【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
推荐试题
【单选题】
探放水时要留足至少___米的超前距。
A. 10米
B. 20米
C. 30米
D. 40米
【单选题】
严禁在水体下、采空区、水淹区域下开采___煤层。
A. 急倾斜
B. 近水平
C. 倾斜
D. 缓倾斜
【单选题】
矿井综合水文地质图一般采用___ 作底图进行绘制
A. 采掘工程平面图
B. 矿井充水性图
C. 井田地形地质图
D. 矿井涌水量与各种相关因素动态曲线图
【单选题】
下列___是矿井人为充水通道。
A. 岩溶洞穴
B. 封闭不良钻孔
C. 地震裂隙
D. 陷落柱
【单选题】
煤矿主要水泵房应当至少有2个安全出口,其中1个出口用斜巷通到井筒,并高出泵房底板___以上。
A. 5m
B. 7m
C. 10m
D. 15m
【单选题】
井筒淋水超过___时,应当进行壁后注浆处理。
A. 3m3/h
B. 6m3/h
C. 10m3/h
D. 15m3/h
【单选题】
雨季“三防”不包括___。
A. 防洪
B. 防排水
C. 防突水
D. 防雷电
【单选题】
煤矿雨季“三防”领导小组组长应由___担任.
A. 矿长
B. 矿井总工程师
C. 矿调度室主任
D. 安全副矿长
【单选题】
采掘工作面开始掘进和回采前,应当提出专门水文地质情况分析报告,经___组织生产、安监和地测等有关单位审查批准后,方可进行回采。
A. 矿长
B. 矿井总工程师
C. 安全副矿长
D. 生产副矿长
【单选题】
井下需要构筑水闸墙的,应由___进行设计。
A. 煤矿地测科
B. 煤矿企业技术部
C. 相应资质单位
D. 施工队
【单选题】
主要探水孔位置,应由___进行标定。
A. 测量人员
B. 地质人员
C. 技术员
D. 探水队长
【单选题】
每年雨季前至少组织开展1次水害应急预案演练。演练结束后,应当对演练效果进行评估,分析存在的问题,并对水害应急预案进行修订完善。演练计划、方案、记录和总结评估报告等资料保存期限不得少于___年。
A. 2
B. 1
C. 3
D. 4
【多选题】
煤矿地质工作应当坚持___的原则。
A. 综合勘查
B. 科学分析
C. 预测预报
D. 保障安全
【多选题】
采空区普查,应采用调查访问、物探、化探和钻探等方法进行,查明采空区___、自然发火情况和有害气体等。
A. 分布
B. 形成时间
C. 范围
D. 积水状况
【多选题】
断层普查主要包括断层___,断层带宽度及岩性,断层两盘伴生裂隙发育程度,断层富水性等。
A. 性质
B. 走向
C. 倾角
D. 断距
【多选题】
地下含水体普查,应查明影响矿井安全开采的水文地质条件,各种含水体的___和导水通道等,预测煤矿正常和最大涌水量,提出防排水建议。
A. 水源
B. 水量
C. 水位
D. 水质
【多选题】
陷落柱观测应包括下列内容:___。
A. 形状、大小和陷落角,柱面形态
B. 充填物的岩性、层位、密实程度和含水性
C. 充填物的岩性、层位、密实程度和含水性
D. 陷落柱的伴生构造
【多选题】
岩浆岩体观测应包括岩体___,对煤层厚度和煤质的影响。
A. 产状
B. 形态
C. 厚度
D. 侵入层位
【多选题】
有下列___情况的,应及时对生产地质报告进行修编:
A. 地质构造、煤层、瓦斯、水文地质、工程地质、煤质等发生了较大变化
B. 闭坑前
C. 煤炭资源/储量变化超过前期保有资源/储量的25%
D. 煤矿改扩建之前。
【多选题】
煤矿应及时将___中获取的井巷、硐室等工程信息和揭露的地质信息纳入信息化平台。
A. 设计
B. 建设
C. 生产
D. 施工
【多选题】
采掘工程设计施工前,按时提交由总工程师批准的___。
A. 采区地质说明书
B. 回采工作面地质说明书
C. 掘进工作面地质说明书
D. 矿井地质说明书
【多选题】
煤矿必须备齐下列区域地质资料和图件___:
A. 矿区主要地质剖面图。
B. 矿区构造纲要图
C. 矿区地形地质图
D. 矿区地层综合柱状图
【多选题】
各矿井、露天矿在___各个阶段,均应绘制完整的矿图,整理出系统的测绘资料,并随着实际情况的变化,及时加以修改、补充和填绘。
A. 新建
B. 恢复
C. 生产
D. 扩建
【多选题】
采掘工程平面图根据图面允许和实际要求,还可加绘煤层底板等高线、地面重要工业建筑,___等。
A. 居民区
B. 铁路
C. 重要公路
D. 大的河流、湖泊
【多选题】
下列哪些属于矿区必备的综合性地质图件___。
A. 矿区地层综合柱状图
B. 矿区煤系地层综合柱状图
C. 矿区煤(岩)层对比图
D. 矿区主要可采煤层厚度等值线图
【多选题】
煤矿地质观测与描述应记录___
A. 时间
B. 地点
C. 位置
D. 观测、记录者姓名
【多选题】
地质构造复杂程度划分依据以___等影响采区合理划分因素为主。
A. 断层
B. 陷落柱
C. 褶皱
D. 岩浆岩
【多选题】
煤矿地质综合分析必须以___的第一手资料为基础。
A. 完整
B. 丰富
C. 准确
D. 详细
【多选题】
井筒施工时,应及时观测___等变化情况。
A. 岩石硬度
B. 井温
C. 水位
D. 井下涌(漏)水量
【多选题】
下列哪些属于《煤矿地质工作规定》中要求的地质资料台账___
A. 矿井瓦斯资料台账
B. 煤质资料台账
C. 井筒、石门见煤点台账 C、物探成果验证台账
【多选题】
地质预报应按___等形式进行,且应根据采掘(剥)工程的进展及时发出
A. 年报
B. 半年报
C. 季报
D. 月报
【多选题】
煤矿企业及所属矿井应积极采用___,认真开展煤矿地质研究,不断提高煤矿地质工作的技术水平。
A. 新理论
B. 新技术
C. 新方法
D. 新装备
【多选题】
煤矿应建立地质信息数据库,进行___,实现地质工作的信息化管理。
A. 地质资料处理
B. 综合分析
C. 数字化自动成图
D. 自动报警
【多选题】
煤矿地质观测与描述应做到___相结合。
A. 现场与室内
B. 理论与实践
C. 宏观与微观
D. 全面与重点
【多选题】
地质“三书”为___
A. 采区地质说明书
B. 掘进地质说明书
C. 揭煤地质说明书
D. 回采地质说明书
【多选题】
煤(岩)层的产状要素包括以下哪些?___
A. 走向
B. 走向线
C. 倾向
D. 倾角
【多选题】
关于断层和褶曲,下列说法正确的是___。
A. 褶曲是脆性变形
B. 断层都是塑性变形
C. 断层是脆性变形
D. 褶曲是塑性是变形
【多选题】
按煤层倾角差异可分为___ 
A. 近水平煤层
B. 缓倾斜煤层
C. 倾斜煤层
D. 急倾斜煤层 
【多选题】
自然界中地质构造的基本表现形式有 ___ 两种.
A. 褶皱
B. 单斜构造
C. 盆地
D. 断裂构造
【多选题】
煤层厚度的变化原因,属于后生变化的有___
A. 地壳不均衡沉降
B. 构造变化
C. 岩浆侵入
D. 河流冲蚀