CCNA(640-553)真题精选.docx

上传人:w**** 文档编号:7294334 上传时间:2023-05-11 格式:DOCX 页数:31 大小:15.68KB
下载 相关 举报
CCNA(640-553)真题精选.docx_第1页
第1页 / 共31页
CCNA(640-553)真题精选.docx_第2页
第2页 / 共31页
CCNA(640-553)真题精选.docx_第3页
第3页 / 共31页
CCNA(640-553)真题精选.docx_第4页
第4页 / 共31页
CCNA(640-553)真题精选.docx_第5页
第5页 / 共31页
亲,该文档总共31页,到这儿已超出免费预览范围,如果喜欢就下载吧!
下载资源
资源描述

CCNA(640-553)真题精选.docx

《CCNA(640-553)真题精选.docx》由会员分享,可在线阅读,更多相关《CCNA(640-553)真题精选.docx(31页珍藏版)》请在冰点文库上搜索。

CCNA(640-553)真题精选.docx

CCNA(640-553)真题精选

  [单项选择题]

  1、Inabrute-forceattack,whatpercentageofmustanattackergenerallysearchthroughuntilfindsthekeythatdecryptsthedata?

()

  A.Roughly50percent

  B.Roughly66percent

  ActualT

  C.Roughly75percent

  D.Roughly10percent

  参考答案:

A

  thekeyspaceheorshe

  [单项选择题]

  2、Whichdescriptioniscorrectbasedontheexhibitandpartialconfiguration?

()

  A.Alltrafficdestinedfornetwork172.16.150.0willbedeniedduetotheimplicit

  denyall.

  B.Alltrafficfromnetwork10.0.0.0willbe

  permitted.

  C.Access-list101willpreventaddressspoofingfrominterfaceE0.

  D.ThisACLwillpreventanyhostontheInternetfromspoofingtheinsidenetworkaddressasthesourceaddressforpacketscomingintotherouterfromthe

  Internet.

  参考答案:

C[单项选择题]

  3、Whichdescriptionaboutasymmetricencryptionalgorithmsiscorrect?

()

  A.Theyusethesamekeyforencryptionanddecryptionof

  data.

  B.Theyusedifferentkeysfordecryptionbutthesamekeyforencryptionof

  data.

  C.Theyusedifferentkeysforencryptionanddecryptionof

  data.

  D.Theyusethesamekeyfordecryptionbutdifferentkeysforencryptionof

  data.

  参考答案:

C

  [单项选择题]

  4、Forthefollowingitems,whichmanagementtopologykeepsmanagementtrafficisolatedfrom

  ActualTproductiontraffic?

()

  A.OTP

  B.OOB

  C.SAFE

  D.MARS

  参考答案:

B

  [单项选择题]

  5、Youworkasanetworkengineer,doyouknowanIPsectunnelisnegotiatedwithintheprotectionofwhichtypeoftunnel?

()

  A.L2Ftunnel

  B.L2TPtunnel

  C.GREtunnel

  D.ISAKMPtunnel

  参考答案:

D

  [单项选择题]

  6、Examinethefollowingoptions,wheneditingglobalIPSsettings,whichonedeterminesiftheIOS-basedIPSfeaturewilldroporpermittrafficforaparticularIPSsignatureenginewhileanewsignatureforthatengineisbeingcompiled?

()

  A.EnableSignatureDefault

  B.EnableEngineFailClosed

  C.EnableDefaultIOSSignature

  ActualT

  D.EnableFailOpened

  参考答案:

B

  [单项选择题]

  7、WhichstatementbestdescribesCiscoIOSZone-BasedPolicyFirewall?

()

  A.Arouterinterfacecanbelongtomultiple

  zones.

  B.Policymapsareusedtoclassifytrafficintodifferenttrafficclasses,andclassmapsareusedtoassignactiontothetraffic

  classes.

  C.Thepassactionworksinonlyonedirection

  D.Azone-pairisbidirectionalbecauseitspecifiestrafficflowingamongtheinterfaceswithinthezone-pairinboth

  directions.

  参考答案:

C

  [单项选择题]

  8、WhichstatementbestdescribesconfiguringaccesscontrolliststocontrolTelnettrafficdestinedtotherouteritself?

()

  A.TheACLappliedtothevtylineshasnoinoroutoptionlikeACLbeingappliedtoan

  interface.

