刷题
导入试题
【单选题】
正确发挥意识能动作用的客观前提是___
A. 个人积极性的发挥
B. 集体智慧的调动
C. 解放思想
D. 对客观规律的正确反映
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
设想脱离物质的运动会导致___
A. 形而上学
B. 机械唯物论
C. 唯心主义
D. 二元论
【单选题】
时间具有一维性,这是指它的___
A. 可变性
B. 无限性
C. 不可逆性
D. 连续性
【单选题】
语言是意识的物质外壳,没有语言就不会有思维和意识,这种观点属于___
A. 唯心主义
B. 形而上学
C. 马克思主义哲学
D. 历史唯心主义
【单选题】
“狼孩”没有意识,这一事实说明___
A. 意识是生物界长期发展的产物
B. 意识是社会的产物
C. 意识是人脑发展的产物
D. 意识是对客观世界的反映
【单选题】
“意识是人脑分泌的特殊物质,”这是___
A. 辩证唯物主义的观点
B. 机械唯物主义的观点
C. 朴素唯物主义的观点
D. 庸俗唯物主义的观点
【单选题】
人工智能的出现和发展证明___
A. 意识不是人类所特有的现象
B. 物质是意识产生的基础
C. 对人脑机能的认识已经完成
D. 人工思维最终会超过人类思维
【单选题】
“动中有静,静中有动”说明___
A. 物质和运动的统一
B. 绝对运动和相对静止的统一
C. 有限性和无限性的统一
D. 唯物主义和辩证法的统一
【单选题】
古希腊哲学家克拉底鲁指出,万物瞬息万变,不可捉摸,人连一次也不能踏进同一条河流。这是一种___
A. 唯心主义的观点
B. 形而上学的观点
C. 相对主义诡辩论的观点
D. 庸俗进化论的观点
【单选题】
能够证明时间、空间的绝对性和相对性相统一的自然科学理论是___
A. 电磁场理论
B. 原子结构学说
C. 牛顿力学理论
D. 相对论
【单选题】
时间___
A. 是客观的
B. 是有限的
C. 是可知的
D. 是相对的
【单选题】
“机不可失,时不再来”指的是___
A. 时间的连续性
B. 时间的一维性
C. 时间的顺序性
D. 时间的重复性
【单选题】
是 ___
A. 主张充分发挥意识能动作用的观点
B. 主观唯心主义的观点
C. 客观唯心主义的观点
D. 朴素唯物主义的观点
【单选题】
在客观规律面前,人的主观能动性表现在___
A. 人可以改变规律
B. 人可以创造规律
C. 人可以消灭规律
D. 人可以认识和利用规律
【单选题】
事物的联系和运动之间的关系___
A. 相互联系构成运动
B. 运动和发展引起质变
C. 发展引起运动
D. 普遍联系和永恒发展
【单选题】
唯物辩证法的总特征是___
A. 量变和质变的观点
B. 辩证否定的观点
C. 联系和发展的观点
D. 对立统一的观点
【单选题】
___
A. 事物的联系是普遍的、无条件的
B. 事物的联系是现实的、具体的
C. 事物的运动是客观的、绝对的
D. 事物发展的根本原因是事物的内部矛盾
【单选题】
“割下来的手就不再是人手”这句话体现了___
A. 形而上学片面的、孤立的观点
B. 辩证法普遍联系的观点
C. 唯心主义的观点
D. 诡辩论的观点
【单选题】
唯物辩证法认为发展的实质是___
A. 事物数量的增加
B. 事物根本性质的变化
C. 事物的一切运动变化
D. 新事物的产生和旧事物的灭亡
【单选题】
区分新事物和旧事物的标志在于看它们___
A. 是不是在新的历史条件下出现的
B. 是不是符合事物发展规律、有强大生命力
C. 是不是具有新形式和新特点
D. 是不是得到绝大多数人的承认
【单选题】
质量互变规律揭示了___
A. 事物发展的动力和源泉
B. 事物发展的状态和过程
C. 事物发展的方向和道路
D. 事物发展的两种趋势
【单选题】
质和事物的存在是___
A. 相互对立的
B. 相互包含的
C. 直接同一的
D. 相互转化的
【单选题】
在实际工作中,要注意掌握分寸,防止“过”或“不及”,其关键在于___
A. 抓住事物的主要矛盾
