【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
推荐试题
【单选题】
共产主义社会制度具有巨大优越性的根本保证是 ___
A. 社会制度的和谐完善
B. 创造出前所未有的高水平的劳动生产率
C. 人的精神境界极大提高
D. 科学技术的不断进步
【单选题】
阶级消灭和国家消亡的实现是在 ___
A. 社会主义革命中
B. 社会主义初级阶段
C. 社会主义高级阶段
D. 共产主义社会
【单选题】
共产主义社会的本质因素是 ___
A. 实现社会单一的公有制
B. 按需分配
C. 人的自由而全面发展
D. 劳动生产率的极大提高
【单选题】
社会主义和共产主义都存在的经济关系是 ___
A. 实行生产资料的社会公有制
B. 实行按劳分配原则
C. 实行按需分配原则
D. 实行商品经济、市场经济体制
【单选题】
在展望未来社会的问题上,马克思主义与空想社会主义的根本区别是 ___
A. 展望的内容是否正确
B. 展望的目的和动机是否正确
C. 有没有预见性
D. 立场、观点和方法是否科学
【单选题】
马克思主义展望未来社会的科学方法之一是 ___
A. 在科学预测的基础上指明社会发展的方向
B. 在科学预见的基础上指明社会发展的方向
C. 以科学类比的基础上指明社会发展的方向
D. 在揭示人类社会发展一般规律的基础上指明社会发展的方向
【单选题】
资本主义生产过程的二重性是指 ___
A. 生产使用价值的劳动过程和生产剩余价值的价值增殖过程
B. 转移价值的过程和创造价值的过程
C. 生产使用价值的劳动过程和生产价值的价值形成过程
D. 价值形成过程和价值增殖过程
【单选题】
分析资本主义生产过程是劳动过程和价值增殖过程的统一,关键是运用 ___
A. 商品二因素原理
B. 资本区分为不变资本和可变资本的原理
C. 资本区分为固定资本和流动资本的原理
D. 劳动二重性原理
【单选题】
价值增殖过程是超过一定点而延长了的价值形成过程,这里的“一定点”是指 ___
A. 工人补偿劳动力价值所需要的时间
B. 资本主义生产过程的起点
C. 剩余劳动时间的起点
D. 必要劳动时间的终点
【单选题】
在资本主义价值增殖过程中 ___
A. 具体劳动创造出新价值,抽象劳动转移生产资料价值
B. 抽象劳动创造出新的使用价值,具体劳动创造出新的价值
C. 具体劳动转移生产资料的价值,抽象劳动创造出大于劳动力价值的新价值
D. 具体劳动转移生产资料的价值,抽象劳动创造出相当于劳动力价值的新价值
【单选题】
在资本主义生产过程中,生产资料的价值 ___
A. 是逐渐消失的
B. 能发生价值增殖
C. 借助于具体劳动转移到新产品中去
D. 借助于抽象劳动而再生产出来
【单选题】
某资本家的全部预付资本为100万元,其中不变资本90万元,可变资本10万元,获得剩余价值10万元,其剩余价值率为 ___
A. 100%
B. 10%
C. 12.5%
D. 11.1%
【单选题】
加快资本周转可以增加年剩余价值量,提高年剩余价值率,是因为 ___
A. 预付的资本量增加了
B. 实际发挥作用的可变资本增加了
C. 流通对生产的反作用
D. 剩余价值率提高了
【单选题】
年剩余价值率表示 ___
A. 工人受剥削的程度
B. 预付资本的增殖程度
C. 预付流动资本的增殖程度
D. 预付可变资本的增殖程度
【单选题】
下列提法正确的是 ___
A. 只有空想社会主义思想家预见了未来社会
B. 只有马克思主义经典作家预见了未来社会
C. 只有唯心主义思想家预见了未来社会
D. 许多思想家都预见了未来社会
【单选题】
中华民族走向共产主义的必由之路是建设 ___
A. 发达的社会主义
B. 真正的社会主义
C. 民主的社会主义
D. 中国特色社会主义
【单选题】
树立和追求共产主义远大理想,要体现在积极投入建设中国特色社会主义事业的实际行动中,这应该是 ___
A. 大家都来做,大家一起做
B. 从我做起,从现在做起
C. 鼓励大家都来做
D. 号召大家一起做
【单选题】
某资本家经营的企业通过改进技术、提高劳动生产率,使其生产商品花费的劳动时间比社会必要劳动时间减少20%,由此,形成商品个别价值低于社会价值的部分是 ___
A. 超额剩余价值
B. 绝对剩余价值
C. 相对剩余价值
D. 剩余价值
