【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
推荐试题
【判断题】
培训评价要有利于培训目标的实现,要有计划、有目的、有组织地开展工作体现了培训评价的客观性。
A. 对
B. 错
【判断题】
培训评价标准就是对培训工作质与量的具体规定,是衡量培训工作质量及其价值的依据。
A. 对
B. 错
【判断题】
培训评价指标体系具有设计要求高、便于操作、能够满足被评价对象多样化要求的特点。
A. 对
B. 错
【判断题】
以考察培训工作质量为主要目的的评价应以职责指标为主体。
A. 对
B. 错
【判断题】
培训教师应具备的素质较普通学校教师更为广泛、多元与专门化。
A. 对
B. 错
【判断题】
职业道德素质是培训教师整体素质的核心。
A. 对
B. 错
【判断题】
组织实施培训课程应以教员为中心而不是以学员为中心。
A. 对
B. 错
【简答题】
简述岗位职务描述与培训工作的关系。(10分)
【简答题】
培训教材开发基础性工作包括哪些内容?(10分)
【单选题】
下列各项合同中,属于《合同法》调整范围内的合同是?___
A. 监护协议
B. 建设工程合同
C. 收养合同
D. 用人单位和劳动者之间的合同
【单选题】
下列选项中哪个合同不属于建设工程合同?___
A. 建筑工程勘察合同
B. 建筑工程施工合同
C. 建筑工程监理委托合同
D. 建筑工程施工总承包合同
【单选题】
有关建设工程的问题,如果合同法中没有专门规定的,可以适用以下哪类合同的规定?___
A. 买卖合同
B. 租赁合同
C. 技术合同
D. 承揽合同
【单选题】
下列关于建设工程合同的说法中正确的是?___
A. 无营业执照或无承包资质的单位不能作为建设工程合同的主体
B. 已经取得资质证书的承包人可以越级承包建设工程
C. 为了防止造价条款争议,可以不在建设工程合同约定工程造价条款
D. 可以通过合同约定的方式,排除适用法律强制性规定
【单选题】
无效合同自 时就没有法律约束力。___
A. 合同被确认无效
B. 一方当事人提出合同无效
C. 合同订立
D. 司法机关确认合同无效
【单选题】
下列关于合同解除的说法中,错误的是?___
A. 协议解除合同不需要双方当事人都具备相应的行为能力
B. 享有合同解除权的一方当事人,行使解除权无需经过对方当事人同意
C. 享有合同解除权的一方当事人,主张行使解除权解除合同的,合同自通知到达对方时解除
D. 合同解除以有效合同为前提,无效合同自始无效
【单选题】
关于合同解除,下列说法中表述错误的是?___
A. 不影响合同中仲裁条款的效力
B. 不影响当事人要求强制执行的效力
C. 不影响合同中结算条款的效力
D. 不影响合同中清理条款的效力
【单选题】
根据合同法及合同法解释,违约金超过造成损失的 的,认定为《合同法》第114条第2款规定的“过分高于造成的损失”。___
A. 30%
B. 40%
C. 50%
D. 60%
【单选题】
甲乙签订了一份价值30万元的销售合同,约定甲方须支付10万元定金。但乙在收取定金后违约,没有履行合同。按照法律规定,乙应当返还给甲多少万元?___
A. 5
B. 10
C. 20
D. 30
【单选题】
关于定金,下列说法中错误的是?___
A. 给付定金的一方不履行约定的债务的,无权要求返还定金
B. 定金最高为主合同标的额的20%,超过的部分,人民法院不予支持
C. “定金”与“订金”的性质、法律后果、数额限制不同
D. 定金应当以书面形式约定,定金合同自订立合同之日起生效
【单选题】
根据合同法的规定,当事人既约定违约金,又约定定金的,一方违约时,对方当事人应当如何对待违约金和定金条款?___
A. 可以选择适用违约金或者定金条款
B. 同时使用违约金和定金条款
C. 只能适用违约金条款
D. 只能适用定金条款
【单选题】
下列违约责任形式中,必须以实际发生损害为前提的是?___
A. 违约金
B. 定金
C. 损害赔偿金
D. 以上都是
【单选题】
关于损害赔偿金和违约金,下列说法中错误的是?___
A. 损害赔偿金分为法定损害赔偿金和约定损害赔偿金
B. 当事人一方不履行合同义务或者履行合同义务不符合约定,给对方造成损失的,损失赔偿额应当相当于因违约所造成的损失
