相关试题
【单选题】
唯物辩证法认为发展的实质是 ___
A. 事物的变化过程
B. 事物由旧质转化为新质
C. 事物的量变过程
D. 事物的运动过程
【单选题】
辩证的同一是 ___
A. 以差别、对立为前提的同一
B. 不包含否定因素的同一
C. 事物与其自身完全等同
D. 不包含任何差别的绝对的同一
【单选题】
主要矛盾是指 ___
A. 急待解决的比较明显的矛盾
B. 促使事物发生根本变革的矛盾
C. 贯穿于事物发展始终的矛盾
D. 在复杂事物中居支配地位和起决定作用的矛盾
【单选题】
运用主要矛盾和矛盾主要方面原理在方法论上应坚持 ___
A. 均衡论
B. 一点论
C. 重点论
D. 二元论
【单选题】
“建设中国特色社会主义”这个命题表明 ___
A. 个别完全包含在一般之中
B. 个别先于一般而存在
C. 没有一般就没有个别
D. 任何个别都是一般
【单选题】
一事物成为自身并区别于其他事物的是 ___
【单选题】
唯物辩证法所理解的事物的度是 ___
A. 一事物区别于它事物的内在规定性
B. 事物存在发展的规模程度速度以及它的构成成分在空间上的排列等可以用数量表示的规定性
C. 质与量的统一,是事物保持自己质的量的限度
D. 是保持事物自身存在的方面
【单选题】
事物的部分质变是指: ___
A. 关键部分发生质变
B. 质变中量的扩张
C. 量变过程中阶段性变化和局部性变化
D. 渐进过程的中断,事物的突变
【单选题】
否定之否定规律揭示了 ___
A. 事物发展的动力
B. 事物发展变化的基本形式和状态
C. 事物发展的方向和道路
D. 事物发展的基础和条件
【单选题】
对待我国传统文化的正确态度是 ___
A. 传统文化是民族的精华,应全部继承
B. 批判继承,推陈出新
C. 保留一半,抛弃一半
D. 传统文化是封建糟粕,应全部抛弃
【单选题】
把“否定之否定”称为“仿佛回到出发点的运动”是 ___
A. 诡辩论的观点
B. 辩证法的观点
C. 形而上学的观点
D. 循环论的观点
【单选题】
“世界不是既成事物的集合体,而是过程的集合体”这是 ___
A. 唯物辩证法的思想
B. 形而上学的思想
C. 诡辩论的思想
D. 相对主义的思想
【单选题】
鲁迅在评《三国演义》时说:“至于写人,亦颇有失,以致欲显刘备之长厚而似伪,状诸葛之多智而近妖。”这一评述所蕴含的哲理是 ___
A. 要区分事物的两重性
B. 要把握事物的度
C. 对事物既要肯定又要否定
D. 要把事物看作一个整体
【单选题】
“只要知道自然界一切组成部分的相对位置和全部作用,一亿年以前的情况和一亿年以后的情况,都可以精确无误地演算出来,因为未来的一切早就存在宇宙诞生时便已经完全被确定了”,这是 ___
A. 唯心主义决定论
B. 辩证唯物主义决定论
C. 非决定论
D. 机械决定论
【单选题】
恩格斯认为,全部哲学特别是近代哲学的重大的基本问题是 ___
A. 哲学与人类生存活动之间的内在联系问题
B. 人与周围世界的基本联系问题
C. 思维和存在的关系问题
D. 关于人的本质问题
【单选题】
划分唯物史观与唯心史观的根据是 ___
A. 是否承认社会历史的规律性
B. 是否承认阶级斗争
C. 是否承认社会存在决定社会意识
D. 是否承认社会意识的能动作用
【单选题】
列宁对辩证唯物主义物质范畴的定义是通过 ___
A. 物质和意识的关系界定的
B. 哲学与具体科学的关系界定的
C. 主体和客体的关系界定的
D. 一般和个别的关系界定的
【单选题】
“坐地日行八万里,巡天遥看一千河”,这一著名诗句包含的哲理是 ___
A. 物质运动的客观性和时空的主观性的统一
B. 物质运动无限性和有限性的统一
C. 时空的无限性和有限性的统一
D. 运动的绝对性和静止的相对性的统一
【单选题】
“旧唯物主义是半截子的唯物主义”,这是指 ___
A. 旧唯物主义是形而上学的唯物主义
B. 旧唯物主义在社会历史观上是唯心主义
C. 旧唯物主义是机械唯物主义
D. 旧唯物主义是割裂了运动与静止的辩证法
【单选题】
既是自然界与人类社会分化统一的历史前提,又是自然界与人类社会统一起来的现实基础 ___
A. 运动
B. 实践
C. 精神生产
D. 物质生产
【单选题】
辩证唯物主义认为事物发展的规律是 ___
