【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
推荐试题
【判断题】
按照《商业银行授信工作尽职指引》规定,商业银行可对用途为从事股票、期货、金融衍生产品等投资的业务进行授信
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,商业银行对客户调查和客户资料的验证应以实地调查为主,间接调查为辅。必要时,可通过外部征信机构对客户资料的真实性进行核实
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,授信业务部门授信工作人员和授信管理部门授信工作人员任何一方需对客户资料进行补充时,须通知另外一方,但原则上须由授信管理部门授信工作人员办理
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,商业银行应对第二还款来源进行分析评价,确认保证人的保证主体资格和代偿能力,以及抵押、质押的合法性、充分性和可实现性
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,商业银行应根据客户偿还能力和现金流量,对客户授信进行调整,包括展期,增加或缩减授信,要求借款人提前还款,并决定是否将该笔授信列入观察名单或划入问题授信
A. 对
B. 错
【判断题】
按照《商业银行授信工作尽职指引》(银监发[2004]51号)规定,商业银行应支持授信工作尽职调查人员独立行使尽职调查职能,调查可采取现场或非现场的方式进行。必要时,可委托专业机构开展特定的授信尽职调查工作
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》的规定,商业银行持有的集团客户成员企业发行的公司债券、企业债券、短期融资券、中期票据等债券资产以及通过衍生产品等交易行为所产生的信用风险暴露不要纳入集团客户授信业务进行风险管理
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》的规定,根据审慎监管的要求,银行业监管机构不可调低单个商业银行单一集团客户授信余额与资本净额的比例
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》的规定,商业银行对跨国集团客户在境内机构授信时,除了要对其境内机构进行调查外,还要关注其境外公司的背景、信用评级、经营和财务、担保和重大诉讼等情况,并在调查报告中记录相关情况
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》,计算授信余额时,不应扣除客户提供的保证金存款及质押的银行存单和国债金额
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》,商业银行在给集团客户授信时,应当进行充分的资信尽职调查,要对照授信对象提供的资料,对重点内容或存在疑问的内容进行实地核查,并在授信调查报告中反映出来。调查人员应当对调查报告的真实性负责
A. 对
B. 错
【判断题】
根据《商业银行集团客户授信业务风险管理指引》,贷款对象出现重大兼并、收购重组等情况,贷款人认为可能影响到贷款安全的贷款人有权单方决定停止支付借款人尚未使用的贷款,并提前收回部分或全部贷款本息,并依法采取其他措施
A. 对
B. 错
【判断题】
根据审慎监管的要求,银行业监管机构不能调低单个商业银行单一集团客户授信余额与资本净额的比例
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》规定,商业银行给集团客户贷款时,贷款对象出现重大兼并、收购重组等情况,贷款人认为可能影响到贷款安全的,贷款人有权单方决定停止支付借款人尚未使用的贷款,并提前收回部分或全部贷款本息
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,在中华人民共和国境内依法设立的外商独资商业银行不适用指引要求
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,银行业监管机构根据审慎监管的要求可以调低单个商业银行单一集团客户授信余额与资本净额的比例
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,计算授信余额时,可扣除客户提供的保证金存款,但不可扣除客户质押的银行存单和国债金额
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,商业银行每两年应至少向银行业监督管理机构提交一次相关风险评估报告
A. 对
B. 错
【判断题】
按照《商业银行集团客户授信业务风险管理指引》(中国银监会令2010年第4号)规定,各商业银行之间应当加强合作,相互征询集团客户的资信时,应当按商业原则依法提供必要的信息和查询协助
A. 对
B. 错
【判断题】
