【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
推荐试题
【单选题】
《安全生产法》规定,从业人员有权对本单位安全生产工作中存在的问题提出批评、检举、控告;有权拒绝( )和强令冒险作业。___
A. 违章作业
B. 工作安排
C. 违章指挥
D. 执行命令
【单选题】
下列情况中,有哪些情况属于违章作业( )。___
A. 高处作业穿硬底鞋
B. 任意拆除设备上的照明设施
C. 特种作业持证者独立进行操作
D. 以上A、B、C、都是
【单选题】
警告标志的含义是提醒人们对周围环境引起注意,以避免可能发生危险的图形标志。其基本外型是( )。___
A. 带斜杠的圆形框
B. 圆形边框
C. 正三角形边框 
【单选题】
班组级安全教育是( )安全教育。___
A. 一级
B. 二级
C. 三级
D. 四级
【单选题】
国家对严重危及生产安全的工艺、设备实行( )制度。 ___
A. 淘汰
B. 改造
C. 封存
【单选题】
下列哪种行为是违反九大安全禁令的( )___
A. 不使用未经检验合格、无安全保障的特种设备
B. 不具备相应资质的人员从事特殊作业
C. 不办理作业票不进行特殊作业
D. 在安全生产条件不具备、隐患未排除、安全措施不到位的情况下不组织生产
【单选题】
用人单位应当建立、健全职业卫生档案和劳动者( )档案。___
A. 健康监护
B. 工资
C. 人事
D. 户口
【单选题】
按照国家现行的事故划分标准,安全生产事故不含( )级别。___
A. 重大
B. 较大
C. 严重
D. 一般
【单选题】
在SQL语言的SELECT语句中,用于限定分组条件的是___子句。
A. GROUP BY
B. HAVING
C. ORDER BY
D. WHERE
【单选题】
下列关于SQL语言中索引(Index)的叙述不正确的是___。
A. 索引是外模式
B. 在一个基本表上可以创建多个索引
C. 索引可以加快查询的执行速度
D. 系统在存收数据时会自动选择合适的索引作为存取路径
【单选题】
SQL语言集数据查询、数据操纵、数据定义与数据控制功能于一体,语句CREATE, DROP、ALTER实现___功能。
A. 数据查询
B. 数据操纵
C. 数据定义
D. 数据控制
【单选题】
4~5题基于如下描述: 设有一个数据库,包括S,J、P、SIP4个关系模式: ●供应商关系模式S(SNO,SNAME,CTY) ●零件关系模式P(PNO,PNAME,COLOR,WEIHT) ●工程项目关系模式J(INO,JNAME,CITY). ●供应情况关系模式SJP(SNO,PNOJNO.QTY) 假定它们都已经有若干数据。4~5题基于如下描述: 设有一个数据库,包括S,J、P、SIP4个关系模式: ●供应商关系模式S(SNO,SNAME,CTY) ●零件关系模式P(PNO,PNAME,COLOR,WEIHT) ●工程项目关系模式J(INO,JNAME,CITY). ●供应情况关系模式SJP(SNO,PNOJNO.QTY) 假定它们都已经有若干数据。 找出使用供应商名为"红星”的供应商所供应的零件的工程名”的SELECT错句中将使用的关系有___。
A. S、J和SJP
B. S、P和SJP
C. P、J和SJP
D. S、J、P和SJP
【单选题】
4~5题基于如下描述: 设有一个数据库,包括S,J、P、SIP4个关系模式: ●供应商关系模式S(SNO,SNAME,CTY) ●零件关系模式P(PNO,PNAME,COLOR,WEIHT) ●工程项目关系模式J(INO,JNAME,CITY). ●供应情况关系模式SJP(SNO,PNOJNO.QTY) 假定它们都已经有若干数据。4~5题基于如下描述: 设有一个数据库,包括S,J、P、SIP4个关系模式: ●供应商关系模式S(SNO,SNAME,CTY) ●零件关系模式P(PNO,PNAME,COLOR,WEIHT) ●工程项目关系模式J(INO,JNAME,CITY). ●供应情况关系模式SJP(SNO,PNOJNO.QTY) 假定它们都已经有若干数据。 找出“北京供应商的所有信息”的SELECT语句是___
A. SELECT FROM S WHERE CITY='北京'
B. SELECT SNO,SNAME FROM S WHERE CITY='北京'
C. SELECT* FROM S WHERE CITY=北京
D. SELECT SNO,SNAME FROM S WHERE CITY=北京
【单选题】
该语句的含义为___。
A. 为工资低于D6部门平均工资的所有职工加新5%
B. 为工资低于整个企业平均工资的职工加薪5%
C. 为在D6部门工作,工资低于整个企业平均工资的职工加解59%
D. 为在D6部门工作,工资低于本部门平均工资的职工加新59%
【单选题】
