【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
推荐试题
【判断题】
直流调速装置安装前应仔细检查主电源电压、电枢电压和电流额定值、磁场电压和电流额定值与控制器所提供是否一致;检查电动机铭牌数据是否与控制器相配
A. 对
B. 错
【判断题】
电压电流双环系统接线时,应尽可能将电动机的电枢端子与调速器输出连线短一些
A. 对
B. 错
【判断题】
调节电枢端电压并适当调节励磁电流,可以使直流电动机在宽范围内平滑地调速
A. 对
B. 错
【判断题】
交流测速发电机不能判别旋转方向
A. 对
B. 错
【判断题】
交流测速发电机有异步式和同步式两类,应用较为广泛的是异步测速发电机
A. 对
B. 错
【判断题】
异步测速发电机的杯形转子是由铁磁材料制成,当转子不转时,励磁后由杯形转子电流产生的磁场与输出绕组轴线垂直,因此输出绕组中的感应电动势一定为零
A. 对
B. 错
【判断题】
步进电动机空载连续运转后,调节并降低脉冲频率,直至步进电动机声音异常或出现转子来回偏摆,即为步进电动机的振荡状态
A. 对
B. 错
【判断题】
在计算解答系统中,为了满足误差小、剩余电压低的要求,交流同步测速发电机往往带有温度补偿及剩余电压补偿电路
A. 对
B. 错
【判断题】
电动机与变频器的安全接地必须符合电力规范,接地电阻小于4Ω
A. 对
B. 错
【判断题】
变频器主电路逆变桥功率模块中每个IGBT与一个普通二极管反并联
A. 对
B. 错
【判断题】
合理设定与选择保护功能,可使变频调速系统长期安全可靠使用,减少故障发生。保护功能可分软件保护和硬件保护两大类。硬件保护可用软件保护来替代
A. 对
B. 错
【判断题】
变频器调试应遵循“先空载、轻载、后重载”的规律
A. 对
B. 错
【判断题】
变频器由微处理器控制,可以实现过电压/欠电压保护、过热保护、接地故障保护、短路保护、电动机过热保护等
A. 对
B. 错
【判断题】
变频器的参数设置不正确,参数不匹配,会导致变频器不工作、不能正常工作或频繁发生保护动作甚至损坏
A. 对
B. 错
【判断题】
轻载启动时,变频器跳闸的原因是变频器输出电流过大引起的
A. 对
B. 错
【判断题】
当出现参数设置类故障时,可根据故障代码或说明书进行修改,也可以恢复出厂值重新设置
A. 对
B. 错
【判断题】
变频器出厂时设置的默认参数能直接工作,所以用户可不用更改设置
A. 对
B. 错
【判断题】
变频器利用增加输出电流来提高电动机转矩的方法,称为转矩补偿法
A. 对
B. 错
【判断题】
变压器是根据电磁感应原理而工作的,它能改变交流电压和直流电压
A. 对
B. 错
【判断题】
步进电动机的主要特点是能实现精确定位,精确位移且无积累误差
A. 对
B. 错
【判断题】
步进电动机的驱动电源有运动控制器(卡)、脉冲分配器和功率驱动级组成
A. 对
B. 错
【判断题】
步进电动机单三拍运行方式,由于是单相通电励磁,不会产生阻尼作用,因此工作在低频区时,由于通电时间过长而使能量损耗过大,易产生失步现象
A. 对
B. 错
【判断题】
步进电动机是一种由电脉冲控制的特殊异步电动机,其作用是将电脉冲信号变换为相应的角位移或线位移
A. 对
B. 错
【判断题】
步进电动机绕组两端并联的续流二极管开路,会使功率开关管击穿
A. 对
B. 错
【判断题】
步进电动机的选用应注意根据系统的特点选用步进电动机的类型,转矩足够大,以便带动负载,合适的步距角,合适的精度,根据编程的需要选择脉冲信号的频率
A. 对
B. 错
【判断题】
步进电动机的拍数齿数越多,步距角6.就越小,精度越高;在脉冲频率一定时,转速亦越低
A. 对
B. 错
【判断题】
在直流电动机启动时不加励磁,电动机无法转动,不会飞车,电动机是安全的
A. 对
B. 错
【判断题】
转速电流双闭环直流调速系统,一开机ACR立刻限幅,电动机速度达到最大值,或电动机忽转忽停出现振荡,其原因可能是有电路接触不良问题
A. 对
B. 错
【判断题】
在直流电动机启动时,不加励磁会使电动机因电枢电流严重过载而烧毁
A. 对
B. 错
【判断题】
在直流电动机轻载运行时,失去励磁会出现停车故障
A. 对
B. 错
【判断题】
转速电流双闭环系统中ASR输出限幅值选取的主要依据是允许的最大电枢启动电流
A. 对
B. 错
【判断题】
合理设定与选择保护功能,是变频调速系统长期安全可靠使用、减少故障发生的功能。保护功能可分软件保护和硬件保护两大类。硬件保护可用软件保护代替
A. 对
B. 错
【判断题】
新购进的变频器已有默认参数设置,一般不用修改就可直接便用
A. 对
B. 错
【判断题】
当出现参数设置类故障时,可以根据故障代码或说明书进行修改,也可以恢复出厂值,重新设置
A. 对
B. 错
【判断题】
西门子MM420要访问和修改参数时,首先要确定参数所属的类别和层级
A. 对
B. 错
【判断题】
轻载启动时变频器跳闸的原因是变频器输出电流过大
A. 对
B. 错
【判断题】
当变频器发生故障时,操作面板上的LCD液晶显示屏上会显示对应故障代码
A. 对
B. 错
【判断题】
交流变频调速系统设计应熟悉传动系统的生产过程、负载机械特性及电动机功率和转矩特性等
A. 对
B. 错
【判断题】
一般来说,对启动转矩小于60%额定转矩的负载,宜采用软启动器
A. 对
B. 错
【判断题】
软启动器具有完善的保护功能,并可自我修复部分故障
A. 对
B. 错