根据《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》(银监办发[2014]40号)规定,商业银行应建立信贷人员专项考评体系,把防范违规放贷风险与个人薪酬等挂钩,职级变动不在挂钩范围
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,在贷款受理环节,为确保符合管理要求,可放宽客户准入资格审查
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,培育信贷合规文化包括:合规从高层做起、合规人人有责、合规创造价值
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,在贷款风险评价和审批阶段,为确保审批通过,可适当指导客户调整报表等相关信息
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,在贷款合同签订和发放阶段,为营销客户需要,允许先部分放款,再落实贷款条件
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,在贷后检查阶段,要加强对客户贷款使用的监督,及时跟踪客户经营状况,定期实地查看押品状态,严防贷款被挪用、资产被转移、担保被悬空
A. 对
B. 错
【判断题】
X银行为加强信贷流程控制,不断加强贷款精细化管理,重点关注客户还款意愿和第一还款来源,减少对抵质押品等第二还款来源的依赖。依据《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,该银行的上述行为,有效防止了银行信贷业务的“典当化”
A. 对
B. 错
【判断题】
2014年10月,X银行在对某分行信贷检查中发现一笔800万元的个人经营性贷款,该行分管信贷业务的副行长指使客户经理出具虚假调查报告,在贷款发放时提供虚假合同,2014年9月,该客户未按时归还贷款利息,并无法联系。依据《中国银监会办公厅关于加强信贷管理严禁违规放贷的通知》规定,总行对于该副行长予以记大过处分,并对其他参与放贷人员一并严肃处理
A. 对
B. 错
【判断题】
按照《中国银监会关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》规定,可以办理续贷的小微企业条件之一为,原流动资金周转贷款风险分类为关注以上,且符合新发放流动资金周转贷款条件和标准
A. 对
B. 错
【判断题】
按照《中国银监会关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》规定,银行业机构同意续贷的,应当在原流动资金周转贷款到期前与小微企业签订新的借款合同,需要担保的签订新的担保合同,落实借款条件,通过新发放贷款结清已有贷款等形式,允许小微企业继续使用贷款资金
A. 对
B. 错
【判断题】
按照《中国银监会关于进一步做好小微企业金融服务工作的指导意见》规定,对流动资金周转贷款到期后仍有融资需求,又临时存在资金困难的小微企业,经其主动申请,银行业金融机构可以提前按新发放贷款的要求开展贷款调查和评审
A. 对
B. 错
【判断题】
对生产经营正常,但存在贷款欠息的小微企业,大新银行可通过新发放贷款结清已有贷款等形式,允许企业继续使用贷款资金。根据《关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》,上述表述是否正确?
A. 对
B. 错
【判断题】
大新银行为生产经营回款周期超过一年的小微企业统一按常规流动资金贷款管理,将融资期限设定为一年。根据《关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》,这种做法是否正确?
A. 对
B. 错
【判断题】
对在贷后检查中发现改变续贷贷款用途的小微企业,大新银行应及时进行风险评估和风险预警,必要时提前收回贷款资金。根据《关于完善和创新小微企业贷款服务提高小微企业金融服务水平的通知》,上述表述是否正确?
A. 对
B. 错
【判断题】
按照《商业银行服务价格管理办法》的规定,商业银行服务价格均实行市场调节价
A. 对
B. 错
【判断题】
按照《商业银行服务价格管理办法》的规定,商业银行设立新的实行市场调节价的服务收费项目,应当至少实行前1个月按照本办法规定进行公示
A. 对
B. 错
【判断题】
除实行政府定价的服务价格以外,商业银行服务价格实行市场调节价
A. 对
B. 错
【判断题】
商业银行分支机构因地区性明显差异需要实行差别化服务价格的,应当由总行统一制定服务价格,并由总行按照本办法规定统一进行公示
A. 对
B. 错
【判断题】
商业银行制定和调整实行市场调节价的服务价格,应当合理测算各项服务支出,充分考虑风险因素进行综合决策
A. 对
B. 错
【判断题】
行业协会等自律组织应当在规范商业银行服务价格行为方面充分发挥监督指导作用
A. 对
B. 错
【判断题】
按照《中国银监会办公厅关于商业银行开展代理销售基金和保险产品相关业务风险提示的通知》规定,对于客户投诉较多的基金或保险产品,商业银行在未与设计产品的基金管理公司或保险公司沟通协商的情况下,可自行停止或拒绝与机构的合作
A. 对
B. 错