在SQL语言中,删除表对象的命令是___。
A. DELETE
B. DROP
C. CLEAR
D. REMOVE
【单选题】
基于“学生-选课课程"数据库中的3个关系: S(S#,SNAME,SEX,AGE)、SC(S#,C#,GRADE)和C(C#, CNAME, TEACHER),若要求查找选修“数据库技术”这门课程的学生姓名和成绩,将使用关系___
A. S和SC
B. SC和C
C. S和C
D. S、SC和C
【单选题】
9.基于“学生-选课课程"数据库中的3个关系: S(S#,SNAME,SEX,AGE)、SC(S#,C#,GRADE)和C(C#, CNAME, TEACHER),若要求查找姓名中姓“王” 的学生的学号和姓名,下面列出的SQL语句中正确的是() I.SELBCT S#, SNAME FROM S WHERE SNAME=''王%'' II. SELECT S#, SNAME FROM S WHERE SNAME LIKE '%王' III. SELECT S#, SNAME FROM S WHERE SNAME LIKE'王'
A. I.
B. I I.
C. I I I.
D. 全部
【单选题】
10.基于“学生-选课-课程”数据库中如下3个关系: S(S#, SNAME ,SEX,AGE) ,SC(S#,C#,GRADE), C(C#, CNAME, TEACHER), 为了提高查询速度,对SC表(关系)创建唯索引应该创建在()(组)属性上。
A. (S#,C#)
B. S#
C. C#
D. GRADE
【单选题】
11.基于“学生-选课-课程”数据库中如下3个关系: S(S#, SNAME ,SEX,AGE) ,SC(S#,C#,GRADE), C(C#, CNAME, TEACHER), 把学生的学号及其平均成绩定文为一个视图。定义这个视图时,所用的SELECT语句中将出现子句( ), I. FROM I I. WHERE I I I. GROUP BY I V. ORDER BY
A. I和II
B. I 和I I I
C. I 、I I和I I I
D. 全部
【单选题】
12. 基于“学生-选课-课程”数据库中如下3个关系: S(S#, SNAME ,SEX,AGE) ,SC(S#,C#,GRADE), C(C#, CNAME, TEACHER), 查询选修了课程号为“C2"的学生号和姓名。若用下列SQL的SELECT语句表达时,( ) 是错误的。
A. SELECT S.S#, SNAME FROM S WHERE S.S#=(SELECT SC.S# FROM SC WHERE C# 'C2')
B. SELECT S.S#, SNAME FROM S, SC WHERE S.S# =SC.S# AND C#='C2'
C. SELECT S.S#, SNAME FROM S,SC WHERE S.S#= SC.S# AND C#='C2'' ORDER BY S.S#
D. SELECT S.S#, SNAME FROM S WHERE S.S#IN(SELECT SC.S# FROM SC WHERE C#='C2'
【单选题】
13.基于学生-课程数据库中的3个基本表: ●学生信息表: s(smo sname, sex,ag, dep),主码为sno ●课程信息表: c(cno, came, teacher, 主码为cno ●学生选课信息表: sc(mo, cm gode),主码为160.1) “从学生选课信息表中找出无成绩的元组”的SQL语句是( C)。 A. SELECT* FROM sc WHERE grade=NULL B. SELECT * FROM sc WHERE gradeIS" C. SELECT * FROM SC WHERE grade is null D. SELECT* FROM sc WHERE grade=”13.基于学生-课程数据库中的3个基本表: ●学生信息表: s(smo sname, sex,ag, dep),主码为sno ●课程信息表: c(cno, came, teacher, 主码为cno ●学生选课信息表: sc(mo, cm gode),主码为160.1) “从学生选课信息表中找出无成绩的元组”的SQL语句是( )。
A. SELECT* FROM sc WHERE grade=NULL
B. SELECT * FROM sc WHERE gradeIS"
C. SELECT * FROM SC WHERE grade is null
D. SELECT* FROM sc WHERE grade=”
【单选题】
14. SELECT语句中与 HAVING子句同时使用的是()子句。
A. ORDER BY
B. WHERE
C. GROUP BY
D. 无须配合
【单选题】
SLECT语句执行的结果是___.