B. 确定事物的质
C. 认识事物的量
D. 把握事物的度
【单选题】
区分量变和质变的根本标志是看___
A. 事物的变化是否显著
B. 事物的变化是否迅速
C. 事物的某些属性是否发生了变化
D. 事物的变化是否超出度的范围
【单选题】
量变的复杂性是指___
A. 量变的程度发展不同
B. 量变形式的多样性和总的量变过程中有部分质变
C. 质变中有量的扩张
D. 量变有在度的范围内的变化和突破度的范围的变化
【单选题】
量变中的阶段性部分质变表现了___
A. 事物内部各部分之间变化的不平衡性
B. 事物整体与某些构成部分之间变化的不平衡性
C. 事物与事物之间变化的不平衡性
D. 事物的本质属性与非本质属性之间变化的不平衡性
【单选题】
量变中的局部性部分质变是___
A. 事物的本质属性与非本质属性之间变化不平衡性的表现
B. 事物的各个部分之间变化不平衡性的表现
C. 事物的内部矛盾和外部条件变化不平衡性的表现
D. 事物的量和质变化不平衡性的表现
【单选题】
揭示事物发展的趋势和道路的规律是___
A. 对立统一规律
B. 质量互变规律
C. 否定之否定规律
D. 联系和发展规律
【单选题】
“肯定和否定相互渗透,在一定意义上,肯定就是否定。”这是一种___
A. 相对主义诡辩论的观点
B. 唯物辩证法的观点
C. 主观唯心主义的观点
D. 形而上学的观点
【单选题】
事物的否定方面是指___
A. 事物的积极方面
B. 事物的消极方面
C. 事物中维持其存在的方面
D. 事物中促使其灭亡的方面
【单选题】
作为辩证的否定的“扬弃”是___
A. 既保留又继承
B. 彻底抛弃
C. 既克服又保留
D. 矛盾的调和
【单选题】
辩证的否定是事物发展的环节,因为辩证的否定___
A. 把旧事物完全抛弃
B. 使旧事物发生量变
C. 是新事物产生、旧事物灭亡
D. 是从外部强加给事物的
【单选题】
否定之否定规律___
A. 在事物完成一个发展周期时才能完整地表现出来
B. 在事物发展过程中任何一点上都可以表现出来
C. 在事物经过量变和质变两种状态后表现出来
D. 在事物发展过程中经过肯定和否定两个阶段表现出来
【单选题】
事物发展的周期性体现了___
A. 事物发展的直线性与曲折性的统一
B. 事物发展是一个不断地回到出发点的运动
C. 事物发展的周而复始的循环性
D. 事物发展的前进性和曲折性的统一
【单选题】
直线论的错误在于只看到___
A. 事物发展的周期性而否认了前进性
B. 事物发展的前进性而否认了曲折性
C. 事物发展的间接性而否认了连续性
D. 事物发展的曲折性而否认了周期性
【单选题】
循环论的错误在于___
A. 只看到事物发展的普遍性,没有看到事物发展过程的特殊性
B. 只看到事物的绝对运动,没有看到事物的相对静止
C. 只看到事物发展道路的曲折性,没有看到事物发展趋势的前进性
D. 只看到新旧事物之间的连续性,没有看到新旧事物之间的间断性
【单选题】
对立统一规律揭示了___
A. 事物发展的动力和源泉
B. 事物发展的状态和过程
C. 事物发展的方向和道路
D. 事物发展的两种趋向
【单选题】
唯物辩证法的实质和核心是___
A. 对立统一规律
B. 质量互变规律
C. 否定之否定规律
D. 联系和发展的规律
【单选题】
辩证法所说的矛盾是指___
A. 人们思维中的前后不一的自相矛盾
B. 事物之间或事物内部各要素之间的对立统一
C. 对立面之间的相互排斥
D. 事物之间或事物内部各要素之间的相互依赖
【单选题】
矛盾的基本属性是___
A. 普遍性和特殊性
B. 绝对性和相对性
C. 变动性和稳定性
D. 斗争性和同一性
【单选题】
依据是___
A. 矛盾的同一性和斗争性辩证关系的原理
B. 矛盾的普遍性和特殊性辩证关系的原理
C. 事物发展的量变和质变辩证关系的原理
D. 事物发展的内因和外因辩证关系的原理
推荐试题
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用