  B.TheACLisappliedtotheTelnetportwiththeipaccess-group

  command.

  C.TheACLmustbeappliedtoeachvtyline

  individually.

  D.TheACLshouldbeappliedtoallvtylinesintheindirectiontopreventanunwanteduserfromconnectingtoanunsecured

  port.

  参考答案:

D

  [单项选择题]

  9、WhatistheMD5algorithmusedfor?

()

  A.takesafixed-lengthmessageandproducesa128-bitmessagedigest

  B.takesavariable-lengthmessageandproducesa168-bitmessagedigest

  C.takesamessagelessthan2^64bitsasinputandproducesa160-bitmessage

  digestD.takesavariable-lengthmessageandproducesa128-bitmessagedigest

  ActualT

  参考答案:

D

  [单项选择题]

  10、Forthefollowingoptions,whichoneaccuratelymatchestheCLIcommand(s)totheequivalentSDMwizardthatperformssimilarconfigurationfunctions?

()

  A.aaaconfigurationcommandsandtheSDMBasicFirewallwizard

  B.setupexeccommandandtheSDMSecurityAuditwizard

  C.autosecureexeccommandandtheSDMOne-StepLockdownwizard

  D.CiscoCommonClassificationPolicyLanguageconfigurationcommandsandtheSDMSite-to-SiteVPN

  参考答案:

C

  11、Basedonthefollowingitems,whichtwotypesofinterfacesarefoundonallnetwork-basedIPSsensors?

()

  A.Loopbackinterface

  B.Commandandcontrolinterface

  C.Monitoringinterface

  D.Managementinterface

  参考答案:

B,C

  [单项选择题]

  12、Whichdescriptionistrueabouttheshowlogincommandoutputdisplayedintheexhibit?

()

  A.Threeormoreloginrequestshavefailedwithinthelast100

  seconds.

  B.Whentheroutergoesintoquietmode,anyhostispermittedtoaccesstherouterviaTelnet,actualSSH,andHTTP,sincethequiet-modeaccesslisthasnotbeen

  configured.

  C.Theloginblock-forcommandisconfiguredtoblockloginhostsfor93

  seconds.

  D.Allloginsfromanysourcesareblockedforanother193

  seconds.

  参考答案:

A

  13、Giventheexhibit

  below.Youareanetworkmanagerofyour

  company.YouarereadingyourSyslog

  serverreports.OnthebasisoftheSyslogmessageshown,whichtwodescriptionsarecorrect?

()

  A.Thisisanormalsystem-generatedinformationmessageanddoesnotrequirefurther

  investigation.

  B.Servicetimestampshavebeenglobally

  enabled.

  C.Thismessageisunimportantandcanbe

  ignored.

  D.Thismessageisalevel5notification

  message.

  参考答案:

B,D

  [单项选择题]

  14、WhatwillbeenabledbythescanningDynamicVectorStreaming(DVS)?

()

  A.Firmware-levelvirusdetection

  B.Signature-basedvirusfiltering

  C.Layer4virusdetection

  D.Signature-basedspywarefiltering

  参考答案:

D

  technology-The

  [单项选择题]

  15、WhichstatementbestdescribestherelationshipsbetweenAAAfunctionandTACACS+,RADIUSbasedontheexhibitshown?

()

  A.TACACS+-P4S1andP4S4RADIUS-P4S2andP4S3

  B.TACACS+-P4S2andP4S4RADIUS-P4S1andP4S3

  C.TACACS+-P4S1andP4S3ActualRADIUS-P4S2andP4S4

  D.TACACS+-P4S2andP4S3RADIUS-P4S1andP4S4

  参考答案:

B

  [单项选择题]

  16、Whichkindoftabletodaytokeeptrackof()

  A.reflexiveACL

  B.dynamicACL

  C.queuing

  D.netflow

  E.state

  参考答案:

E

  willbeusedbymostfirewallstheconnectionsthroughthefirewall?

  [单项选择题]

  17、Basedontheusernameglobalconfigurationmodecommanddisplayedinthe

  exhibit.Whatdoestheoptionsecret5indicateabouttheenablesecretpassword?

()

  A.ItishashedusingMD5

  B.Itisencryptedusingaproprietaryalgorithm

  C.ItishashedusingSHA

  D.ItisencryptedusingDHgroup5

  参考答案:

A

  Cisco

  encryption

  [单项选择题]

  18、BeforeaDiffie-Hellmanexchangemaybegin,thetwopartiesinvolvedmustagreeonwhat?

