网友您好, 请在下方输入框内输入要搜索的题目:
Considering alternate suppliers is a form. of _____.
A.Value engineering.
B.Risk Analysis
C.Contract Management
D.Project integration
E.All of the above.
A
40 Considering alternate suppliers is a form. of _____.
A. Value engineering.
B. Risk Analysis
C. Contract Management
D. Project integration
E. All of the above
A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
B. A single interface may be assigned multiple IPv6 addresses of any type.
C. Every IPv6 interface contains at least one loopback address.
D. The first 64 bits represent the dynamically created interface ID.
E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
A.There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
B.A single interface may be assigned multiple IPv6 addresses of any type.
C.Every IPv6 interface contains at least one loopback address.
D.The first 64 bits represent the dynamically created interface ID.
E.Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
Which two of these statements are true of IPv6 address representation? ()
- A、There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
- B、A single interface may be assigned multiple IPv6 addresses of any type.
- C、Every IPv6 interface contains at least one loopback address.
- D、The first 64 bits represent the dynamically created interface ID.
- E、Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
正确答案:B,C
CCNP/CCIE SecuritySCOR思科网络工程师题库1Q1.In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A. SmurfB. distributed denial of serviceC. cross-site scriptingD. rootkit exploit Answer: C Explanation:Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, instant message, or simply just reading a web board or email message.Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on. For example the code below is written in hex:Click Hereis equivalent to:Click HereNote: In the format &#xhhhh, hhhh is the code point in hexadecimal form.Q2.Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A. user input validation in a web page or web applicationB. Linux and Windows operating systemsC. databaseD. web page images Answer: A Explanation:SQL injection usually occurs when you ask a user for input, like their username/userid, but the user gives (injects) you an SQL statement that you will unknowingly run on your database. For example:Look at the following example, which creates a SELECT statement by adding a variable (txtUserId) to a select string.The variable is fetched from user input (getRequestString):txtUserId = getRequestString(UserId);txtSQL = SELECT * FROM Users WHERE UserId = + txtUserId; If user enter something like this: 100 OR 1=1 then the SQL statement will look like this:SELECT * FROM Users WHERE UserId = 100 OR 1=1;The SQL above is valid and will return ALL rows from the Users table, since OR 1=1 is always TRUE. A hacker might get access to all the user names and passwords in this database.Q3.Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A. Check integer, float, or Boolean string parameters to ensure accurate values.B. Use prepared statements and parameterized queries.C. Secure the connection between the web and the app tier.D. Write SQL code instead of using object-relational mapping libraries.E. Block SQL code execution in the web application database login. Answer: ABQ4.Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A. Patch for cross-site scripting.B. Perform backups to the private cloud.C. Protect against input validation and character escapes in the endpoint.D. Install a spam and virus email filter.E. Protect systems with an up-to-date antimalware program. Answer: DEExplanation:Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victims machine.Q5.Which two mechanisms are used to control phishing attacks? (Choose two)A. Enable browser alerts for fraudulent websites.B. Define security group memberships.C. Revoke expired CRL of the websites.D. Use antispyware software.E. Implement email filtering techniques. Answer: AEQ6.Which two behavioral patterns characterize a ping of death attack? (Choose two)A. The attack is fragmented into groups of 16 octets before transmission.B. The attack is fragmented into groups of 8 octets before transmission.C. Short synchronized bursts of traffic are used to disrupt TCP connections.D. Malformed packets are used to crash systems.E. Publicly accessible DNS servers are typically used to execute the attack. Answer: BDExplanation:Ping of Death (PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.A correctly-formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered, and 84 including Internet Protocol version 4 header. However, any IPv4 packet (including pings) may be as large as 65,535 bytes. Some computer systems were never designed to properly handle a ping packet larger than the maximum packet size because it violates the Internet Protocol documented Like other large but well-formed packets, a ping of death is fragmented into groups of 8 octets before transmission. However, when the target computer reassembles the malformed packet, a buff
Which two of these statements are true of IPv6 address representation? ()
- A、There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
- B、A single interface may be assigned multiple IPv6 addresses of any type.
