CCNP&CCIE Security SCOR思科认证网络工程师题库2.docx
-
资源ID:705179
资源大小:37.30KB
全文页数:21页
- 资源格式: DOCX
下载积分:5金币
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
|
CCNP&CCIE Security SCOR思科认证网络工程师题库2.docx
CCNP/CCIESecuritySCOR题库2QUESTION51AnengineerneedsasolutionforTACACS+authenticationandauthorizationfordeviceadministration.Theengineeralsowantstoenhancewiredandwirelessnetworksecuritybyrequiringusersandendpointstouse802.1X,MAB1orWebAuth.Whichproductmeetsalloftheserequirements?A. CiscoPrimeInfrastructureB. CiscoIdentityServicesEngineC. CiscoStealthwatchD. CiscoAMPforEndpointsCorrectAnswer:BSection:(none)ExplanationExpIanationZReference:QUESTION52Whenwired802,IXauthenticationisimplemented,whichtwocomponentsarerequired?(Choosetwo.)A. authenticationserver:CiscoIdentityServiceEngineB. supplicant:CiscoAnyConnectISEPosturemoduleC. authenticator:CiscoCatalystswitchD. authenticator:CiscoIdentityServicesEngineE. authenticationserver:CiscoPrimeInfrastructureCorrectAnSWe匚ACSection:(none)ExplanationExpIanationZReference:Reference:QUESTION53TheCiscoASAmustsupportTLSproxyforencryptedCiscoUrdfiedCommunicationstraffic.WheremusttheASAbeaddedontheCiscoUCManagerplatform?A.CertificateTrustListB. EndpointTrustListC. EnterpriseProxyServiceD. SecuredCollaborationProxyCorrectAnswer:ASection:(none)ExplanationExpIanationZReference:Reference:QUESTION54WhichAPIisusedforContentSecurity?A. NX-OSAPIB. IOSXRAPIC. OpenVuInAPID. AsyncOSAPICorrectAnSWe匚DSection:(none)ExplanationExpIanationZReference:Reference:-0/api/b_SMA_API_12/test_chapter_01.htmlQUESTION55Whichtwobehavioralpatternscharacterizeapingofdeathattack?(Choosetwo.)A. Theattackisfragmentedintogroupsof16octetsbeforetransmission.B. Theattackisfragmentedintogroupsof8octetsbeforetransmission.C. ShortsynchronizedburstsoftrafficareusedtodisruptTCPconnections.D. Malformedpacketsareusedtocrashsystems.E. PubliclyaccessibleDNSserversaretypicallyusedtoexecutetheattack.CorrectAnswer:BDSection:(none)ExplanationExpIanationZReference:Reference:https:/en.wikipedia.org/wiki/Ping_of_deathQUESTION56Whichtwomechanismsareusedtocontrolphishingattacks?(Choosetwo.)A. Enablebrowseralertsforfraudulentwebsites.B. Definesecuritygroupmemberships.C. RevokeexpiredCRLofthewebsites.D. Useantispywaresoftware.E. Implementemailfilteringtechniques.CorrectAnswer:AESection:(none)ExplanationExplanation/Reference:QUESTION57WhichVPNtechnologycansupportamultivendorenvironmentandsecuretrafficbetweensites?A. SSLVPNB. GETVPNC. FIexVPND. DMVPNCorrectAnswer:CSection:(none)ExplanationExpIanationZReference:Reference:QUESTION58WhichSNMPv3configurationmustbeusedtosupportthestrongestsecuritypossible?A.asa-host(config)smp-servergroupmyv3v3privasa-host(config)smp-serveruserandymyv3authshaciscoprivdesciscXXXXXXXXasa-host(cofig)#snmp-serverhostinside10.255.254.1version3andyB. asa-host(config)#snmp-servergroupmyv3v3noauthasa-host(config)snmp-serveruserandymyv3authshaciscoprivaes256ciscXXXXXXXXasa-host(config)#SnmP-SerVerhostinside10,255.254.1version3andyC. asa-host(config)#snmp-servergroupmyv3v3noauthasa-host(config)snmp-serveruserandymyv3authshaciscopriv3desciscXXXXXXXXasa-host(config)#snmp-serverhostinside10.255.254.1version3andyD. asa-host(cofig)snmp-servergroupmyv3v3privasa-host(config)#snmp-serveruserandymyv3authshaciscoprivaes256ciscXXXXXXXXasa-host(config)#snmp-serverhostinside10,255.254.1version3andyCorrectAnswer:DSection:(none)ExplanationExpIanationZReference:QUESTION59WhichfeatureissupportedwhendeployingCiscoASAvwithinAWSpubliccloud?A. multiplecontextmodeB. userdeploymentofLayer3networksC. IPv6D. clusteringCorrectAnswer:BSection:(none)ExplanationExpIanationZReference:Reference:QUESTION60WhichproxymodemustbeusedonCiscoWSAtoredirectTCPtrafficwithWCCP?A. transparentB. redirectionC. forwardD. proxygatewayCorrectAnswer:ASection:(none)ExplanationExpIanationZReference:Reference:QUESTION61AnMDMprovideswhichtwoadvantagestoanorganizationwithregardstodevicemanagement?(Choosetwo.)A. assetinventorymanagementB. allowedapplicationmanagementC. ActiveDirectorygrouppolicymanagementD. networkdevicemanagementE. criticaldevicemanagementCorrectAnswer:ABSection:(none)ExplanationExpIanationZReference:QUESTION62WhichTalosreputationcenterallowsyoutotrackthereputationofIPaddressesforemailandwebtraffic?A. IPBlacklistCenterB. FileReputationCenterC. AMPReputationCenterD. IPandDomainReputationCenterCorrectAnswer:DSection:(n