【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
推荐试题
【单选题】
当净化水不合格时,应将净化水___。
A. 排至供排水
B. 不排出塔
C. 排至原料水A罐
D. 排至原料水B罐
【单选题】
下列哪项不属于氨的性质___。
A. 比空气轻
B. 易溶于水
C. 无色气体
D. 有臭鸡蛋气味
【单选题】
溶剂II系列贫液出装置的温度是___。
A. 40℃
B. 50℃
C. 55℃
D. 以上都不对
【单选题】
酸性气采样时,操作工应站在___。
A. 上风口
B. 下风口
C. 脱水阀门上
D. 无所谓
【单选题】
氨精制塔顶安全阀跳闸后氨气是排去___的。
A. 原料水罐
B. 放空
C. 低低压放空
D. 以上都不对
【单选题】
大量氨存在硫磺生产中将导致下列后果___。
A. 产生黑硫磺
B. 无影响
C. 可使催化剂硫酸盐化
D. 管线铵盐结晶
【单选题】
硫磺在150度时呈___。
A. 黄色
B. 棕红色
C. 橙黄色
D. 无色
【单选题】
以下哪项不是硫封罐的作用___。
A. 防止气体从液硫线进液硫池
B. 保护风机
C. 不使装置憋压
D. 提高操作压力
【单选题】
烘炉曲线中一般120℃时候稳定时间较长,主要是为了脱除___。
A. 衬里的游离水
B. 瓦斯气中的游离水
C. 衬里的结晶水
D. 酸性气中游离水
【单选题】
装置停工吹扫蒸塔以后,塔的蒸汽线不能加盲板,主要是因为___。
A. 停工后没必要加盲板
B. 防止硫化亚铁自燃
C. 防止氮气泄漏
D. 防止蒸汽管道冷凝
【单选题】
在蒸汽管道投用时首先要进行___操作。
A. 加热
B. 冷却
C. 小流量暖管
D. 大流量暖管
【单选题】
硫磺催化剂装填时应在反应器内先装___。
A. 催化剂
B. 瓷球
C. 格栅
D. 不锈钢丝网
【单选题】
三级硫冷凝器采用双壳程结构,其中第一段发生 0.45MPa 低压蒸汽,第二段产生的乏汽经空冷器冷却后,凝结水去___使用。
A. 一级硫冷器
B. 二级硫冷器
C. 凝结水罐
D. 三级硫冷器
【单选题】
在硫冷凝器里气态硫的液化反应,错误的是___。
A. S8(气)→8S1(液)
B. S6(气)→6S1(液)
C. S4(气)→2S1(液)
D. S2(气)→2S1(液)
【单选题】
再生酸性气的主要成分是___。
A. 硫化氢、氨
B. 硫化氢、二氧化硫
C. 硫化氢、二氧化碳
D. 硫化氢、烃
【单选题】
硫磺装置设置排污点的作用是___。
A. 降低硫腐蚀
B. 提高液硫流动性
C. 降低硫分压
D. 防止管道堵塞
【单选题】
制硫装置停工时,需对催化剂进行热浸泡,其目的是除去催化剂上的___。
A. 硫酸盐
B. 积炭
C. 粉尘
D. 积硫
【单选题】
安全阀的开启压力是指___
A. 安全阀的定压
B. 安全阀达到最大泄放能力的压力
C. 设备的最高操作压力
D. 设备的操作压力
【单选题】
过程气管线伴热主要作用正确的是___。
A. 增加管内流动速度
B. 增加管内气化率
C. 防止过程气中水蒸汽冷凝
D. 防止过程气中硫蒸汽的冷却凝固
【单选题】
对于带气动阀门定位器的调节阀校准时,输入 ___来进行校准的。
A. 电信号
B. 电流信号
C. 流量信号
D. 压力信号
【单选题】
对于带电动阀门定位器的调节阀校准时,输入___来进行校准的。
A. 电信号
B. 电流信号
C. 流量信号
D. 压力信号
【单选题】
N-甲基二乙醇胺是一种___液体。
A. 淡蓝色
B. 淡黄色
C. 棕红色
D. 黑色
【单选题】
MDEA被氧化后,溶液颜色会呈___。
A. 淡蓝色
B. 淡黄色
C. 褐色
D. 黑色
【单选题】
蒸汽抽空器的作用是___。
A. 增大蒸汽流速
B. 提高管内压力
C. 提高管内流体温度
D. 形成真空
【单选题】
使用蒸汽抽空器时,应先___。
A. 开抽空器进口阀
B. 关抽空器出口阀
C. 开抽空器副线阀
D. 开抽空器蒸汽阀
【单选题】
蒸汽抽空器排出气体的压力比吸入口的压力___。
A. 高
B. 低
C. 一样
D. 不能确定
【单选题】
尾气焚烧炉点炉失败后用___吹扫后再重新点炉。
A. 蒸汽
B. 空气
C. 氮气
D. 无需吹扫
【单选题】
装置开车操作中引瓦斯烘炉中酸性气燃烧炉配风原则是___。
A. 瓦斯过剩,保证不完全燃烧
B. 保持燃烧炉温度大于800℃
C. 风和瓦斯按当量燃烧配比
D. 风过量,保证瓦斯完全燃烧
【单选题】
装置正常生产中酸性气燃烧炉配风比调节原则正确的是___。
A. 保持配风比恒定在2.1
B. 保证完全燃烧
C. 根据燃烧炉炉温调节
D. 保证过程气中硫化氢和二氧化硫含量比在2左右
【单选题】
装置正常生产中尾气焚烧炉配风比调节原则正确的是___。
A. 保持配风比在18左右
B. 保证完全燃烧
C. 根据焚烧炉炉温调节
D. 保证尾气中硫化氢和二氧化硫含量比在2左右
【单选题】
酸性气燃烧炉内进行的反应在___时间内基本完成。
A. 1秒
B. 4秒
C. 6秒
D. 9秒
【单选题】
在酸性水燃烧炉中,氨参与反应后的产物主要是___。
A. 一氧化氮和水
B. 氮气和水
C. 二氧化氮和水
D. 氮气和氢气
【单选题】
酸性气浓度低,装置的能耗将___。
A. 上升
B. 下降
C. 基本不变
D. 上升下降都有可能
【单选题】
酸性气燃烧炉烧氨不完全的危害是___。
A. 造成设备腐蚀
B. 造成设备管道结盐堵塞
C. 有爆炸危险
D. 硫磺质量不合格
【单选题】
液硫池气相部分安装温度计是为了防止硫磺___。
A. 燃烧
B. 中毒
C. 爆炸
D. 凝固。
【单选题】
检查运行装置中有无硫化氢气体泄漏,一般用___。
A. PH试纸
B. 鼻子闻气味
C. 湿润的硝酸铅试纸
D. 便携式H2S报警仪
【单选题】
液硫在___时流动性最好。
A. 130-160℃
B. 172±2℃
C. 170±2℃
D. 160±2℃
【单选题】
催化剂中毒有___两种情况。
A. 短期性和长期性
B. 短期性和暂时性
C. 暂时性和永久性
D. 暂时性和长期性
【单选题】
催化剂具有___特性。
A. 改变反应速度。
B. 改变化学平衡。
C. 既改变反应速度又改变化学平衡
D. 反应速度和化学平衡均不改变,只改变反应途径。
【单选题】
硫化氢在过量空气中燃烧时其生成物为___。
A. COS
B. SO2
C. S
D. SO3