相关试题
【单选题】
宗教问题始终是我们党治国理政必须处理好的重大问题,宗教工作在党和国家工作全局中具有特殊重要性。要积极引导宗教与社会主义社会相适应。引导宗教与社会主义社会相适应的一个重要任务是___
A. 全面贯彻党的宗教信仰自由政策
B. 依法管理宗教事务
C. 坚持独立自主自办原则
D. 支持我国宗教坚持中国化方向
【单选题】
___提出了到2020年全面建成小康社会的奋斗目标。
A. 党的十六大
B. 党的十七大
C. 党的十八大
D. 党的十九大
【单选题】
对全面建成小康社会,错误的认识是___。
A. 要实事求是、因地制宜
B. 是“同一水平小康”,每个地区、每个民族、每个人都达到同一个水平
C. 既坚持一定标准,又防止好高骛远
D. 既考虑到2020年这个时间节点,又立足于打基础、谋长远、见成效
【单选题】
我国社会主义市场经济体制已经初步建立,要继续朝着加快完善社会主义市场经济体制的目标努力,着力健全使___在资源配置中起决定性作用和更好发挥( B )作用的制度体系。
A. 政府、市场
B. 市场、政府
C. 社会、政府
D. 市场、人民
【单选题】
党的十八届三中全会通过了《中共中央关于全面深化改革若干重大问题的决定》,提出全面深化改革的总目标是___。
A. 完善和发展中国特色社会主义制度,推进国家治理体系和治理能力现代化
B. 完善和发展中国特色社会主义制度,推进国防和军队现代化
C. 完善和发展中国特色社会主义制度,推进科技和教育现代化
D. 完善和发展中国特色社会主义制度,推进农业和工业现代化
【单选题】
___明确把依法治国确立为治理国家的基本方略,把建设社会主义法治国家确定为社会主义现代化建设的重要目标。
A. 党的十九大
B. 党的十八大
C. 党的十一届三中全会
D. 党的十五大
【单选题】
社会主义法治最根本的保证是___。
A. 宪法
B. 人民当家作主
C. 党的领导
D. 依法治国
【单选题】
新时代党的建设总要求是:坚持和加强党的___,坚持党要管党、全面从严治党,以加强党的长期执政能力建设、先进性和纯洁性建设为主线,以党的政治建设为统领,以坚定理想信念宗旨为根基,以调动全党积极性、主动性、创造性为着力点,全面推进党的政治建设、思想建设、组织建设、作风建设、纪律建设,把制度建设贯穿其中,深入推进反腐败斗争,不断提高党的建设质量,把党建设成为始终走在时代前列、人民衷心拥护、勇于自我革命、经得起各种风浪考验、朝气蓬勃的马克思主义执政党。
A. 经济领导
B. 政治领导
C. 思想领导
D. 全面领导
【单选题】
中国共产党最大的政治优势是___。
A. 追求社会公平正义
B. 密切联系群众
C. 长期执政
D. 理论联系实际
【单选题】
“四个全面”战略布局是我们党在新的历史起点上,总结我国发展实践,适应新的发展要求,坚持和发展中国特色社会主义新探索新实践的重要成果。在“四个全面”战略布局中,具有突破性和先导性的关键环节是___
A. 全面建成小康社会
B. 全面深化改革
C. 全面依法治国
D. 全面从严治党
【单选题】
在“四个全面”战略布局中,居于引领地位的是___
A. 全面建成小康社会
B. 全面深化改革
C. 全面依法治国
D. 全面从严治党
【单选题】
从现在到2020年,是全面建成小康社会的决胜期,也是确保实现第一个百年目标,为第二个百年目标打好基础的关键阶段。面对各种严峻复杂的挑战,如期全面建成小康社会必须打好攻坚战。摆在攻坚战首位的是___
A. 污染防治
B. 精准脱贫
C. 产业结构调整
D. 防范化解重大风险
【单选题】
经济体制改革是全面深化改革的重点,核心问题是处理好___
A. 中央和地方的关系
B. 政府和市场的关系
C. 宏观调控与微观搞活的关系
D. 公平与效率的关系
【单选题】
社会主义初级阶段的基本经济制度是公有制为主体、多种所有制经济共同发展。必须毫不动摇地鼓励、支持和引导非公有制经济发展的依据在于___
A. 社会主义初级阶段的生产力发展水平和发展的不平衡性
B. 社会主义市场经济体制决定
C. 社会主义初级阶段的基本经济制度决定
D. 社会主义初级阶段的分配制度决定
【单选题】
解决好农业农村发展面临的各种矛盾和问题,根本靠深化改革。新形势下深化农村改革,主线仍然是处理好___
A. 农民和土地的关系
B. 党和政府与农民的关系
C. 国家、集体和农民个人的关系
D. 政府和市场的关系
【单选题】
经济体制改革要紧紧围绕___
A. 市场在资源配置中起决定性作用和更好发挥政府作用深化改革
B. 坚持党的领导、人民当家作主、依法治国有机统一深化改革
C. 提高科学执政、民主执政、依法执政水平深化改革
D. 更好保障和改善民生、促进社会公平正义深化改革
【单选题】
