刷题
导入试题
【多选题】
2党的十八大以来,习近平着眼___,围绕强军兴军作出一系列重要论述,提出一系列重大战略思想、重大理论观点、重大决策部署,形成了习近平强军思想。
A. 坚持和发展中国特色社会主义
B. 实现社会主义民主
C. 实现中华民族伟大复兴
D. 立足国家安全和发展战略全局
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ACD
解析
暂无解析
相关试题
【多选题】
3军队要全面提髙新时代备战打仗能力___。
A. 有效塑造态势
B. 管控危机
C. 遏制战争
D. 打赢战争
【多选题】
4推进强军事业必须坚持___,更加注重聚焦实战、更加注重创新驱动、更加注重体系建设、更加注重集约高效、更加注重军民融合。
A. 政治建军
B. 改革强军
C. 科技兴军
D. 依法治国
【多选题】
5党的十八大以来,人民军队___,在中国特色强军之路上迈出了坚定步伐,强军事业取得了历史性成就,发生了历史性变革。
A. 重振政治纲纪
B. 重塑组织形态
C. 重整斗争格局
D. 重构建设布局
【多选题】
6中国共产党对军队的绝对领导,是包括___在内的全面领导,涵盖军事、政治、后勤、装备建设各个领域,贯穿于完成各项任务的全过程。
A. 政治领导
B. 思想领导
C. 基层领导
D. 组织领导
【多选题】
7___是党从思想上政治上组织上建设和掌握部队的重要组织支撑。
A. 党委
B. 政治委员
C. 政治机关
D. 首长负责制
【多选题】
8严守政治纪律和政治规矩,加大从严治党、从严治军力度,确保全军官兵始终在___上与党中央、中央军委保持高度一致,一切行动听从党中央、中央军委指挥。
A. 政治立场
B. 政治方向
C. 政治原则
D. 政治道路
【多选题】
9把提高战斗力作为各项建设的出发点和落脚点,坚持按照战斗力标准来___。
A. 制定各项法规
B. 确立发展思路
C. 实施决策指导
D. 选拔任用干部
【多选题】
10我们要更加坚定自觉地贯彻政治建军要求,充分发挥政治工作生命线作用。要着力培养___的新时代革命军人
A. 有灵魂
B. 有本事
C. 有血性
D. 有品德
【多选题】
11习近平发出全面实施改革强军的伟大号召,开启了我军历史上一场整体性、革命性变革。通过大变革大重塑,人民军队___。
A. 体制一新
B. 结构一新
C. 格局一新
D. 心灵一新
【多选题】
12要坚持用强军目标审视、引领、推进改革,着力解决制约国防和军队建设的___,进一步解放和发展战斗力。
A. 体制性障碍
B. 错误思路
C. 结构性矛盾
D. 政策性问题
【多选题】
13空军是空中作战行动的主体力量,要按照空天一体、攻防兼备的战略要求,着力提高___能力。
A. 战略预警
B. 空中打击
C. 空降作战
D. 防空反导
【多选题】
14新型作战力量代表着军事技术和作战方式的发展趋势,具有___等优长,是国家战略能力的前瞻力量,是生成新质战斗力的强力引擎。
A. 练兵打仗新
B. 技术平台新
C. 体系编成新
D. 制敌手段新
【多选题】
15练兵备战要扎实做好军事斗争准备,以国家核心安全需求为导向,___真抓实备、常备不懈。
A. 牢固树立练兵打仗、带兵打仗思想
B. 牢固树立战略预警机制
C. 牢固树立随时准备打仗的思想
D. 牢固树立立足现有条件打胜仗的思想
【多选题】
16邓小平提出要走___的道路,强调国防和军队建设须服从服务于经济建设大局的思想
A. 军民结合
B. 平战结合
C. 军品优先
D. 以军养民
【多选题】
17我国军民融合发展刚进入由初步融合向深度融合的过渡阶段,必须正确把握和处理___和()的关系,两者协调发展、平衡发展、兼容发展。
A. 军事建设
B. 经济建设
C. 国防建设
D. 社会建设
【多选题】
18健全军民融合体制机制,形成___相统一的工作运行体系。
A. 国家主导
B. 需求牵引
C. 社会协同
D. 市场运作
【多选题】
19进入新时代,进一步推动军民融合深度发展,更需要着力加强战略规划,要把___统筹起来、同步论证。
