刷题
导入试题
【单选题】
党的十九大报告强调,我们坚决维护国家_____完整,绝不容忍国家分裂的历史悲剧重演。一切分裂祖国的活动都必将遭到全体中国人坚决反对。___
A. 主权和治权
B. 治权和领土
C. 领土和领空
D. 主权和领土
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【多选题】
20世纪70年代末80年代初,邓小平对国际形势做出的新判断是___
A. 世界大战是可以避免的
B. 和平与发展是当代时代的主题
C. 建立了国际政治经济新秩序
D. 霸权主义和强权政治是和平与发展的主要障碍
【多选题】
维护世界和平,处理国家之间的关系,应遵循的原则是___
A. 互相尊重主权和领土完整
B. 互不侵犯
C. 互不干涉内政
D. 平等互利
E. 和平共处
【多选题】
和平共处五项原则是指___。
A. 互相尊重主权和领土完整
B. 互不侵犯
C. 互不干涉内政
D. 平等互利、和平共处
【多选题】
中国外交工作的根本任务和基本目标___
A. 维护中国发展的重要战略机遇期
B. 争取和平稳定的国际环境
C. 睦邻友好的周边环境
D. 平等互利的合作环境和客观友善的舆论环境
【多选题】
中国共产党处理党际关系的原则是___
A. 相互尊重
B. 互不侵犯
C. 互不干涉内部事务
D. 完全平等
E. 独立自主
【多选题】
扎实推进公共外交和人文交流,开展同各国政党和政治组织的友好往来,加强___的对外交流,夯实国家关系发展社会基础。
A. 人大
B. 政协
C. 地方
D. 民间团体
【多选题】
世界正处于大发展大变革大调整时期,和平与发展仍然是时代主题。___深入发展。
A. 世界多极化
B. 经济全球化
C. 社会信息化
D. 文化多样化
【多选题】
经济全球化的主要特征是___。
A. 生产全球化
B. 贸易全球化
C. 金融全球化
D. 跨国公司在全球范围进行布局
【多选题】
当前世界形势表述正确的有___。
A. 世界多极化在曲折中发展
B. 经济全球化深入发展
C. 文化多样化持续推进
D. 科学技术孕育新突破
【多选题】
在处理国家之间关系上,中国坚持的原则是___。
A. 相互尊重主权的领土完整
B. 互不侵犯
C. 互不干涉内政
D. 平等互利
【多选题】
坚持独立自主的和平外交政策是指___。
A. 把国家主权和安全放在第一位
B. 从我国人民和世界人民的根本利益出发
C. 反对一切形式的霸权主义和强权政治
D. 主张和平解决国际争端和热点问题
【多选题】
在处理国际关系和外交关系方面,我们坚持怎样的外交工作布局___。
A. 大国是关键
B. 周边是首要
C. 发展中国家是基础
D. 多边是舞台
【多选题】
中国秉持___的全球治理观。
A. 共赢
B. 共建
C. 共商
D. 共享
【多选题】
要相互尊重、平等协商,坚决摒弃冷战思维和强权政治,___ 的国与国交往新路。
A. 互不侵犯
B. 平等互利
C. 走对话而不对抗
D. 结伴而不结盟
【多选题】
推动建立新型国际关系,中国要同欧洲发展___伙伴关系。
A. 和平
B. 增长
C. 改革
D. 文明
【多选题】
推动建设___的新型国际关系,是党中央立足时代发展潮流和我国根本利益作出的战略选择,反映了中国人民和世界人民的共同心愿。
A. 反帝反霸
B. 相互尊重
C. 公平正义
D. 合作共赢
【多选题】
中国始终把坚决维护国家___作为外交工作的基本出发点和落脚点。
A. 主权
B. 平等
C. 安全
D. 发展利益
【多选题】
21世纪海上丝绸之路重点方向是___。
A. 从中国经南海至印度洋
B. 从中国沿海港口过南海到印度洋,延伸至欧洲
C. 从中国沿海港口过南海到南太平洋
D. 从中国至东南亚.南亚.印度洋
【多选题】
在推进“一带一路”的框架思路中,中国政府倡议,要打造___的利益共同体.命运共同体和责任共同体。
A. 文化包容
B. 政治互信
C. 经济融合
D. 民族共融
【多选题】
当下,国际安全形势动荡复杂,各国应树立 ___的新安全观。
A. 共同
B. 综合
C. 合作
D. 可持续
【多选题】
我们呼吁,各国人民同心协力,构建人类命运共同体,建设___的世界。
A. 持久和平
B. 普遍安全、
C. 共同繁荣、
D. 开放包容、
E. 清洁美丽
F. 公平正义
【多选题】
坚定不移在和平共处五项原则基础上发展同各国的友好合作,推动建设___的新型国际关系。
A. 相互尊重、
B. 互不干涉、
C. 公平正义、
D. 合作共赢
【多选题】
中国特色大国外交要推动构建___。
A. 新型国际关系
B. 新型大国关系
C. 人类命运共同体
D. 和谐世界
【多选题】
中国将高举___的旗帜,恪守维护世界和平、促进共同发展的外交政策宗旨。
A. 和平
B. 发展
C. 合作
D. 共赢
【多选题】
构建人类命运共同体,是习近平主席对于人类文明走向给出的中国判断。2017年2月,联合国社会发展委员会通过决议,首次将“构建人类命运共同体”的全球治理理念写入联合国决议。这表明___
A. 中国在全球事务中的影响力和话语权日益增强
B. 联合国对维护世界和平与发展发挥着积极作用
C. 中国积极践行联合国宪章精神支持联合国工作
D. 构建人类命运共同体符合多数国家人民的利益
【多选题】
积极促进“一带一路”国际合作,努力实现___,打造国际合作新平台,增添共同发展新动力。
A. 政策沟通
B. 设施联通
C. 贸易畅通
D. 人员互通
E. 资金融通
F. 民心相通
【多选题】
十九大报告中指出,坚持和平发展道路,推动构建人类命运共同体,中国将高举和平、发展、合作、共赢的旗帜,恪守维护世界和平、促进共同发展的外交政策宗旨,坚定不移在和平共处五项原则基础上发展同各国的友好合作,推动建设___相互尊重、公平正义、合作共赢的新型国际关系。
A. 公平正义
B. 相互尊重
C. 独立自主
D. 合作共赢
【多选题】
十八大以来的五年,全面推进中国特色大国外交,形成___的外交布局,为我国发展营造了良好外部条件。
A. 全方位
B. 多层次
C. 立体化
D. 多元化
【判断题】
和平与发展这两大问题的核心是和平问题。
A. 对
B. 错
【判断题】
发展中国家的经济发展不仅仅是一个经济问题,同时也是一个政治问题。
A. 对
B. 错
【判断题】
多极化趋势的发展不利于世界的和平、稳定和繁荣。
A. 对
B. 错
【判断题】
多极化是促进世界和平与发展的重要因素。
A. 对
B. 错
【判断题】
和平共处五项基本原则可以用来处理一个国家内部的问题。
A. 对
B. 错
【判断题】
恐怖主义是威胁世界和平与稳定的主要根源。
A. 对
B. 错
【判断题】
从政治、军事、经济这些指标综合来看,中国已经是一个全方位大国。
A. 对
B. 错
【判断题】
因为美国想要称霸,所以就挑起南中国海问题想控制中国。
A. 对
B. 错
【判断题】
美国通过国际制度来控制整个世界。
A. 对
B. 错
【判断题】
从军事、外交上的中国海上生命线的安全来看,到了可以武力解决问题的时候了。
A. 对
B. 错
【判断题】
只要中国的发展模式是成功的,那本身对世界上就是很大影响的。
A. 对
B. 错
【判断题】
邓小平对中国外交提出了一系列的指导方针,其中最重要的就是韬光养晦、有所作为。
A. 对
B. 错
推荐试题
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用