Chinaunix首页 | 论坛 | 博客
  • 博客访问: 289334
  • 博文数量: 469
  • 博客积分: 2510
  • 博客等级: 少校
  • 技术积分: 5200
  • 用 户 组: 普通用户
  • 注册时间: 2008-06-03 16:15
文章分类

全部博文(469)

文章存档

2011年(82)

2010年(284)

2009年(69)

2008年(34)

我的朋友

分类:

2010-11-11 10:35:45

CCIE 考试题库由我们专业IT认证讲师及产品专家精心打造,包括了当前最新的全真试题,全部附有正确答案。题库的覆盖率在96%以上,在考生认证厂商对考题对出变化时,网站都将在第一时间内更新,确保考生能一次通过的。

考试代号:

认证名称:CCIE Pre-Qualification Test for Security

版本号:V11.02

考题数量:316

更新日期:2010-11-5

1. Which access control model provides access to system resources based on the job function of the user or the tasks that the user has been assigned?

A. Context Based Access Control

B. Rule Based Access Control

C. Mandatory Access Control

D. Discretionary Access Control

E. Role Based Access Control

Answer: E

2. Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?

A. Spoof attack

B. Buffer Overflow

C. Man-in-the middle attack

D. Trojan Horse

E. Day zero attack

F. Land.C attack

Answer: E

3. Which of the following are valid RADIUS packet flows'C indicates the user (such as a wireless laptop),N indicates the NAS,and S indicates an ACS Server(Choose 2)

A. N to S:RADIUS Access- Challenge S to N: RADIUS Access-Accept

B. N to S:RADIUS Access-Request S to N: RADIUS Access-Reject N to S:RADIUS Access- Challenge S to N: RADIUS Access-Accept

C. C to N: RADIUS Access-Request N to C: RADIUS Access- Reject C to N: RADIUS Access- Challenge N to C: RADIUS Access-Accept

D. C to N: RADIUS Access-Request N to C: RADIUS Access-Accept

E. N to S:RADIUS Access-Request S to N: RADIUS Access-Challenge N to S: RADIUS Access-Request S to N: RADIUS Access-Accept

Answer: DE

4. Choose the statement that best describes the correct characteristics pertinent to symmetric or

asymmetric keys.

A. Symmetric key cryptography uses two distinct and separate keys for encryption and decryption.

B. Symmetric key cryptography uses a single, shared key for encryption and decryption.

C. Asymetric key cryptography uses the same key for both encryption and decryption.

D. Asymetric key cryptography can only be used for decryption of information.

E. Both asymmetrivc and symmetric key cryptography can only encrypt information.

Answer: B

5 What functionality best defines the use of a 'stub' area within an OSPF environment?

A. A stub area appears only on remote areas to provide connectivity to the OSPF backbone.

B. A stub area is used to inject the default route for OSPF.

C. A stub area uses the no-summary keyword to explicitly block external routes, defines the non-transit area, and uses the default route to reach external networks.

D. A stub area is used to reach networks external to the sub area.

Answer: C

  以上只是部分的题库,登录可下载更多的关于思科认证考试的题库。

阅读(226) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~