计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
不定项选择题9. If a DMVPN spoke router is configured with a point-to-point GRE interface, the spoke will only participate in which type of topology? 如果DMVPN分支路由器配置了点到点的GRE接口,那么该分支只能参与哪种类型的拓扑?
进入题库练习
不定项选择题1. The central processing unit of each device is tasked to not do which of these?设备CPU不具备以下哪种功能?
进入题库练习
不定项选择题19. Which of the following global services are disabled by the Auto Secure feature?启用Auto Secure后,以下哪些全局服务将被禁用?
进入题库练习
不定项选择题4. Which of the following are the main sections of the Security Control Framework?安全控制架构主要由以下哪些部分构成?
进入题库练习
不定项选择题23. Which of the following are valid steps required for the creation of an FPM filtering policy?以下属于创建FPM过滤策略的步骤?
进入题库练习
不定项选择题 The DTP state on a trunk port can be set to what
进入题库练习
不定项选择题6. What UDP ports are used by Cisco as the default authentication and accounting ports? Cisco ACS使用哪两种UDP端口作为默认的认证与结算端口?
进入题库练习
不定项选择题3. Which mechanism provides key management and transmission protection?以下哪项技术提供了密钥管理和传输保护的功能?
进入题库练习
不定项选择题5. DMVPNs can use pre-shared keys or PKI-based IKE authentication. Either choice is acceptable for a hub-and-spoke network, but which of the following is recommended for a fully meshed network? DMVPN支持使用预共享密钥或基于PKI的IKE认证。对于中心到分支模型的拓扑,这两种认证方法都是可接受的;但是对于全互连模型的拓扑,你应当优选使用以下哪项认证方法?
进入题库练习
不定项选择题15. Which of the following are valid EAP packet types?以下哪些是合法的EAP数据包类型?
进入题库练习
不定项选择题12. Which of the following type of password is used to secure SSH connections?以下哪种密码用于保护SSH连接的安全?
进入题库练习
不定项选择题10. Which of the following PVLAN edge ports is unable to communicate with other PVLAN edge ports?以下哪种PVE端口无法与其他PVE端口相互通信?
进入题库练习
不定项选择题9. What is the tool used to create the Cisco SSC configuration profile?哪种工具用于创建Cisco SSC配置文件?
进入题库练习
不定项选择题19. GET VPNs use which feature to provide large-scale transmission protection that uses the existing routing infrastructure? (Select all that apply.) GET VPN凭借以下哪些特性的支持,使得它能够在现有的路由基础设施上提供大规模的传输保护?(选择所有正确答案)
进入题库练习
不定项选择题 In a VTI-based IPsec VPN
进入题库练习
不定项选择题19. Which type of authentication should you use to make the implementation resistant to a man-in-the-middle attack?你应当使用哪种类型的认证来加强实施的安全性,从而有效地抵御中间人攻击?
进入题库练习
不定项选择题14. What is the minimum modulus(key size) that must be used to enable SSH version 2? SSH-2支持的最小模数(密钥尺寸)是多少?
进入题库练习
不定项选择题19. Which of the following parameter map types is used along with HTTP inspection? HTTP检测使用以下哪种参数图类型?
进入题库练习
不定项选择题23. To integrate PKI-based authentication with site-to-site VPNs,which protocol must be configured to use PKI-based authentication?为了整合基于PKI的认证与站点到站点VPN,你必须配置以下哪项协议来使用基于PKI的认证?
进入题库练习
不定项选择题20. Which of the following are some of the most common types of routed data planeattacks?以下哪些属于最常见的路由式数据面攻击?
进入题库练习