【单选题】
美国采取权力制衡的组织形式,其中立法权属于 ___
A. 国会
B. 总统
C. 最高法院
D. 最高检察院
【单选题】
在现代,各国一般是由政党领导国家政权的,放弃执政党在国家中的领导地位,国家性质就要改变,这是因为 ___
A. 国家性质决定政党的性质
B. 执政党的性质决定国家性质
C. 一个国家的性质通常是与其执政党的阶级属性相一致的
D. 国家和政党在本质上是一回事
【单选题】
资本是一种运动,资本循环是从 ___
A. 资本运动的实现条件方面来研究资本的运动
B. 资本运动的矛盾性方面来研究资本的运动
C. 资本运动的连续性方面来研究资本的运动
D. 资本运动的速度方面来研究资本的运动
【单选题】
产业资本循环顺次采取的三种职能形式是 ___
A. 货币资本、生产资本、商品资本
B. 货币资本、商品资本、生产资本
C. 生产资本、货币资本、商品资本
D. 商品资本、生产资本、货币资本
【单选题】
产业资本的现实运动是 ___
A. 劳动过程与价值增殖过程的统一
B. 空间并存性与时间继起性的统一
C. 生产过程与流通过程的统一
D. 旧价值转移与新价值创造过程的统一
【单选题】
资本的周转速度 ___
A. 同周转时间成正比,与周转次数成反比
B. 同周转时间成正比,与周转次数成正比
C. 同周转时间成反比,与周转次数成反比
D. 同周转时间成反比,与周转次数成正比
【单选题】
生产资料中既属于不变资本又属于固定资本的是 ___
A. 设备
B. 燃料
C. 原料
D. 辅助材料
【单选题】
资本主义法制的核心是 ___
A. 民法
B. 宪法
C. 刑法
D. 行政法
【单选题】
资本主义经济危机的实质是 ___
A. 生产对于人们的需求绝对过剩
B. 生产对于人们的需求相对不足
C. 生产对于人们有支付能力的需求相对过剩
D. 生产对于人们的有支付能力的需求相对不足
【单选题】
资本主义工资的本质是 ___
A. 工人劳动的价格
B. 工人劳动的报酬
C. 劳动的价值或价格
D. 劳动力的价值或价格
【单选题】
资本主义工资之所以掩盖剥削,是由于它 ___
A. 表现为劳动的价值或价格
B. 是劳动力的价值或价格
C. 是劳动者必要劳动创造的价值
D. 是劳动力价值或价格的表现形式
【单选题】
平均利润是按 ___
A. 个部资本家人数平均分得的利润
B. 产业资本家人数平均分得的利润
C. 不同生产部门平均分得的利润
D. 平均利润率分得的利润
【单选题】
剩余价值转化为利润,是因为剩余价值被看作是 ___
A. 耗费的可变资本的增加额
B. 预付的不变资本的增加额
C. 预付的全部资本的增加额
D. 耗费的全部资本的增加额
【单选题】
剩余价值转化为利润掩盖了资本主义剥削关系,是因为 ___
A. m被视为不变资本的产物
B. m被视为所费资本的产物
C. m被视为全部预付资本的产物
D. m被视为成本价格的增加额
【单选题】
在资本主义条件下,部门之间的竞争形成 ___
A. 商品的价值
B. 商品的价格
C. 平均利润率
D. 剩余价值率
【单选题】
利润率反映了 ___
A. 工人受资本家剥削的程度
B. 资本家对工人的剥削程度
C. 预付资本价值的增殖程度
D. 可变资本的价值增殖程度
【单选题】
资本主义生产成本是按 ___
A. 全部劳动耗费计量的
B. 不变资本的耗费计量的
C. 活劳动的耗费计量的
D. 资本的耗费计量的
【单选题】
生产成本掩盖了资本主义的剥削,是因为抹杀了 ___
A. 不变资本和可变资本的区别
B. 固定资本和流动资本的区别
C. 劳动资料和劳动对象的区别
D. 劳动和劳动力的区别
【单选题】
剩余价值转化为利润,是由于将剩余价值看作是 ___
A. 不变资本的产物
B. 所费资本的产物
C. 全部预付资本的产物
D. 资本家“监督劳动”的产物
【单选题】
反映预付资本增殖程度的概念是 ___
A. 劳动生产率
B. 剩余价值率
C. 年剩余价值率
D. 利润率
【单选题】
部门之间竞争的手段是 ___
A. 改进技术
B. 价格竞争
C. 资本转移
D. 降低成本
【单选题】
超额利润指的是 ___
A. 商品价值与生产价格之间的差额
B. 商品价值与生产成本之间的差额
C. 个别生产价格与社会生产价格之间的差额
D. 垄断价格与社会生产价格之间的差额