相关试题
【填空题】
99、由外国传教士参加编撰,系统地介绍了欧洲的天文学著作,吸收了欧洲历法的成果的著作是___。
【填空题】
100、关于地理上的阴阳的解释,正确的是___。
【单选题】
贯彻“三个代表”重要思想,必须把( )作为党执政兴国的第一要务,不断开创现代化建设的新局面。
【单选题】
“三个代表”重要思想创造性地回答了:( )。
A. 什么是社会主义、怎样建设社会主义的问题
B. 建设什么样的党、怎样建设党的问题
C. 怎样建设中国特色社会主义的问题
D. 怎样发展马克思主义的问题
【单选题】
坚持党的基本路线不动摇,关键是坚持以( )为中心不动摇。
A. 四项基本原则
B. 马克思列宁主义、毛泽东思想、邓小平理论
C. 经济建设
D. “三个代表”重要思想
【单选题】
贯彻“三个代表”重要思想,核心是坚持党的( )。
A. 阶级性
B. 人民性
C. 先进性
D. 领导
【单选题】
十六大重申,在世界多样化格局中处理国际事务的精神是:( )。
A. 独立自主,自力更生
B. 平等互利,和睦相处
C. 相互尊重,求同存异
D. 互信、互利、平等、协作
【单选题】
中国主导创建的国际组织是( )。
A. 亚太经合组织
B. 上海合作组织
C. 中国—东盟自由贸易
D. 泛太组织
【单选题】
2004年3月11日凌晨,( )发生了旅客列车连环爆炸的大血案,导致190余人死亡,1800多人受伤。
A. 伊斯坦布尔
B. 马德里
C. 利雅得
D. 雅加达
【单选题】
2004年5月3日,12名中国工程师在巴基斯坦( )遭到汽车炸弹袭击。3名中国工程师不幸遇难,另有9人受伤。据巴警方5月4日透露,已拘捕13名涉嫌参与这起汽车爆炸案的嫌疑人。
A. 伊斯兰堡
B. 卡拉奇
C. 瓜达尔港
D. 拉瓦尔品第
【单选题】
2004年5月14日韩国宪法法院驳回国会3月12日提出的总统弹劾案,使( )恢复行使总统权力。
A. 金泳三
B. 金大中
C. 高建
D. 卢武铉
【单选题】
( )号飞船于美国东部时间2004年7月1日零时12分按计划顺利进入( )轨道,成为首个绕该行星飞行的人造飞船。
A. “勇气”火星
B. “机遇” 土星
C. “卡西尼”土星
D. “机遇”火星
【单选题】
根据公文作用的活动领域,公文可分为___。
A. 上行文、下行文、平行文
B. 通用公文、专用公文
C. 规范性公文、领导指导性公文、公布性公文、陈述呈请性公文、商洽性公文、证明性公文
D. 收文、发文
【单选题】
根据内容涉及国家秘密的程度,含有重要的国家秘密,泄露会使国家的安全和利益遭受严重损害的文件属于___。
A. 内部使用文件
B. 秘密文件
C. 机密文件
D. 绝密文件
【单选题】
以下有关公文的说法错误的有___。
A. 公文的基本组成部分有:标题、正文、作者、日期、印章或签署、主题词
B. 通用公文,又称行政公文,指各类机关普遍使用的文件,如请示、报告、函等
C. 通知的作者广泛,不受机关性质与级别层次的限制
D. 函为不相隶属机关间相互往来的正式公文,对受文者的行为没有强制性影响
【单选题】
在行政公文中,可用于上行文的公文种类有___。
【单选题】
公文的语言应该是___。
A. 庄重严谨
B. 华丽流畅
C. 威严有力
D. 古朴典雅
【单选题】
批复是答复下级请示的文件,是___。
A. 被动发文
B. 主动发文
C. 是对报告的批件
D. 下级没有请示,用来指导工作的
【单选题】
在公告的总体结构中,没有的一部分是___。
A. 标题
B. 正文
C. 主送单位
D. 成文时间
【单选题】
党政机关联合行文一般使用___机关的版头。
【单选题】
联合行文标注发文机关时,标在前面的机关是___。
A. 上级的
B. 组织序列表中靠前的
C. 主办的
D. 其他系统的
【单选题】
为了维护正常的领导关系,具有隶属关系或业务指导关系的机关之间应基本采取___。
A. 逐级行文
B. 多级行文
C. 越级行文
D. 直接行文
【单选题】
以下标题哪一个符合通报的撰写要求?___
A. 《关于打击盗掘和走私文物活动的通报》
B. 《国务院关于进行第三次全国人口普查的通报》
C. 《国务院关于打击假冒伪劣商品的通报》
D. 《国务院关于部分地区违反国家购销政策的通报》
【单选题】
以下注意事项为批办工作中特别强调要求做到的是___。
A. 认真研读公文,弄清对方意图、问题的性质与实际状况
B. 不得越权批办公文
C. 批办公文的方式有多种,如电话沟通、现场办公、面谈等
D. 要求加强协商,努力协调各方关系
【单选题】
发文处理程序具有很强的确定性与不可逆性,以下各阶段的先后排序应为___。
A. 会商→核稿→注发→发出
B. 核稿→用印→缮印→发出
C. 核稿→会商→用印→缮印
D. 拟稿→注发→签发→发出
【单选题】
县政府要将省政府的公文向所属的部门和乡、镇传达,所使用的公文应是___。
A. 转发性通知
B. 批转性通知
C. 指示性通知
D. 发布性通知
【单选题】
下列文种中,属于指挥性公文的是___。
【单选题】
某市政府办公厅2004年所发的、排序编为5号公文的发文字号的正确写法是___。
A. 政办发(2004)第5号
B. 厅发(2004)5号
C. 政办发〔2004〕5号
D. 政发[2004]5号
【单选题】
文章的四大要素是___。
A. 人物、事件、环境、情节
B. 材料、主题、结构、语言
C. 论点、论据、论证、论述
D. 描写、叙述、议论、说明
【单选题】
公文在制发的程序上,必须履行法定的___。
A. 审批手续
B. 会签手续
C. 登记手续
D. 承办手续
【单选题】
下列文种中属于陈述性的上行公文是___。
【单选题】
联合行文时确定成文时间的标准是___。
A. 以第一个签发机关负责人签发的日期为准
B. 以最后一个签发机关负责人签发的日期为准
C. 以文件撰写的日期为准
D. 以文件实际发出的日期为准
【单选题】
调查研究的基本程序可以分为四个环节,即准备工作、调查工作、研究工作和___。
A. 总结工作
B. 报告工作
C. 宣传工作
D. 归档工作
【单选题】
档案工作包括___。
A. 档案收集、档案管理、档案利用三个组成部分
B. 档案收集、档案传递、档案管理、档案利用四个组成部分
C. 档案清理、档案管理、档案利用三个组成部分
D. 档案清理、档案收集、档案管理、档案利用四个组成部分
【单选题】
公文的特点有___。
A. 公文具有严格的时效性
B. 公文具有典型的执行性
C. 公文具有严密的科学性
D. 公文具有广泛的社会性
【单选题】
___按公文内容的处理要求分类的。
A. 指挥性公文
B. 法规性公
C. 承办性公文
D. 知照性公文
【单选题】
国家行政机关利用公文表彰先进,这是公文___功能的体现。
A. 依据和凭证
B. 领导和指导
C. 宣传和教育
D. 联系和关照
【单选题】
按通常划分,会议纪要这一文种属于___。
A. 党政公文
B. 科技文书
C. 专用文书
D. 事务文书
推荐试题
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP