计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
Cisco(思科)
微软认证
IBM
Lotus
Sun
OCA
Cisco(思科)
Adobe
HP
Linux
CIW
JAVA
Red Hat
华为认证
北大青鸟ACCP认证
印度NIIT认证
(ISC)²注册信息系统安全专家(CISSP)认证
布线测试认证工程师培训考试(CCTT)
趋势科技认证信息安全专家(TSCP)
OCP
OCM
不定项选择题6. What UDP ports are used by Cisco as the default authentication and accounting ports? Cisco ACS使用哪两种UDP端口作为默认的认证与结算端口?
进入题库练习
不定项选择题3. Which mechanism provides key management and transmission protection?以下哪项技术提供了密钥管理和传输保护的功能?
进入题库练习
不定项选择题5. DMVPNs can use pre-shared keys or PKI-based IKE authentication. Either choice is acceptable for a hub-and-spoke network, but which of the following is recommended for a fully meshed network? DMVPN支持使用预共享密钥或基于PKI的IKE认证。对于中心到分支模型的拓扑,这两种认证方法都是可接受的;但是对于全互连模型的拓扑,你应当优选使用以下哪项认证方法?
进入题库练习
不定项选择题15. Which of the following are valid EAP packet types?以下哪些是合法的EAP数据包类型?
进入题库练习
不定项选择题12. Which of the following type of password is used to secure SSH connections?以下哪种密码用于保护SSH连接的安全?
进入题库练习
不定项选择题10. Which of the following PVLAN edge ports is unable to communicate with other PVLAN edge ports?以下哪种PVE端口无法与其他PVE端口相互通信?
进入题库练习
不定项选择题9. What is the tool used to create the Cisco SSC configuration profile?哪种工具用于创建Cisco SSC配置文件?
进入题库练习
不定项选择题19. GET VPNs use which feature to provide large-scale transmission protection that uses the existing routing infrastructure? (Select all that apply.) GET VPN凭借以下哪些特性的支持,使得它能够在现有的路由基础设施上提供大规模的传输保护?(选择所有正确答案)
进入题库练习
不定项选择题 In a VTI-based IPsec VPN
进入题库练习
不定项选择题19. Which type of authentication should you use to make the implementation resistant to a man-in-the-middle attack?你应当使用哪种类型的认证来加强实施的安全性,从而有效地抵御中间人攻击?
进入题库练习
不定项选择题14. What is the minimum modulus(key size) that must be used to enable SSH version 2? SSH-2支持的最小模数(密钥尺寸)是多少?
进入题库练习
不定项选择题19. Which of the following parameter map types is used along with HTTP inspection? HTTP检测使用以下哪种参数图类型?
进入题库练习
不定项选择题23. To integrate PKI-based authentication with site-to-site VPNs,which protocol must be configured to use PKI-based authentication?为了整合基于PKI的认证与站点到站点VPN,你必须配置以下哪项协议来使用基于PKI的认证?
进入题库练习
不定项选择题20. Which of the following are some of the most common types of routed data planeattacks?以下哪些属于最常见的路由式数据面攻击?
进入题库练习
不定项选择题7. Which features of Cisco IOS Software enable you to mitigate STP manipulation?以下哪条命令用于降低STP欺骗攻击造成的危害?
进入题库练习
不定项选择题16. which of the following are valid configurable 802.1X port states?以下哪些是合法的802.1X端口状态?
进入题库练习
不定项选择题23. What are the two areas to investigate when troubleshooting VPNs?当对VPN进行故障排除时,需要重点留意的两个区域是?
进入题库练习
不定项选择题18. Which of the following protocols are supposed by MPP? MPP支持以下哪些协议?
进入题库练习
不定项选择题21. Which of the following is something that can cause issues in a PKI system?在PKI体系中,以下哪项可能会引起故障的发生?
进入题库练习
不定项选择题9. Which of the following are valid design blueprints defined in SAFE?以下哪些属于SAFE架构定义的设计蓝图?
进入题库练习