A. 思维对事物本质的概括和反映
B. 用来整理感性材料的思维形式
C. 事物内在的本质和稳定的联系
D. 事物联系和发展的基本环节
【单选题】
有一首描述在战争中缺了钉子的马掌会导致国家灭亡的童谣:“钉子缺,蹄铁卸,战马蹶;战马蹶,骑士绝;骑士绝,战事折;战事折,国家灭。”这首童谣包含的哲学原理是 ___
A. 事物是普遍联系的
B. 事物是变化的
C. 事物的现象是本质的表现
D. 事物的量变引起质变
【单选题】
“沉舟侧畔千帆过,病树前头万木春”,“芳林新叶催陈叶,流水前波让后波。”这两句诗包含的哲学道理是 ___
A. 矛盾是事物发展的动力
B. 事物是本质和现象的统一
C. 事物的发展是量变和质变的统一
D. 新事物代替旧事物是事物发展的总趋势
【单选题】
主观辩证法与客观辩证法的关系是 ___
A. 反映与被反映的关系
B. 唯心主义与唯物主义的关系
C. 抽象与具体的关系
D. 唯心辩证法与唯物辩证法的关系
【单选题】
在自然界中,没有上,就无所谓下;在社会中,没有先进,无所谓落后;在认识中,没有正确,就无所谓错误。这说明 ___
A. 矛盾双方是相互排斥的
B. 矛盾双方是相互渗透的
C. 矛盾双方是相互转化的
D. 矛盾双方是相互依存的
【单选题】
357、辩证唯物主义认为想问题办事情的出发点是 ___
A. 正确的理论原则
B. 客观存在的事实
C. 群众的意见要求
D. 人们的主观愿望
【单选题】
马克思主义哲学按其本性来说是 ___
A. 运动的、发展的
B. 批判的、革命的
C. 科学的、真理的
D. 实践的、客观的
【单选题】
运动是物质的 ___
A. 根本属性
B. 唯一特性
C. 外部现象
D. 内部本质
【单选题】
实践是检验真理的唯一标准,主要是因为实践是一种 ___
A. 客观物质性活动
B. 自觉能动性活动
C. 直接现实性活动
D. 社会历史性活动
【单选题】
当代自然科学的发展日新月异,新的研究成果曾出不穷。从根本上说,这是由于 ___
A. 科学家的聪明才智决定的
B. 正确的科技政策决定的
C. 环境和资源的状况决定的
D. 生产实践的需要决定的
【单选题】
两种对立的发展观是 ___
A. 唯物主义和唯心主义的对立
B. 唯物辩证法和形而上学的对立
C. 可知论和不可知论的对立
D. 唯物史观和唯心史观的对立
【单选题】
马克思主义哲学区别于一切旧哲学的最显著的特点是 ___
A. 阶级性
B. 科学性
C. 革命性
D. 实践性
【单选题】
事物的质和属性的区别在于 ___
A. 质是稳定的,属性是多变的
B. 质是绝对的,属性是相对的
C. 质是内在的规定性,属性是外在表现
D. 质是客观存在的,属性是主观认识的结果
【单选题】
科学证明,人脑是 ___
A. 思维的源泉
B. 思维的产物
C. 思维的器官
D. 思维的对象
【单选题】
马克思主义哲学的直接理论来源是 ___
A. 古希腊朴素唯物主义哲学
B. 17世纪英国唯物主义哲学
C. 18世纪法国唯物主义哲学
D. 19世纪德国古典哲学
【单选题】
实现意识对物质反作用的基本途径是 ___
A. 学习书本知识
B. 参加社会实践
C. 进行社会调查
D. 研究实际情况
【单选题】
哲学是 ___
A. 科学的世界观和方法论
B. 无产阶级的世界观和方法论
C. 关于世界观的理论表现
D. 关于自然知识和社会知识的总汇
【单选题】
辩证唯物主义关于物质和意识的关系的全面看法是 ___
A. 物质是第一性,意识是第二性
B. 物质决定意识,意识是人脑的机能
C. 物质决定意识,意识反作用于物质
D. 物质是意识的根源,意识是对物质的反映
【单选题】
“人的知识和才能是天生就有的,''上智''与''下愚''的差异是不可改变的”。这种观点在哲学上属于 ___
A. 唯心主义先验论
B. 唯物主义可知论
C. 折衷主义诡辩论
D. 形而上学唯物论
【单选题】
划分唯物主义和唯心主义的标准是 ___
A. 对世界发展动力问题的不同回答
B. 对世界可知与不可知问题的不同回答
C. 对意识是否具有能动性问题的不同回答
D. 对物质和意识何者为第一性问题的不同回答
推荐试题
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN