相关试题
【单选题】
利福平(或利福霉素)抑制结核函的机制是___
A. 抑制细胞DNA聚合酶
B. 抑制细菌DNA聚合酶
C. 抑制细胞RNA聚合酶
D. 抑制细菌RNA聚合酶
E. 抑制细菌蛋白质合成
【单选题】
利福平(或利福霉素)抑制结核菌的机制是它抑制了菌体RNA聚合酶中的___
A. σ亚基
B. β亚基
C. β'亚基
D. σ亚基
E. ρ因子
【单选题】
在DNA分子中,转录起始的5'上游端___
A. 原核生物-35区存在TATA盒是RNA-po1识别的位点
B. 原核生物-10区存在TATA盒是RNA-po1结合的位点
C. 原核生物-35区存在TTGACA序列是RNA-po1结合的位点
D. 原核生物-10区存在TTGACA序列是RNA-po1识别的位点
E. 真核生物不存在TATA盒
【单选题】
12,哪项不是原核生物转录终止可依赖的因素___
A. ρ因子
B. σ因子
C. 转录产物RNA3' 端出现可对折互补序列,形成茎环结构
D. 转录产物RMA3嘴出现寡聚u,与模板DINA 结合力小
E. 终止因子与产物RENA结合促使其与DNA分离
【单选题】
真核细胞中由RNA po1Ⅲ催化生成的产物是___
A. tRNA 前体
B. mRNA
C. hnRNA
D. snRNA
E. 45sRNA
【单选题】
真核细胞中mRNA前体由哪种酶催化生成___
A. RNA-po1Ⅰ
B. RNA-po1Ⅱ
C. RNA po1Ⅲ
D. RNA-po1Mt
E. 核心酶+σ因子
【单选题】
RNA链为5-ACGAUC-3',它的编码链是___
A. 5'-ATCGATC 3'
B. 5'-AUCGAUC-3'
C. 3'-ATCGATC-5'
D. 5'-GATCGAT-3'
E. 5'-GAUCGAU-3'
【单选题】
DNA聚合酶与RNA聚合酶相比___
A. 均可利用核糖核苷三磷酸合成多核苷酸
B. 均衢要DNA的两条链为模板
C. 均衢引物
D. 均催化3', 5'磷酸二酯键形成
E. 催化多核苷酸链合成的方向均为3'→5'
【单选题】
转录与复制有许多共同点,下列叙述不正确的是___
A. 真核生物的转录与复制均在细胞核内进行
B. 合成新链的方向均为5'→3'
C. 均衢DNA为模板
D. 原料均为三磷酸核苷
E. 两类核酸聚合酶均能催化两个核苷酸以3',5'磷酸二酯键相连
【单选题】
核酶是___
A. 特异水解核酸的酶
B. 水解核糖核酸的酶
C. 具有特殊结构的核糖核酸
D. 具有催化活性的RNA与蛋白质复合体
E. 具有特殊结构并具有催化活性的一类RNA
【单选题】
真核细胞mRNA转录后加工修饰,不正确的是___
A. 5'端加m7Gppp帽
B. 加-CCA尾
C. 切除内含子
D. 连接外显子
E. 3'端加polyA
【单选题】
下列叙述中正确的是___
A. T只存在于DNA分子中
B. 原核生物的转录与翻译被核膜隔开
C. 指导RNA合成的DINA链叫做编码链
D. DNA聚合酶不能催化两个dNTP之间形成磷酸二酯键故衢引物
E. RNA聚合酶不能催化两个与模板互补、相邻的NTP之间形成磷酸二酯键
【单选题】
tRNA转录后加工修饰形成稀有碱基,其中没有___
A. 胸腺嘧啶
B. 次黄嘌呤
C. γ-甲基鸟嘌呤
D. 二氢尿嘧啶
E. 假尿苷
【单选题】
RNA复制中不正确的是___
A. 是RNA病毒在宿主细胞内扩增的-种方式
B. 原料为dNTP
C. 是以RNA为模板合成RNA的过程
D. 需要依赖RNA的RNA聚合酶
E. 新链合成方向为5'→3'
【单选题】
核酶RMA是在研究哪种RMA的前体中首次发现的___
A. hnRNA
B. tRNA 前体
C. snRNA
D. scRNA
E. rRNA前体
【单选题】
下列关于DNA指导RNA合成的叙述中错误的是___
A. 只有在DNA存在时,RNA聚合酶才能催化生成磷酸二酯键
B. 转录过程中RUA聚合酶需要引物
C. RNA链的合成方向是5'→3’
D. 大多数情况下只有一股DNA作为RNA的模板
E. 合成的RNA链没有环状的
【单选题】
真核剪接体由以下哪些成分组成___
A. 大肠杆菌mRNA
B. seRNA
C. UsnRNP
D. , 5SrRNA
E. mtRNA
【单选题】
以下对tRNA合成的描述错误的是___
A. RNA聚合酶Ⅲ参与tRNA前体的生成
B. tRNA前体在酶作用下切除5'和3'末端处多余的核苷酸
C. tRNA前体中含有内含子
D. tRNA3'末端需加上ACC-0H
E. tRNA前体还需要进行化学修饰加工
【单选题】
以下对rRNA的转录加工的描述,错误的是___
A. 染色体DNA中rRNA基因是多拷贝的
B. 真核生物的5SrRNA自成独立的体系,不进行修饰和剪切
C. 真核生物45SrRNA前体中包括18S, 5. 8S 及28SrRNA
D. 原核生物30SrRNA前体中含有16S,23S 及5SrRNA
E. 真核生物45SrRNA前体经-次剪切成为41SrRNA中间前体
【单选题】
哺乳动物的载脂蛋白B mRNA的编辑是___
A. U→C的取代
B. A→G的取代
C. U的插入
D. U的删除
E. C→U的取代
【单选题】
RNA 的转录过程分为___
A. 解链、引发、链的延长和终止
B. 转录的起始、延长和终止
C. 核蛋白体循环的启动、肽链的延长和终止
D. RNA 的剪切和剪接,末端添加核苷酸、修饰及RNA编辑
E. 以上都不是
【单选题】
原核生物中DNA指导的RNA 聚合酶核心酶的组成是___
A. α2 β β'
B. α2 β β'σ
C. α α β
D. α α β'
E. α β β'
【单选题】
真核细胞中参与复制与转录的聚合酶对利福平敏感的是___
A. RNA聚合酶Ⅱ
B. RNA 聚合酶Ⅲ
C. RNA 聚合酶Ⅰ
D. mtRNA 聚合酶
E. RNA 指导的DNA聚合酶
【单选题】
真核细胞中经RNA聚合酶Ⅰ催化转录的产物是___
A. hnRNA
B. tRNA
C. 5SrRNA
D. U4snRNA 及UssnRNA
E. 5. 8S, 18S,28SrRNA前体
【单选题】
原核mRNA转录后需要进行的5'端加工过程是___
A. 加帽子
B. 加聚A帽
C. 剪切和剪接
D. RNA编辑
E. 无特殊加工
【单选题】
催化RNA病毒合成的酶是___
A. RNA复制酶
B. RNA聚合酶I
C. RNA聚合酶Ⅱ
D. RNA聚合酶Ⅲ
E. RNA聚合酶C
【单选题】
原核生物经转录作用生成的mRNA是___
A. 内含子
B. 单顺反子
C. 多顺反子
D. 间隔区序列
E. 插入子
【单选题】
真核生物经转录作用生成的mRNA是___
A. 内含子
B. 单顺反子
C. 多顺反子
D. 间隔区序列
E. 插入序列
【单选题】
关于真核生物RNA聚合酶叙述正确的是___
A. 真核生物RNA聚合酶有3种
B. 由4个亚基组成的复合物
C. 全酶中包括-个σ因子
D. 全酶中包括两个β因子
E. , 全酶中包括一个α因子
【单选题】
DNA分子上能够被RNA聚合酶特异结合的部位为___
A. 外显子
B. 增强子
C. 密码子
D. 终止子
E. 启动子
【单选题】
基因启动子是指___
A. 编码mRNA的DNA序列的第一个外显子
B. 编码mRMA的DNA序列的第一个内含子
C. 开始转录生成RNA的那段DNA序列
D. RNA聚合酶最初与DNA结合的那段DNA序列
E. 阻過蛋白结合的DNA序列
【单选题】
原核生物中识别DNA模板上转录起始点的是___
A. RNA聚合酶的核心酶
B. RNA聚合酶的σ因子
C. RNA聚合酶的α亚基
D. RNA 聚合酶的β亚基
E. ρ因子
【单选题】
原核生物的mRNA转录终止需要下列哪种因子___
A. 释放因子
B. Rho因子
C. 信号肽
D. 因子
E. DnaB
【单选题】
真核生物转录生成的mRNA前体的加工过程不包括___
A. 5'末端加帽
B. 3'末端加多聚A尾
C. 甲基化修饰
D. 磷酸化修饰
E. 剪接去除内含子并连接外显子
【单选题】
下列关于转录过程的叙述,正确的是___
A. 以RNA为模板合成cDNA
B. 需要4种dNTP为原料
C. 合成反应的方向为3'→5'
D. 转录起始不需要引物参与
【单选题】
8, RNA转录与DNA复制中的不同点是___
A. 遗传信息储存于碱基排列顺序中
B. 新生链的合成以碱基配对的原则进行
C. 合成方向为5'→3'
D. RNA聚合酶缺乏校正功能
【单选题】
下列关复制和转录过程异同点的叙述,错误的是___
A. 复制和转录的合成方向均为5'→3’
B. 复制和转录过程均需以RNA为引物
C. 复制的原料为dNTP,转录的原料为NTP
D. 二者的聚合酶均催化形成3',5'磷酸二酯键
E. DNA双链中只有一条链转录,两条链均可被复制
【单选题】
以5'-ACTAGTCAG-3' (DNA链)为模板合成相应mRNA链的核苷酸序列为___
A. 5'-TGATCAGCA- 3'
B. 5'-UGAUCAGUC-3'
C. 5'-CTGACTAGT-3'
D. 5'-CUGACUAGU-3'
E. 5'-CAGCUGACU-3'
【单选题】
真核生物RNA聚合酶Ⅱ催化转录后的产物是___
A. tRNA
B. hnRNA
C. 5.8S-rRNA
D. 5S-rRNA
【单选题】
真核生物中,催化转录产物为hnRNA的RNA聚合酶是___
A. RNA聚合酶核心酶
B. RNA聚合酶I
C. RNA聚合酶II
D. RNA聚合酶III
E. RNA聚合酶β亚基
推荐试题
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15