A. 国民经济
B. 社会发展规划
C. 军队建设发展规划
D. 地方发展战略
【多选题】
20发展高新技术武器装备要吸纳和利用民用先进技术,打破行业垄断,在健全___机制上迈出更大步伐。
A. 竞争
B. 评价
C. 监督
D. 激励
【多选题】
1进入21世纪以来,___成为不可阻挡的时代潮流。
A. 和平
B. 发展
C. 合作
D. 共赢
【多选题】
2推动建设___的新型国际关系,是党中央立足时代发展潮流和我国根本利益作出的战略选择。
A. 相互尊重
B. 公平正义
C. 合作共赢
D. 共同发展
【多选题】
3新型国际关系,“新”的涵义有___。
A. 和平发展
B. 相互尊重
C. 公平正义
D. 合作共赢
【多选题】
4中国始终把坚决维护___作为外交工作的基本出发点和落脚点。
A. 国家主权
B. 安全
C. 发展利益
D. 对外利益
【多选题】
5推动建立新型国际关系,要按照___的外交工作布局,发展与各国的友好关系。
A. 大国是关键
B. 周边是首要
C. 发展中国家是基础
D. 多边是舞台
【多选题】
6中国秉持___的全球治理观。
A. 共商
B. 共建
C. 共享
D. 和谐
【多选题】
7构建人类命运共同体思想,其核心就是建设持久和平、___的世界
A. 普遍安全
B. 共同繁荣
C. 开放包容
D. 清洁美丽
【多选题】
8共建“一带一路”应秉持___的理念。
A. 和平合作
B. 开放包容
C. 互学互鉴
D. 互利共赢
【多选题】
9世界多极化是一个___过程。
A. 长期的
B. 曲折的
C. 快速的
D. 不可避免的
【多选题】
10经济全球化是一把“双刃剑”,其带来的负面影响有___。
A. 加剧国际竞争
B. 增加国际风险
C. 冲击国家主权
D. 冲击发展中国家的民族工业
【多选题】
11中国实行独立自主的和平外交政策,反对任何国家损害我国的___。
A. 独立
B. 主权
C. 安全
D. 尊严
【多选题】
12在新形势下,各国应树立___的新安全观。
A. 共同
B. 综合
C. 合作
D. 可持续
【多选题】
1新时代中国共产党的历史使命,就是统揽___,实现伟大复兴的中国梦。
A. 伟大斗争
B. 伟大工程
C. 伟大事业
D. 伟大梦想
【多选题】
2必须党为最高政治领导力量,原因在于___
A. 这是马克思主义政党的基本要求
B. 这是对党领导革命、建设和改革历史经验的深刻总结
C. 这是推进伟大事业的根本保证
D. 这是实现共产主义的客观要求
【多选题】
3坚持党对一切工作的领导,必须做到___
A. 绝对服从党中央的安排
B. 认识到党为最高政治领导力量
C. 确保党始终总揽全局协调各方
D. 全面增强党的执政本领
【多选题】
4___是党的领导决策核心。
A. 中央委员会
B. 全国人民代表大会
C. 中央政治局
D. 中央政治局常委会
【多选题】
5关于党的民主集中制原则中,下列说法正确的有___。
A. 民主与集中是相互矛盾的
B. 应该把民主基础上的集中和集中指导下的民主相结合
C. 充分发扬民主后作出的决定,各地方、各部门不允许有令不行、有禁不止
D. 民主与集中是辩证统一的
【多选题】
6中国共产党是___的先锋队。
A. 中国工人阶级
B. 中国人民
C. 中华民族
D. 世界人民
【多选题】
7中国共产党是中国特色社会主义事业的___。
A. 开创者
B. 推动者
C. 引领者
D. 管理者
【多选题】
8新时代中国共产党的历史使命就是统揽___。
A. 伟大斗争
B. 伟大工程
C. 伟大事业
D. 伟大梦想
【多选题】
9确保党始终总览全局协调各方就必须增强___。
A. 政治意识
B. 大局意识
C. 核心意识
D. 看齐意识
【单选题】
1、闭合燃油泵开关,RBC不吸合时,应检查___。
A. 16DZ
B. 3~4DZ
C. RBC线圈电路
推荐试题
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用