计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
不定项选择题 Which network security element, if attacked
进入题库练习
不定项选择题 By default
进入题库练习
不定项选择题4. Which network topology is in use when every network has a direct VPN connection to every other network? This topology provides any—to—any communication and provides the most optimal direct path for network traffic. 拓扑结构判断:每个网络通过VPN与其他网络直接相连,这种拓扑能实现所有网络之间的通信,并提供最佳的数据传输路径。
进入题库练习
不定项选择题2. Which of the following attack types describes when an attacker tries to take over the root bridge functionality on a network?攻击者试图取代网络中的合法根桥属于哪种攻击?
进入题库练习
不定项选择题 If a license on a router expires
进入题库练习
不定项选择题9. What security mechanism works by creating a hash that is then transmitted to verify authenticity?哪种安全机制使用散列函数验证通信双方的身份?
进入题库练习
不定项选择题1. What is the default inactivity expire time period on a Cisco Catalyst switch CAM table? Cisco Catalyst交换机CAM表的默认老化时间为:
进入题库练习
不定项选择题25. What event might lead to several independent groups of key servers rekeying group members with different session keys?以下哪种情况可能导致本应协同工作的密钥服务器分离为多个独立的组,并使用不同的会话密钥对组成员进行密钥更新?
进入题库练习
不定项选择题7. Which of the following can be used as an alternative name for Port Address Translation?端口地址转换又被称为:
进入题库练习
不定项选择题 Which 802
进入题库练习
不定项选择题8. What is the default translation timeout when using dynamic NAT?动态NAT的默认转换条目有效期是多少?
进入题库练习
不定项选择题 In EAP-TLS implementations
进入题库练习
不定项选择题14. Which of the following are considered to be intruders on a computer system?以下哪类人群属于计算机系统的入侵者?
进入题库练习
不定项选择题11. Which of the following is a framework defined by the IEEE 802.1 working group that provides a standard data link layer protocol for port-based access control and authentication? IEEE 802.1工作组制定了一种工作在数据链路层、基于端口的访问控制与认证协议。这种协议是:
进入题库练习
不定项选择题16. Which of the following are valid inspect policy map actions?以下哪些属于合法的检测型策略图行为?
进入题库练习
不定项选择题10. What is assigned to the client as it connects in full tunnel mode?当客户端使用完全隧道模式连接时,SSL VPN网关会为客户端分配?
进入题库练习
不定项选择题5. Which of the following traffic is classified as always destined for the control plane?以下哪种流量的目的地总是控制面?
进入题库练习
不定项选择题10. The Context-Based Access Control (CBAC) applies policies using which of the following?基于上下文的访问控制(CBAC)采用以下哪些策略?
进入题库练习
不定项选择题3. Which command enables port security on an interface?以下哪条命令用于启用端口安全?
进入题库练习
不定项选择题22. What issue is mitigated by using certificate-based, rather than group password-based, EZVPN implementations?在EZVPN的实施中,使用基于证书的认证比使用基于组密码的认证能够更好地抵御哪种攻击?
进入题库练习