刷题
导入试题
【单选题】
统一时点更新的总体要求:统一时点更新仅对从完成调查时间到统一时点之间的 ___变化部分进行变更,对未发生变化的部分不得擅自变更。调查界线未发生变化 时,土地调查控制界线和面积不得改动。
A. 土地利用现状
B. 土地权属
C. 专项用地调查成果
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
县级组织对调查成果进行___自检。
A. 30%
B. 50%
C. 70%
D. 100%
【单选题】
调查内容与精度:实地面积超过___的建设用地和设施农用地需要调查。
A. 300平方米
B. 400平方米
C. 150平方米
D. 200平方米
【单选题】
调查内容与精度、实地面积超过___的农用地(不含设施农用地)需要调查
A. 300平方米
B. 400平方米
C. 350平方米
D. 500平方米
【单选题】
高分航空影像和二调数据库成果套合中地类有小面积偏移时,以___为准。
A. 影像
B. 二调数据库
C. 实地位置
D. 核实影像纠正无误后,以影像
【单选题】
以下不属于建设用地的是___
A. 0603盐田
B. 1103水库水面
C. 1109水工建筑用地
D. 1201空闲地
【单选题】
耕地不包括以下___
A. 轮歇地
B. 临时种植果树、林木且耕作层未破坏的土地
C. 南方地区宽度大于1米的沟、渠和坎。
D. 平均每年能保证收获一季的已垦滩地
【单选题】
以下不属于未利用地的是___
A. 裸土地
B. 沼泽地
C. 其他草地
D. 沼泽草地
【单选题】
以下属于湿地的是___
A. 水田
B. 水库水面
C. 盐田
D. 盐碱地
【单选题】
基本农田内实施的退耕还林,符合国家生态退耕政策,实地为林地,调查时应认定为___地类
A. 林地
B. 耕地
C. 耕地,标注林木属性
D. 林地,标注耕地属性
【单选题】
以下哪个是错误的___
A. 厂区内部的绿化林地、草地按建设用地调查。
B. 科研院所、育苗基地等专门为科研、教学、试验、示范需要,种植的苗圃、林木等按实际地类调查。
C. 绿化公司内部的育苗按建设用地认定。
D. 公路两旁的林带按林地调查。
【单选题】
基础数据库中是林地,国家提取为耕地,实地为耕地,外业调查时林业部门不认可为耕地,调查时应认定为___地类
A. 林地
B. 耕地
C. 林地,标注为耕地
D. 耕地,标注为林地
【单选题】
基础数据库地类为林地,紧邻村庄,实地种植玉米,调查时应认定为___地类
A. 林地
B. 园地
C. 耕地
D. 园地,标注为林地
【单选题】
河流水面中间小面积高出水面部分,影像特征为其他草地或林地,以下哪种说法是正确的___
A. 统一按河流水面调查。
B. 按内陆滩涂调查。
C. 常年高出水面的部分,调查为其他草地或林地。
D. 季节性高出水面的部分,调查为其他草地或林地。
【单选题】
以下哪个说法是错误的___
A. 贯通村庄的公路,按公路调查上图
B. 贯通村庄的铁路,按铁路调查上图
C. 贯通村庄的农村道路,按农村道路调查。
D. 贯通村庄的农村道路,按城镇村道路调查。
【单选题】
以下关于临时用地的说法,哪项是不正确的___?
A. 农用地上搭建简易工棚(钢架构蓝顶板皮房),按原地类调查,单独图层标注临时用地。
B. 农用地上搭建特别简易的木质棚,可以忽略不调查。
C. 废弃的公路搅拌站,未复耕复绿,按原地类调查,单独图层标注临时用地。
D. 修建公路推土,道路尚未形成,按原地类调查,单独图层标注临时用地。
【单选题】
已经取得建设用地批文,尚未建设的土地,现状为林地,按哪种地类调查___
A. 建设用地
B. 林地
C. 临时用地
【单选题】
基础数据库为设施农用地,由于污染问题和产业转型,现场均已拆除,尚未完全清除,有的只拆了部分建筑物体、有的硬化水泥地板未处理,这种现状可能长期维持不变,对于此类地块,按___地类认定
A. 设施农用地
B. 耕地
C. 空闲地
D. 临时用地
【单选题】
滩涂上实地为林地的,哪种调查是不允许的___
A. 原数据库为滩涂,调查为滩涂。
B. 原数据库为林地的,调查为滩涂。
C. 原数据库为滩涂,调查为林地。
D. 原数据库为河流的,调查为林地。
【单选题】
外业调查为推土的地块(不知道推土目的),认定成___地类
A. 建设用地
B. 临时用地
C. 裸土地
D. 按原地类认定
【单选题】
村头、田间水泥地面,农忙时为晒谷场,平时停车休息等用途,按___地类认定
A. 设施农用地
B. 建设用地
C. 空闲地
D. 按主要用途认定
【单选题】
坑塘(基础数据库为114),因周围树木遮盖,国家下发图斑判读为林地,地类调查如何认定___
A. 按坑塘调查,举证。
B. 按坑塘调查,不举证。
C. 按林地调查,举证。
D. 按林地调查,不举证。
【单选题】
