刷题
导入试题
【判断题】
涉密计算机只可以储存绝密级信息
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
不能用非加密传真机传真涉密信息
A. 对
B. 错
【判断题】
心理健康是指个体的内心世界具有安定感,并以良好的智能和良好的方式适应外部环境的心理状态
A. 对
B. 错
【判断题】
实际年龄是指人们的自然年龄
A. 对
B. 错
【判断题】
警察心理健康的特征与一般人是不一致的
A. 对
B. 错
【判断题】
严重的心理问题,属于心理失衡范畴,可以心理咨询或自我心理平衡途径得到适应性解决
A. 对
B. 错
【判断题】
警察心理健康问题,从根本上说,是一个全方位的社会问题,它关系到一个集体的战斗力,关系到一个地区的治安状况,关系到整个社会的长治久安
A. 对
B. 错
【判断题】
学习礼仪,依礼行事,不仅是形势的要求、工作的需要,也是队伍自身建设的需要
A. 对
B. 错
【判断题】
警务人员佩戴墨镜显得严肃庄重,可以在室内戴墨镜显示警察形象
A. 对
B. 错
【判断题】
在肃穆场合,步速应该缓慢,步伐要沉重,步幅小的像踏步,以示忧伤
A. 对
B. 错
【判断题】
警务人员可以有优先权,比如就餐等车、排队缴费等
A. 对
B. 错
【判断题】
公安民警着装执行任务时,不必随身携带《公安机关人民警察证》
A. 对
B. 错
【判断题】
警务人员在任何场合都要给上级行举手礼,比如在检验室、机房、病房等要及时停下工作,认真行礼
A. 对
B. 错
【判断题】
为他人做介绍时的顺序应遵循“尊者优先了解”的原则
A. 对
B. 错
【判断题】
会议通知应及时、准确。通知事项,如会议地点、名称,地址和路线,都应详细具体
A. 对
B. 错
【填空题】
___
【单选题】
(1)规划设计是构建物流系统的前提和基础,传统物流系统规划设计流程是_。___
A. 分析、规划设计、实施、评价、改造完善
B. 规划设计、分析、实施、评价、改造完善
C. 规划设计、分析、实施、改造完善、评价
D. 规划设计、实施、分析、改造完善、评价
【单选题】
(3)计算机仿真的真正作用不包括___。
A. 对物流系统进行数值分析
B. 识别系统瓶颈
C. 实施
D. 提出改进策略
【单选题】
(5)物流系统仿真的评估对象系统不包括___。
A. 配送中心
B. 生产系统
C. 拣货系统
D. 仓库存储系统
【单选题】
(1)系统的本质特征是___
A. 目的性
B. 整体性
C. 层次性
D. 相关性
【单选题】
(3)以下哪项不属于数学模型?___
A. 集中参数模型
B. 分布参数模型
C. 时间离散模型
D. 机动模型
【单选题】
(5)以下_是仿真的手段。___
A. 系统
B. 建模
C. 实验
D. 模型
【单选题】
(7)_即仿真时钟慢于实际时钟,也就是模型仿真的速度慢于实际系统运行的速度。___
A. 实时仿真
B. 亚实时仿真
C. 超实时仿真
D. 在线仿真
【单选题】
(9)半实物仿真又称___
A. 数学
B. 物理仿真
C. 半实物仿真
D. 物理一数学仿真
【单选题】
(1)状态的变化及其间隔具备某种不确定性的系统称为_。___
A. 确定性系统
B. 随机系统
C. 离散系统
D. 连续系统
【单选题】
(3)_可以用泊松分布刻画。___
A. 路口通过的车辆数目
B. 很多个随机变量的总和
C. 设备的使用寿命
D. 部件的故障时间
【单选题】
(5)随机变量的生成就是一个获得_的随机数的过程。___
A. 均匀分布
B. 特定分布
C. 正态分布
D. 泊松分布
【单选题】
(7)由两个或更多个独立随机变量的和形成的概率分布称为原始变量的_。___
A. 伯努利分布
B. 卷积分布
C. 正态分布
D. 泊松分布
【单选题】
(9)当随机数序列有规律地出现大数、小数或者大数和小数交替出现,说明这个随机数列中不同的数字之间可能存在某些___
A. 均匀性
B. 相关性
C. 独立性
D. 随机性
【单选题】
(1)在系统中的数量保持稳定的实体是—。___
A. 临时实体
B. 主动实体
C. 活动实体
D. 永久实体
【单选题】
(3)以下哪项属于临时实体?____
A. 理发店中的理发员
B. 生产线上的加工装配的机械
C. 交通路口的红绿灯
D. 驶入地下停车场的汽车
【单选题】
(5)_属于活动周期图建模实体的状态。___
A. 静寂
B. 静态
C. 动态
D. 周期
【单选题】
(7)_即状态元素,它表示一个场所,而且在该场所存放了一定的资源。___
A. 库所
B. 条件
C. 变迁
D. 资源
【单选题】
(1)在运用数学语言进行建模时,用微分方程来描述—系统。___
A. 连续
B. 离散
C. 混合
D. 任何
【单选题】
(3)以下哪种方法不是建立微分方程的常用方法?____
A. 按照事物变化规律列出方程
B. 微元分析法
C. 模拟近似法
D. 有限元法
【单选题】
(5)分布参数系统是指系统的_的函数。___
A. 时间
B. 空间
C. 时间和空间
D. 状态
【单选题】
的动态特征。___
A. 零点
B. 极点
C. 增益
D. 增益和极点
【单选题】
(1)对系统性能测度的估计通常包括点估计和___
A. 置信度估计
B. 置信水平估计
C. 区间估计
D. 仿真结果估计
【单选题】
(3)稳态型仿真结果分析常用方法,不包含___
A. 固定样本数量法
B. 批均值法
C. 再生法
D. 重复 一 删除法
【单选题】
(5)证实仿真系统是否准确地代表了开发者的概念描述和设计的过程是_。___
A. Validation
B. Verification
C. Accreditation
D. Certification
【单选题】
(7) VV的非正规方法中,不包含_。___
A. 过程审核
B. 概念执行
C. 图灵测试
D. 图形比较
推荐试题
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用