正确处理改革、发展、稳定三者关系的重要结合点是___
A. 改革力度、发展速度和社会可承受程度的统一
B. 改善人民生活
C. 在社会政治稳定中推进改革和发展
D. 靠深化改革和继续发展解决改革和发展中产生的新问题与新矛盾
【单选题】
推进中国特色社会主义法治体系建设,要建立严密的法治监督体系。其重点在于___
A. 加强党内监督
B. 加强人大监督
C. 加强行政监督和司法监督
D. 规范和约束公权力
【单选题】
党的十九大报告提出了新时代党的建设的总要求,其中,作为新时代党的建设的统领的是___
A. 调动全党积极性、主动性、创造性
B. 党的政治建设
C. 加强党的长期执政能力建设、先进性和纯洁性建设
D. 坚定理想信念宗旨
【单选题】
党的政治建设的首要任务是___
A. 保证全党服从中央,坚持党中央权威和集中统一领导
B. 严肃党内政治生活
C. 坚定理想信念
D. 夺取反腐败斗争压倒性胜利
【单选题】
人民军队建军之本、强军之魂是___。
A. 建设现代化军队
B. 信息化建设
C. 机械化建设
D. 党对军队的绝对领导
【单选题】
我军鲜明的特色和政治优势是___。
A. 艰苦奋斗
B. 党对军队的绝对领导
C. 作风优良
D. 军民融合
【单选题】
___是强军的必由之路,必须构建中国特色现代军事力量体系。
【单选题】
创新是引领发展的第一动力,必须坚持向___要战斗力,统筹推进军事理论、技术、组织、管理、文化等各方面创新,建设创新型人民军队。
A. 军民融合
B. 科技创新
C. 武器装备
D. 训练实战
【单选题】
___是人民军队战无不胜的根本保证
A. 武器装备
B. 党的领导
C. 作风优良
D. 能打胜仗
【单选题】
党对军队绝对领导的根本原则和制度,奠基于___。
A. 南昌起义
B. 井冈山根据地
C. 三湾改编
D. 古田会议
【单选题】
___是党对军队绝对领导的最高实现形式。
A. 政治委员指导
B. 军委主席负责制
C. 党委领导
D. 军队司令领导
【单选题】
___是党领导军队的根本制度。
A. 党委统一的集体领导下的首长分工负责制
B. 党政统一的集体领导下的民主集中制
C. 党委统一的集体领导下的分工负责制
D. 党政统一的集体领导下的首长分工负责制
【单选题】
___是党指挥枪原则落地生根的坚实基础。
A. 支部建在排上
B. 支部建在连上
C. 支部建在营上
D. 支部建在最基层上
【单选题】
___是保持人民军队本质和宗旨的根本保障。
A. 作风优良
B. 艰苦奋斗
C. 为人民服务
D. 党指挥枪
【单选题】
建设世界一流军队必须坚持政治建军、改革强军、科技兴军、依法治军。其中,作为人民军队立军之本的是___
A. 政治建军
B. 改革强军
C. 科技兴军
D. 依法治军
【单选题】
我军发展壮大、制胜未来的关键一招是___
A. 政治建军
B. 改革
C. 科技
D. 依法治军、从严治军
【单选题】
推进强军事业、把人民军队全面建成世界一流军队,必须牢固树立的唯一的根本的标准是___
A. 凝聚力标准
B. 生产力标准
C. 攻击力标准
D. 战斗力标准
【单选题】
构建中国特色现代军事力量体系是建设世界一流军队的力量基础。构建中国特色现代化军事力量体系的重点是___
A. 精干
B. 联合
C. 多能、高效
D. 优化作战力量结构
【单选题】
世界正处于大发展大变革大调整时期,___ 仍然是当今时代的主题。
A. 南北问题
B. 和平与发展
C. 反对霸权主义、强权政治问题
D. 建立国际经济政治新秩序问题
【单选题】
谋求世界各国经济共同发展的根本途径是 ___
A. 加速各国经济结构的调整
B. 推动南北对话
C. 加强南南合作
D. 建立公正、合理、平等、互利的国际经济新秩序
【单选题】
当今的美国与二战后初期实力相比,是一个实力呈下降趋势的大国;广大发展中国家、中国和___是反对美国单极独霸世界企图的主要力量。
A. 欧洲大国
B. 日本
C. 俄国
D. 印度
【单选题】
中国将高举和平、发展、合作、共赢的旗帜,恪守 ___ 的外交政策宗旨。
A. 提高中国的国际地位
B. 维护世界和平,促进共同发展
C. 反对霸权主义和强权政治
D. 构建人类命运共同体,实现全人类的解放
【单选题】
中国政府倡议,共建“一带一路”恪守联合国宪章的宗旨是坚持开放合作、和谐包容、市场运作和___
A. 互学互鉴
B. 互利共赢
C. 政治互信
D. 经济融合
【单选题】
中国外交政策的宗旨是___
A. 维护世界和平、促进共同发展
B. 独立自主
C. 和平共处五项原则
D. 加强和巩固同广大发展中国家的团结与合作
推荐试题
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled