相关试题
【判断题】
“三个代表”重要思想的本质是保持党的先进性
【判断题】
中国共产党第16次全国代表大会的历史性贡献是提出了全面推进党的建设的新的伟大工程
【判断题】
贯彻“三个代表”思想,关键在坚持群众路线
【判断题】
始终做到“三个代表”,是我们党的立党之本、执政之基、力量之源。这里的“本”、“基”、“源”,是指人民群众的支持和拥护
【判断题】
江泽民在2003年“七一”讲话中指出,实现人民的愿望,满足人民的需要,维护人民的利益,是“三个代表”思想的灵魂
【判断题】
十六大党章关于党的指导思想的表述是 马克思列宁主义为指导思想
【判断题】
“三个代表”重要思想是在 科学判断党的历史方位的基础上提出来的
【判断题】
中国共产党坚持先进性增强创造力的决定性因素是 坚持党的基本路线不动摇
【判断题】
贯彻“三个代表”重要思想,必须使全党始终保持与时俱进的精神状态,与时俱进就是 党的全部理论和工作要体现时代性,把握规律性,富于创造性
【判断题】
中国共产党能否始终做到与时俱进决定着 党能否始终保持党的先进性
【判断题】
十六大实现的我们党指导思想上的又一个与时俱进是 将“三个代表”重要思想确立为党必须长期坚持的指导思想
【判断题】
党的十七大第一次把以人为本、全面协调可持续发展的科学发展观写入党章。
【判断题】
科学发展观,是立足社会主义初级阶段基本国情,总结我国发展实践,借鉴国外发展经验,适应新的发展要求提出来的。
【判断题】
中国特色社会主义理论体系,是马克思主义中国化最新成果,是党最可宝贵的政治和精神财富,是全国各族人民团结奋斗的共同思想基础。
【判断题】
必须把提高领导水平和执政能力作为各级领导班子建设的核心内容抓紧抓好。
【判断题】
实现可持续发展的核心问题是实现经济社会和人口、资源、环境的协调发展。
【判断题】
推动城乡发展一体化,是解决“三农”问题的根本途径。
【判断题】
实现工业化、信息化、城镇化、农业现代化,是我国社会主义现代化建设的根本任务,也是加快形成新的经济发展方式、促进经济持续健康发展的根本动力。
【判断题】
发展社会主义民主政治,最重要的就是要坚持好、发展好适合我国国情的社会主义政治制度。
【判断题】
人民通过选举、投票行使权利和人民内部各方面在重大决策之前进行充分协商,尽可能就共同性问题取得一致意见,是我国社会主义民主的两种重要形式。
【判断题】
社会主义核心价值体系是兴国之魂,决定着中国特色社会主义发展方向。
【判断题】
受各种因素的影响,党的领导被忽视、淡化、削弱的状况还未得到明显改变。
【判断题】
我国人口面临严重的老龄化问题,养老金和农村低保标准增幅难以超越GDP增速。
【判断题】
中国特色社会主义法治体系日益完善,加快建设法治政府进入新阶段,但全社会法制观念还很差。
【判断题】
中国文化走出去步伐加快,中国故事吸引世界目光。
【判断题】
2014年10月底,全军政治工作会议在遵义召开,习近平同志带领中央军委全体成员和会议代表,一起重温了我党我军光荣历史和优良传统。
【判断题】
我国目前人均国民生产总值,相当于世界平均水平的80%左右,按国家和独立经济体排位,大致处在世界底层。
【判断题】
中国特色社会主义进入新时代,为解决人类问题贡献了中国智慧和中国方案。
【判断题】
全面从严治党,就要增强政治意识、大局意识、核心意识、看齐意识,坚决拥护党中央权威和集中统一领导。
【判断题】
全面从严治党,就要坚持反腐败无禁区、全覆盖、零容忍,坚定不移“打虎”“拍蝇”“猎狐”。
【判断题】
在中国特色社会主义条件下,党政军民学,东西南北中,党是领导一切的。
【判断题】
中国特色社会主义最本质的特征是人民当家作主。
【判断题】
中国特色社会主义制度的最大优势是人民代表大会制度。
【判断题】
坚持党的领导、人民当家作主、依法治国有机统一是社会主义经济发展的必然要求。
【判断题】
中国人民的梦想和各国人民的梦想是互不相通的。
【判断题】
中国梦是和平、发展、合作、共赢的梦,与世界各国人民的美好梦想息息相通。
【判断题】
中国梦指明了全党全国各族人民共同奋斗的目标。
【判断题】
中国梦为坚持和发展中国特色社会主义注入崭新内涵。
【判断题】
中国梦最大的特点,就是把国家民族个人作为一个命运共同体。
【判断题】
实现中国梦,意味着中国将成为世界第一超级大国。
推荐试题
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image