刷题
导入试题
【单选题】
春末夏初,京津冀地区易出现的气象灾害是。___
A. 台风; 
B. 洪涝; 
C. 干旱;  
D. 寒潮
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
蓝、黄、橙、红四种颜色的大风预警信号中,级别最高的是。___
A. 蓝;
B. 黄;
C. 橙;
D. 红。
【单选题】
天气符号代表的天气现象是___
A. 霾;
B. 雾;
C. 沙尘暴;
D. 雷电。
【单选题】
我国内流区和外流区河流,汛期都在夏季的原因是。___
A. 都受夏季风的影响;
B. 都受夏季气温的影响;
C. 都受地形的影响;
D. 外流区受夏季风影响,内流区受夏季气温影响。
【单选题】
关于水循环的错误说法是 。___
A. 水循环使水资源不断更新,数量无限;
B. 海陆间大循环和陆地循环都能使水资源得到更新;
C. 水循环联系了大气圈、水圈、岩石圈和生物圈;
D. 水循环能深刻而广泛地影响全球地理环境。
【单选题】
刺激性气体眼污染者应立即。___
A. 紧闭双眼;
B. 用干净的棉布擦拭;
C. 用大量流动清水或生理盐水彻底冲洗;
D. 送往医院。
【单选题】
以下属于室内甲醛污染主要来源的是。___
A. 瓷砖;
B. 实木地板;
C. 密度板;
D. 壁纸。
【单选题】
关于装修污染,以下哪项说法是正确的。___
A. 只要闻不到气味,室内环境就没有污染;
B. 只要装修材料达标,室内环境就没有污染;
C. 只要室内保持通风,室内空气就能确保清洁;
D. 以上说法都存在误区。
【单选题】
一种认识是不是真理,要看它。___
A. 能否满足人的需要;
B. 能否付诸实践;
C. 能否在实践中得到证实;
D. 能否被多数人认可。
【单选题】
广义的信息检索的全过程包括文献信息的___两个过程。
A. 存储和检索;
B. 存储和编排;
C. 标引和编排;
D. 存储和标引。
【单选题】
以下检索出文献最少的检索式是。___
A.  a and b;
B. a and b or c; 
C. a and b and c;
D. (a or b) and c。
【单选题】
以下域名哪一个是指教育机构?___
A. Edu;
B. Org;
C. Gov;
D. Net。
【单选题】
以下属于原始文献的是。___
A. 文摘;
B. 期刊论文;
C. 年鉴;
D. 实验记录。
【单选题】
一次文献、二次文献、三次文献是按照___进行区分的。
A. 加工深度;
B. 原创的层次;
C. 印刷的次数;
D. 评论的次数。
【单选题】
属于参考工具书范畴的是。___
A. 期刊杂志;
B. 百科全书;
C. 标准;
D. 科技报告。
【单选题】
124.利用文献后面所附的参考文献进行检索的方法称为。___
A. 追溯法;
B. 直接法;
C. 抽查法;
D. 综合法。
【单选题】
125.一般情况下,哪一个是实时系统。___
A. 办公室自动化系统;
B. 航空订票系统;
C. 计算机辅助设计系统;
D. 计算机激光排版系统。
【单选题】
对于企业来说,以下哪一项检索对其作用最大。___
A. 会议论文的检索;
B. 学位论文的检索;
C. 专利商标信息的检索;
D. 专著的检索。
【单选题】
128.以下哪一项是能够进行英文学术搜索的网站。___
A. Yahoo;
B. Google Scholar;
C. Amazon;
D. eBay。
【单选题】
129.如果只有图片而不知图片名称或相关信息,可以在搜索引擎采用哪种方式进行检索。___
A. 语音检索;
B. 图片检索;
C. 学术检索;
D. 新闻检索。
【单选题】
暑假里小叮当卖报纸,他每天早晨以8角的价格买30份《社区早报》,然后以每份1元的价格卖出,那么他每份报纸的利润率是。___
A. 20%
B. 25%
C. 40%
D. 80%。
【单选题】
某投资者以2万元购买甲、乙两种股票,甲股票的价格为8元/股,乙股票的价格为4元/股,它们的投资额之比是4:1,在甲、乙股票价格分别为10元/股和3元/股时,该投资者全部抛出这两种股票,他共获利。___