C. 当事人根据合同法第114条第2款的规定,请求人民法院增加违约金的,增加后的违约金数额以不超过实际损失额为限。增加违约金以后,当事人又请求对方赔偿损失的,又请求对方赔偿损失的,人民法院予以支持
D. 损害赔偿的范围包括合同履行后可以获得的利益,但不得超过违反合同一方订立合同时预见到或者应当预见到的因违反合同可能造成的损失
【单选题】
关于场租合同中条款的设置和注意事项,下列说法中错误的是?___
A. 一般应当在合同中设置续约、解除和中止条款
B. 应当在合同中明确约定收款账户信息,如果在合同履行过程中发生账户信息变更的,可以单方变更该账户信息
C. 针对租赁物交付时间的问题,可以采取制作交付清单的方式,对租场交付情况进行确认
D. 在设置合同条款时,不可仅陈述一方义务,剥夺其享有的权利
【单选题】
签订场租合同时应当注意租赁物的权属问题。关于租赁物权属的审查,下列哪种说法是正确的?___
A. 在制作或是签署场租合同时,应当将权属情况写清楚,并将权属材料作为合同的附件
B. 当遇到对方无法提供产权证明或是权属证明文件的情况时,可以在合同中设置出租人承诺条款,如“……承诺其为……场租所有人或是有权处分人,如因权属产生纠纷,由……承担……的违约责任”等
C. 在设置承诺条款的同时,要求出租人出具所在地社区或是居委会或是村委会的相关证明,以证实其权属身份
D. 以上三项均正确
【多选题】
以下哪些属于建设工程合同审查的重点?___
A. 审查双方当事人是否具有实施法律行为的资格和能力
B. 审查是否违反法律强制性规定
C. 审查工程造价条款及支付条款
D. 审查工程期限条款
E. 审查违约责任条款
【多选题】
下列关于合同解除的说法中,哪些是正确的?___
A. 单方解除,是指解除权人行使解除权将合同解除的行为
B. 协议解除,是指当事人双方通过协商同意将合同解除的行为
C. 法定解除,是指根据法律规定解除合同
D. 约定解除,是指根据当事人的约定解除合同
【多选题】
根据合同法的规定,下列哪些情况下,允许当事人解除合同?___
A. 因不可抗力致使不能实现合同目的
B. 当事人一方迟延履行债务或者有其他违约行为致使不能实现合同目的
C. 在履行期限届满之前,当事人一方明确表示或者以自己的行为表明不履行主要债务
D. 当事人一方迟延履行主要债务,经催告后在合理期限内仍未履行
【多选题】
关于违约条款的设置,下列说法中哪些是正确的?___
A. 违约条款应与权利义务相呼应
B. 应当注意违约条款对合同双方的约束力,明白违约后果
C. 设置违约条款时,尽量约定具备实际可行性的违约后果
D. 切不可仅约定一方违约责任
【多选题】
下列选项中,哪些应当在场租合同里尽量予以设置?___
A. 征用与拆迁事项条款
B. 争议处理条款
C. 送达条款
D. 授权签署人条款
【判断题】
国家秘密是指关系国家安全和利益,依照法定程序确定,在一定时间内只限一定范围的人员知悉的事项。
A. 对
B. 错
【判断题】
一切国家机关、武装力量、政党、社会团体、企业事业单位和公民都有保守国家秘密的义务。
A. 对
B. 错
【判断题】
单位可以把知悉国家秘密作为一种行政级别待遇,按照行政级别确定国家秘密知悉范围。
A. 对
B. 错
【判断题】
国家秘密知悉范围内的机关、单位,其有关工作人员不在知悉范围内,但因工作需要知悉国家秘密的,应当经单位负责人批准。
A. 对
B. 错
【判断题】
国家秘密知悉范围之外的人员,因工作需要确需知悉国家秘密的,应当经本单位负责人同意。
A. 对
B. 错
【判断题】
单位负责人为本单位的定密责任人,对定密工作负总则。
A. 对
B. 错
【判断题】
单位对所产生的国家秘密事项,应当按照保密事项范围的规定确定密级,同时确定保密期限和知悉范围。
A. 对
B. 错
【判断题】
国家秘密变更后,原定密机关、单位应及时在原国家秘密标志附近重新做出国家秘密标志,并书面通知知悉范围内的机关、单位和人员。
A. 对
B. 错
【判断题】
单位对已定密事项是否属于国家秘密或者属于何种密级有不同意见的,不得向原定密机关、单位提出异议。
A. 对
B. 错
【判断题】
涉密岗位是指在日常工作中产生、经管或者经常接触、知悉国家秘密事项的岗位。
A. 对
B. 错
【判断题】
涉密人员在非涉密出版物上发表文章、著作,不得涉及国家秘密。
A. 对
B. 错