- C、Every IPv6 interface contains at least one loopback address.
- D、The first 64 bits represent the dynamically created interface ID.
- E、Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
正确答案:B,C
网络中有思科和非思科设备,运行PIMv2,如何选举RP?
正确答案:we can configure static RP or bootstrap to elect RP on all routers.
Which two of these statements are true of IPv6 address representation?()
- A、There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
- B、A single interface may be assigned multiple IPv6 addresses of any type.
- C、Every IPv6 interface contains at least one loopback address.
- D、The first 64 bits represent the dynamically created interface ID.
- E、Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
正确答案:B,C
Where do you configure SCREEN options?()
- A、zones on which an attack might arrive
- B、zones you want to protect from attack
- C、interfaces on which an attack might arrive
- D、interfaces you want to protect from attack
正确答案:A
Which two statements are true regarding the use of UTF-16 encoding? ()
- A、Enables easier loading of multinational data.
- B、Uses a fixed-width Multibyte encoding sequence.
- C、Asian characters are represented in three characters.
- D、Used a variable-width Multibyte encoding sequence.
- E、European characters are represented on one or two bytes.
正确答案:A,B
更多 “思科网络工程师题库1” 相关考题
- 油漆的一般性能主要是哪些?
- 奥美拉唑治疗消化性溃疡的作用机制是()A、阻断H2受体而减少胃酸分泌B、阻断促胃液素受体而减少胃酸分泌C、抑制H+-K+-ATP酶而减少胃酸分泌D、阻断M受体而减少胃酸分泌E、中和胃酸,升高胃内容物pH值
- 静脉滴注利多卡因维持用药的剂量( )A、1~4mg/kgB、2~6mg/kgC、6~8mg/kgD、6~10mg/kgE、8~12mg/kg
- 患者男,40岁,农民工。在医院工地劳动时触电,心跳呼吸停止2min后送急诊室。既往史无特殊。体格检查:T37℃,呼吸、脉搏和血压均测不出。口唇无发绀,颈软。四肢软。应立即进行的措施包括()A、心脏按压B、人工呼吸C、气管插管D、肺功能检查E、血生化检查F、凝血检查
- 防护服穿脱方法
- 对糖耐量曲线低平描述,正确的是()。A、服糖后2h血糖仍处低水平B、空腹血糖降低C、服糖后2h血糖多在7.8~11.1mmol/之间D、服糖后血糖上升不明显E、空腹血糖轻度增高
- 下列有关纵隔炎的表述错误的是()A、常见于高龄或合并有糖尿病的体弱患者B、多数患者都可以不经治疗而自行愈合C、在心脏直视手术的正中切开术后比较常见D、切口红肿、有分泌物、疼痛、胸骨不稳常提示术后纵隔炎E、术后纵隔炎常发生于术后3天~3周
- 木器漆的一般性能主要是哪些?
- 男,65岁,进行性吞咽困难6个月,吞钡X线摄片示:食管中段有6cm长的充盈缺损,最佳治疗方法是( )A、手术切除,食管胃吻合术,术后放射治疗B、放射治疗C、化学治疗D、胃造瘘E、放射治疗2~3周后手术切除
- 病理反射
- 2022年高考真题——生物(全国甲卷) Word版含解析-
- 2022年高考真题——理科数学(全国甲卷) Word版含解析-
- 高中语文2022高考真题作文精彩标题汇总(共100个题好文一半)-
- 山东省潍坊市四县市(安丘诸城五莲兰山)2021届高三下学期5月高考模拟数学Word版含答案-
- 河北省邯郸市大名县一中2020-2021学年高二下学期5月月考数学Word版含答案-
- 山东省济宁市兖州区2020-2021学年高二下学期期中考试语文Word版含答案-
- 河北省邯郸市大名县一中2020-2021学年高二下学期5月月考物理Word版含答案-
- 广东省(新高考)2021届高三下学期5月卫冕联考地理试题Word版含答案-
- 新高二暑假语文组合练习(4)附答案+解析(校对版)-
- 专题01 非连续文本阅读-2022年高考真题和模拟题语文分类汇编(解析版)-