()

  A.Twosecretkeys

  B.Twononsecretkeys

  C.Twosecretnumbers

  D.Twononsecretnumbers

  参考答案:

D

  19、WhichthreeitemsareCiscobest-practicerecommendationsforsecuringanetwork?

()

  A.Routinelyapplypatchestooperatingsystemsandapplications

  B.Disableunneededservicesandportsonhosts

  C.DeployHIPSsoftwareonallend-userworkstations

  D.Requirestrongpasswordsandenablepasswordexpiration

  参考答案:

A,B,D

  [单项选择题]

  20、WhatCiscoSecurityAgentInterceptorisinchargeofinterceptingallread/writerequeststothercfilesinUNIX?

()

  A.Configurationinterceptor

  B.Networkinterceptor

  C.Filesysteminterceptor

  D.Executionspaceinterceptor

  参考答案:

A

  [单项选择题]

  21、WhichlocationwillberecommendedforextendedorextendednamedACLs?

()

  A.whenusingtheestablishedkeyword,alocationclosetothedestinationpointtoensurethatreturntrafficisallowed

  B.anintermediatelocationtofilterasmuchtrafficaspossible

  ActualT

  C.alocationasclosetothesourcetrafficaspossible

  D.alocationasclosetothedestinationtrafficaspossible

  参考答案:

C更多内容请访问《睦霖题库》微信公众号

  [单项选择题]

  22、RefertoCiscoIOSZone-BasedPolicyFirewall,willtheinspectionpolicybeapplied?

()

  A.tothezone-pair

  B.tothezone

  C.totheinterface

  D.totheglobalservicepolicy

  参考答案:

A

  where[单项选择题]

  23、Whichstatementistrueaboutvishing?

()

  A.Influencinguserstoforwardacalltoatollnumber(forexample,alongdistanceorinternationalnumber)

  B.Influencinguserstoprovidepersonalinformationoverawebpage

  C.Usinganinsidefacilitatortointentionallyforwardacalltoatollnumber(forexample,alongdistanceorinternationalnumber)

  D.Influencinguserstoprovidepersonalinformationoverthephone

  参考答案:

D

  [单项选择题]

  24、WhichoneofthefollowingitemsmaybeaddedtoapasswordstoredinMD5tomakeitmoresecure?

()

  A.Ciphertext

  B.Salt

  C.Cryptotext

  D.Rainbowtable

  参考答案:

B

  [单项选择题]

  25、Whichexampleisofafunctionintendedforcryptographichashing?

()

  A.MD65

  B.SHA-135

  C.XR12

  D.MD5

  参考答案:

D

  [单项选择题]

  26、Whichisthemaindifferencebetweenhost-basedandnetwork-basedintrusionprevention?

()

  A.Host-basedIPScanworkinpromiscuousmodeorinline

  mode.

  B.Network-basedIPScanprovideprotectiontodesktopsandserverswithouttheneedofinstallingspecializedsoftwareontheendhostsand

  servers.

  C.Network-basedIPSisbettersuitedforinspectionofSSLandTLSencrypteddata

  flows.

  D.Host-basedIPSdeploymentrequireslessplanningthannetwork-based

  IPS.

  参考答案:

B

  27、Whichclassesdoesthe

  U.S.governmentplaceclassifieddatainto?

()

  A.Top-secret

  B.Confidential

  C.SBU

  D.Secret

  参考答案:

A,B,D

  28、Whichthreeoptionsarenetworkevaluationtechniques?

()

  A.Performingend-usertrainingontheuseofantispywaresoftware

  B.Performingvirusscans

  C.ScanninganetworkforactiveIPaddressesandopenportsonthoseIPaddresses

  D.Usingpassword-crackingutilities

  参考答案:

B,C,D

  [单项选择题]

  29、Youareanetworktechnicianat

  C.WhichdescriptioniscorrectwhenyouhavegeneratedRSAkeysonyourCiscoroutertoprepareforsecuredevicemanagement?

()

  A.Youmustthenspecifythegeneral-purposekeysizeusedforauthenticationwiththecryptokeygeneratersageneralkeysmodulus

  command.

  B.Youmustthenzeroizethekeystoresetsecureshellbef

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 成人教育 > 成考

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2