A. 数据项
B. 元组
C. 表
D. 视图
【填空题】
1.在SQL语言中,删除表的定义及表中的数据和此表上的索引,应该使用的语句是___
【填空题】
2.在SQL语言中,如果要为一个基本表增加列和完整性约束条件,应该使用SOL语句___
【填空题】
3.当对视图进行UPDATE、INSERT和DELETE操作时,为了保证被操作的行满足视图定义中子查询语句的谓词条件,应在视图定义语句中使用可选择项___
【填空题】
4.视图最终是定义在___上的,对视图的操作最终要转换为对___的更新。
【填空题】
5. 在SQL的查询语句中,对查询结果分组可使用___ 子句,对查询结果排序可使用___子句, 同时可以使用聚合函数增强检索功能。
【填空题】
6. SQL语言的功能包括___、___、___和数据控制。
【填空题】
7.在SELECT语句中进行查询,若希望查询的结果不出现重复元组,应在SELECT子句中使用___关键字。
【填空题】
8.在SQL中,WHERE子句的条件表达式中,字符串匹配的操作符是___,与0个或多个字符匹配的通配符是___,与单个字符匹配的通配符是___。
【填空题】
9. SQL语言以同一种语法格式,提供___和 ___两种使用方式。
【填空题】
10.在SQL中,如果希望将查询结果排序,应在SELECT语句中使用___字句。其中___选项表示升序, ___选项表示降序。
【单选题】
唯物主义历史观的创立使___
A. 人们活动的思想动机被揭示出来
B. 政治在社会生活中的支配作用得到证明
C. 社会的物质性得到了科学的论证
D. 真理的相对性和绝对性得到了充分说明
【单选题】
“社会形态的发展是一种自然历史过程”。这句话的意思是说,社会形态的发展___
A. 与自然界事物的发展完全相同
B. 是纯粹自发的过程
C. 不受人的自觉活动的影响
D. 具有不依人的意志为转移的客观规律性
【单选题】
社会活动是人的有意识的活动,社会规律是___
A. 由人的意志决定的
B. 革命阶级能够加以改变的
C. 偶然事件的堆积
D. 不以人的意志为转移但可以为人们所认识和利用的
【单选题】
社会规律与自然规律的共同点是___
A. 它们都是不包含偶然性的必然过程
B. 它们的实现都是无需人参与的客观过程
C. 它们都是不以人的意志为转移的客观物质运动过程
D. 它们都是通过人有意识有目的的活动而起作用的
【单选题】
社会规律与自然规律的区别在于___
A. 自然规律是客观的,社会规律是主观的
B. 自然规律是自发的起作用,社会规律是通过人们有意识的活动而实现的
C. 自然规律没有阶级性,社会规律有阶级性
D. 自然规律是可以被支配的,社会规律是不可捉摸的
【单选题】
人的活动受着社会历史条件及其规律性的制约,这种制约性表现在___
A. 人们的思想动机根源于社会存在,社会发展规律制约人们思想实现的程度
B. 人们的自觉活动不能影响历史的进程
C. 人们的企图与其活动的结果是一致的
D. 人们的主观愿望不可能超越现实的历史条件
【单选题】
“如果偶然性不起任何作用的话,那么世界历史就会带有非常神秘的性质”的观点是___
A. 唯物史观      
B.  .唯心史观      
C. 宿命论       
D. 英雄史观