件打胜仗的思想
【多选题】
16邓小平提出要走___的道路,强调国防和军队建设须服从服务于经济建设大局的思想
A. 军民结合
B. 平战结合
C. 军品优先
D. 以军养民
【多选题】
17我国军民融合发展刚进入由初步融合向深度融合的过渡阶段,必须正确把握和处理___和()的关系,两者协调发展、平衡发展、兼容发展。
A. 军事建设
B. 经济建设
C. 国防建设
D. 社会建设
【多选题】
18健全军民融合体制机制,形成___相统一的工作运行体系。
A. 国家主导
B. 需求牵引
C. 社会协同
D. 市场运作
【多选题】
19进入新时代,进一步推动军民融合深度发展,更需要着力加强战略规划,要把___统筹起来、同步论证。
A. 国民经济
B. 社会发展规划
C. 军队建设发展规划
D. 地方发展战略
【多选题】
20发展高新技术武器装备要吸纳和利用民用先进技术,打破行业垄断,在健全___机制上迈出更大步伐。
A. 竞争
B. 评价
C. 监督
D. 激励
【多选题】
1进入21世纪以来,___成为不可阻挡的时代潮流。
A. 和平
B. 发展
C. 合作
D. 共赢
【多选题】
2推动建设___的新型国际关系,是党中央立足时代发展潮流和我国根本利益作出的战略选择。
A. 相互尊重
B. 公平正义
C. 合作共赢
D. 共同发展
【多选题】
3新型国际关系,“新”的涵义有___。
A. 和平发展
B. 相互尊重
C. 公平正义
D. 合作共赢
【多选题】
4中国始终把坚决维护___作为外交工作的基本出发点和落脚点。
A. 国家主权
B. 安全
C. 发展利益
D. 对外利益
【多选题】
5推动建立新型国际关系,要按照___的外交工作布局,发展与各国的友好关系。
A. 大国是关键
B. 周边是首要
C. 发展中国家是基础
D. 多边是舞台
【多选题】
6中国秉持___的全球治理观。
A. 共商
B. 共建
C. 共享
D. 和谐
【多选题】
7构建人类命运共同体思想,其核心就是建设持久和平、___的世界
A. 普遍安全
B. 共同繁荣
C. 开放包容
D. 清洁美丽
【多选题】
8共建“一带一路”应秉持___的理念。
A. 和平合作
B. 开放包容
C. 互学互鉴
D. 互利共赢
【多选题】
9世界多极化是一个___过程。
A. 长期的
B. 曲折的
C. 快速的
D. 不可避免的
【多选题】
10经济全球化是一把“双刃剑”,其带来的负面影响有___。
A. 加剧国际竞争
B. 增加国际风险
C. 冲击国家主权
D. 冲击发展中国家的民族工业
【多选题】
11中国实行独立自主的和平外交政策,反对任何国家损害我国的___。
A. 独立
B. 主权
C. 安全
D. 尊严
【多选题】
12在新形势下,各国应树立___的新安全观。
A. 共同
B. 综合
C. 合作
D. 可持续
【多选题】
1新时代中国共产党的历史使命,就是统揽___,实现伟大复兴的中国梦。
A. 伟大斗争
B. 伟大工程
C. 伟大事业
D. 伟大梦想
【多选题】
2必须党为最高政治领导力量,原因在于___
A. 这是马克思主义政党的基本要求
B. 这是对党领导革命、建设和改革历史经验的深刻总结
C. 这是推进伟大事业的根本保证
D. 这是实现共产主义的客观要求
【多选题】
3坚持党对一切工作的领导,必须做到___
A. 绝对服从党中央的安排
B. 认识到党为最高政治领导力量
C. 确保党始终总揽全局协调各方
D. 全面增强党的执政本领
【多选题】
4___是党的领导决策核心。
A. 中央委员会
B. 全国人民代表大会
C. 中央政治局
D. 中央政治局常委会
【多选题】
5关于党的民主集中制原则中,下列说法正确的有___。
A. 民主与集中是相互矛盾的
B. 应该把民主基础上的集中和集中指导下的民主相结合
C. 充分发扬民主后作出的决定,各地方、各部门不允许有令不行、有禁不止
D. 民主与集中是辩证统一的
【多选题】
6中国共产党是___的先锋队。
A. 中国工人阶级
B. 中国人民
C. 中华民族
D. 世界人民
【多选题】
7中国共产党是中国特色社会主义事业的___。
A. 开创者
B. 推动者
C. 引领者
D. 管理者
【多选题】
8新时代中国共产党的历史使命就是统揽___。
A. 伟大斗争
B. 伟大工程
C. 伟大事业
D. 伟大梦想
【多选题】
9确保党始终总览全局协调各方就必须增强___。
A. 政治意识
B. 大局意识
C. 核心意识
D. 看齐意识
【单选题】
1、闭合燃油泵开关,RBC不吸合时,应检查___。
A. 16DZ
B. 3~4DZ
C. RBC线圈电路
【单选题】
2、当1YD或2YD电枢中的___为零,空压机工作时,造成熔断器4RD或5RD
A. 电流
B. 反电动势
C. 电压降
【单选题】
3、运行中由于___,启动发电机会突然转入固定发电。
A. 1DZ跳开
B. 2RD烧损
C. 电压调整器故障
【单选题】
4、柴油机启动时,受___控制使启动机油泵工作45~60S后
A. 1SJ
B. 2SJ
C. 3SJ
【单选题】
5、走车电路中设置1~3ZJ及DJ、LJ常闭触头是控制___
A. LLC
B. LC
C. LLC.LC
【单选题】
6.闭合蓄电池闸刀XK,卸载信号灯7XD不亮的原因有___
A. Lc常闭触点不良
B. 6Dz分位 LLC吸合
【单选题】
7.闭合蓄电池开关XK,电压表无显示的原因___
A. 1Rd烧损
B. 蓄电池亏电
C. 蓄电池有反极现象
【单选题】
8.运行中,启动发电机停止发电的原因有___
A. 自动开关2DZ跳开
B. FLC线圈电路故障
C. 转入固定发电