A. 3000元;
B. 3889元;
C. 4000元
D. 5000元。
【单选题】
一公司向银行借款34万元,欲按 (1/2):(1/3):(1/9)的比例分配给下属的甲、乙、丙三车间进行技术改造,则甲车间应得___万元。
A. 4;
B. 8
C. 12;
D. 18。
【单选题】
小明卧室地面的长与宽分别为5米和4米,用边长为40厘米的正方形地砖铺满整个地面,至少需要多少___块这样的地砖。
A. 115;
B. 120
C. 125
D. 130。
【单选题】
一款衬衣以原价格购买,可以买5件;降价后,可以买8件。则该衬衫降价的百分比是。___
A. 25%;
B. 37.5%;
C. 40%;
D. 60%。
【单选题】
下面关于计量单位的描述正确的是。___
A. 如果每个学生体重是25千克,那么40个学生的体重就是1吨
B. 丽丽的身高是136分米
C. 1200千克—200千克=1000吨
D. 1千克棉花比1千克盐酸重。
【单选题】
BMI指数即体质指数,是用体重公斤数除以身高米数平方得出的数字,是目前国际上常用的衡量人体胖瘦程度的一个标准。成人的BMI数值与胖瘦关系如下:过轻(低于18.5),正常(18.5-24.99),过重(25-28),肥胖(28-32),非常肥胖(高于32)。小明身高为1.75米,体重为68千克,请问小明属于。___
A. 过轻;
B. 正常;
C. 过重;
D. 肥胖。
【单选题】
防止过度疲劳的措施包括注意劳逸结合,合理安排休息,合理进行劳动组织,全面改善___及改善工作体位,此外,还应重视劳动者的心理因素。
A. 生活条件;
B. 作业人员营养;
C. 社会环境;
D. 劳动环境和卫生条件。
【单选题】
电石和石灰是。___
A. 易燃物品;
B. 遇湿易燃物品;
C. 氧化剂;
D. 有毒品。
【单选题】
建筑施工最大的特点是。___
A. 露天高处作业多、手工操作、繁重体力劳动;
B. 产品流动、人员稳定;
C. 施工幅度变化小、规则性强;
D. 工作难度大、机械使用多。
【单选题】
金属燃烧属于。 ___
A. 扩散燃烧;
B. 蒸发燃烧;
C. 分解燃烧;
D. 表面燃烧。
【单选题】
交通事故专用报案电话为。___
A. 121;
B. 120;
C. 112;
D. 122。
【单选题】
下面哪个不是发生燃烧的必要条件。___
A. 可燃物;
B. 助燃物;
C. 水;
D. 引火源;
【单选题】
下面哪种灭火方法是错误的。___
A. 向着火的电器泼水;
B. 用过盖盖在着火的油锅上;
C. 利用湿棉被或沙土覆盖在燃烧物表面;
D. 将水、泡沫等灭火剂直接喷洒在燃烧的物体上。
【单选题】
下面哪种物品不是白色污染。___
A. 塑料袋;
B. 一次性塑料发泡饭盒;
C. 玻璃杯。
【单选题】
下面哪种行为不会导致农业面源污染。___
A. 使用剧毒农药;
B. 测土配方施肥;
C. 焚烧秸秆。
【单选题】
不断培育土壤,实现农业生产可持续发展的重要途径是。___
A. 只用地不养地;
B. 只养地不用地;
C. 用地与养地结合。
【单选题】
土壤的高度熟化是作物高产稳产的根本保证,土壤的熟化主要是由于。___
A. 活土层加厚和有机肥的作用;
B. 化肥的作用;
C. 农药的作用。
【单选题】
下面哪种方法可以检查煤气管是否漏气。___
A. 点燃火柴,靠近煤气管看一看是否有火苗;
B. 把肥皂水涂抹在可疑位置进行检查;
C. 靠近煤气管听一听是否有漏气声;
D. 靠近煤气管闻一闻是否有煤气味。
【单选题】
发生煤气中毒后,应首先。___
A. 给病人喝水;
B. 给病人保温;
C. 将病人移到通风处;
D. 拨打120,送医院治疗。
【单选题】
绿色食品分级为。___
A. A级;
B. A级和AA级;
推荐试题
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用