调查内容与精度中,“建设用地和设施农用地实地面积超过200平方米的需调查上图;农用地(不含设施农用地)实地面积超过400平方米的需调查上图;其他地类实地面积超过600平方米的需调查上图”,对于山上的(远离城镇村)林地、荒草地来说,调查精度能否降低___
A. 能。
B. 不能。
【单选题】
永久基本农田内违法农民建房图斑,如何调查___
A. 调查为耕地,标注203属性。
B. 调查为0702,标注耕地属性。
C. 调查为0702,无需标注耕地属性。
【单选题】
耕地、仓储用地、宅基地及科教文卫用地等坐落在部队等权属范围内,以下那种说法是不正确的___
A. 军队范围内的用地,可由地方调查,军队配合。
B. 军事用地不作为单独地类调查,归并到特殊用地中。
C. 涉及军事用地的不需要举证。
D. 统一按建设用地调查,不需要打开细化。
【单选题】
关于线状地物图斑化的说法,以下哪项不正确___
A. 线状地物应依据国家下发遥感影像图,经实地调查后确定图斑(包括线状图斑)边界。
B. 国家下发遥感影像图不清晰时,可参考更高分辨率的遥感影像勾绘。
C. 对于宽度一致、位置未发生变化的线状地物,可以采用道路中心线缓冲区构面,但必须利用最新遥感影像或外业调查核实道路宽度,严格按照实际宽度构面并补充相关道路信息。
D. 对于宽度或位置等信息发生变化的,应根据外业调查结果和影像特征重新矢量化道路图斑。对于没贯通的且未硬化的农村道路,应单独调查,不能归并到相邻地类。
【单选题】
数据库建设应符合国家标准,关键的体现项不包括:___
A. 格式;
B. 标准;
C. 面积;
D. 效率。
【单选题】
土地调查数据库及专项调查数据库不包括:___
A. 土地利用现状;
B. 专项调查;
C. 基础地理;
D. 统计表格。
【单选题】
完整性及规范性检查不包括:___
A. 目录及规范性检查;
B. 成果完整性;
C. 数据有效性检查;
D. 包含全部图层。
【单选题】
所有图层的要素的标识码(BSM)不包括:___
A. 6位县级行政区划代码;
B. 3位乡镇代码;
C. 4位层代码;
D. 8位顺序号。
【单选题】
基本农田要素中包括以下图层:___
A. 基本农田保护区;
B. 基本农田保护片(块)图层;
C. 永久基本农田图斑;
D. 耕地图斑。
【单选题】
土地调查界线不包括:___
A. 国界线;
B. 零米线;
C. 各级行政区域界线;
D. 各级权属界线。
【单选题】
土地调查界线中各级行政区域界线不包括___。
A. 市界;
B. 县界;
C. 乡界;
D. 村界。
【单选题】
椭球面积计算精度与图斑节点密切相关,数据采集节点必须按照技术规程要求采集,线段长度不得大于___米。
A. 38;
B. 50;
C. 70;
D. 76。
【单选题】
关于县级辖区控制面积,以下描述错误的是:___
A. 包含陆地控制面积和岛屿控制面积;
B. 等于全县所有图斑面积之和;
C. 等于全县地类图斑层的图斑面积字段汇总值;
D. 包括飞入地面积。
【单选题】
关于陆地控制面积和岛屿控制面积,以下描述错误的是:___
A. 陆地控制面积应等于陆地村级单位控制面积之和;
B. 陆地控制面积应等于陆地地类图斑面积之和;
C. 岛屿控制面积应小于海岛村级单位控制面积之和;
D. 岛屿控制面积应等于岛屿地类图斑面积之和。
【单选题】
关于各级控制面积的关系,以下描述的是:___。
A. 县级控制面积等于各乡级单位控制面积汇总值;
B. 乡级控制面积等于各村级单位控制面积汇总值;
C. 村级控制面积等于各组级单位控制面积汇总值;
D. 基础统计表县、乡、村各级地类汇总面积与对应的各级控制面积应完全一致。
【单选题】
关于飞地统计,以下描述错误的是:___
A. 村级只统计外村到本村的;
B. 乡级只统计外乡到本乡;
C. 县级只统计外县到本县;
D. 各级之间逐级汇总求和。
【单选题】
采矿用地(204)统计条件是基础统计表中的城镇村标识(CZCBS)内容填写为“204”,进行地类的统计,不包括___。
A. 0602;
B. 0603;
C. 09;
D. 1201。
【单选题】
矢量数据库拓扑检查不包括:___。
A. 宗地(ZD)层要素的是否被地类图斑(DLTB)层要素边界覆盖;
B. 宗地(ZD)层要素的是否被城镇村等用地(CZCFW)层要素边界覆盖;
C. 城镇村等用地(CZCFW)层要素的边界是否被地类图斑(DLTB)层要素边界覆盖;
D. 城镇村等用地(CZCFW)层单个要素必须被行政区(XZQ)层单个要素覆盖的检查。
【单选题】
地类图斑层以下哪些地类编码的要素___不需要填写城镇村属性码。
A. 06;
B. 0702;
C. 09;
D. 1003。
推荐试题
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用