【简答题】
In August, the French and Russian armies engaged at Smolensk, in a battle that left over ten thousand dead on each side. Yet, the Russians were again able to retreat farther into Russian territory. Napoleon had won no decisive victory. He was now faced with a crucial decision. Should he continue to pursue the Russian army? Or should he keep his army in Smolensk for the approaching winter?
查看试卷,进入试卷练习
微信扫一扫,开始刷题
到了8月,法俄两军在斯摩棱斯克交战,这一战役中,双方各有上万人阵亡。可是,俄国人仍能在自己的国土上继续后撤。拿破仑未能取得决定性的胜利。此刻他面临着一个重要抉择。是继续追击俄国军队,还是把军队驻扎在斯摩棱斯克,在那儿度过将到的冬天?
相关试题
【简答题】
Napoleon took the gamble of pressing on to Moscow, 448 kilometers away. On September 7, 1812, the French and Russian armies met in fierce battle at Borodino, 112 kilometers west of Moscow. By nightfall, thirty thousand French and forty-four thousand Russians lay dead or wounded on the battlefield.
【简答题】
Again, the Russian army retreated to safety. Napoleon had a clear path to Moscow, but the occupation of the city became an empty victory. The Russians fled their capital. Soon after the French arrived, a raging fire destroyed two-thirds of the city. Napoleon offered a truce to Alexander I, but the Russian czar knew he could bide his time: "We shall let the Russian winter fight the war for us."
【简答题】
Napoleon soon realized he could not feed, clothe, and quarter his army in Moscow during the winter. In October 1812, he ordered his Grand Army to retreat from Moscow.
【简答题】
The French retreat turned into a nightmare. From fields and forests, the Russians launched hit-and-run attacks on the French. A short distance from Moscow, the temperature had already dropped to minus 4 degrees Celsius. On November 3, the winter's first snow came. Exhausted horses fell dead in their tracks. Cannon became stuck in the snow. Equipment had to be burned for fuel. Soldiers took ill and froze to death. The French soldiers dragged on, leaving the dead along every mile.
【简答题】
As the Russian army was gathering its strength, the French had to flee Russia to avoid certain defeat. At the Berezina River, the Russians nearly trapped the retreating French by burning the bridges over the swollen river. But Napoleon, by a stroke of luck, was able to build two new bridges. Thousands of French soldiers escaped, but at the cost of fifty thousand dead. Once across the Berezina, the tattered survivors limped toward Vilna.
【简答题】
Of the six hundred thousand soldiers Napoleon had led into Russia, less than one hundred thousand came back. The weakened French army continued its retreat westward across Europe. Soon, Britain, Austria, Russia, and Prussia formed a powerful alliance and attacked these stragglers. In March 1814, Paris was captured. Napoleon abdicated and went into exile, his empire at an end.
【简答题】
By early 1941, Adolf Hitler, leader of Nazi Germany, had seized control of most of Europe. To the east of Hitler's German empire was the Soviet Union. On June 22, 1941, without a declaration of war, Hitler began an invasion of the Soviet Union that was the largest military land campaign in history. Confident of a quick victory, Hitler expected the campaign to last no longer than three months. He planned to use the blitzkrieg, or "lightning war," tactics that had defeated the rest of Europe. The invasion had three broad thrusts: against Leningrad and Moscow and through the Ukraine.
【简答题】
Caught off guard by the invasion, Soviet leader Joseph Stalin instructed the Russian people to "scorch the earth" in front of the German invaders. Farms and factories were burned, destroyed, or rendered useless. During the first ten weeks of the invasion, the Germans pushed the front eastward, and the Russians suffered more than a million casualties.
【简答题】
In the north, the Germans closed in on Leningrad. Despite great suffering, however, the people of Leningrad refused to surrender. As the battle of Leningrad dragged on into winter, the city's situation became desperate. As food ran out, people died from hunger and disease. By the middle of the winter of 1941-1942, nearly four thousand people starved to death every day. Close to one million people died as a result of the siege.
【简答题】
In the center of Russia, Hitler's goal was the capture of Moscow. Because the Germans had anticipated a quick victory, they had made no plans for winter supplies. October arrived with heavy rains. "General Mud" slowed down the movement of the Germans' lightning attack.
【简答题】
As Hitler's armies drew closer and closer to Moscow, an early, severe winter settled over the Soviet Union, the harshest in years. Temperatures dropped to minus 48 degrees Celsius. Heavy snows fell. The German soldiers, completely unprepared for the Russian winter, froze in their light summer uniforms. The German tanks lay buried in the heavy snowbanks. The Russian winter brought the German offensive to a halt.
【简答题】
By the summer of 1942, Hitler had launched two new offensives. In the south, the Germans captured Sevastopol. Hitler then pushed east to Stalingrad, a great industrial city that stretched for 48 kilometers along the Volga River. Despite great suffering, Soviet defenders refused to give up Stalingrad.
【简答题】
In November 1942, the Russians launched a counterattack. With little or no shelter from the winter cold in and around Stalingrad, German troops were further weakened by a lack of food and supplies. Not until January 1943 did the Germans give up their siege. Of the three hundred thousand Germans attacking Stalingrad, only ninety thousand starving soldiers were left. The loss of the battle for Stalingrad finally turned the tide against Hitler. The German victories were over, thanks in part to the Russian winter.
【简答题】
During 1943 and 1944, the Soviet armies pushed the German front back toward the west. In the north, the Red Army broke the three-year siege of Leningrad with a surprise attack on January 15, 1944. Within two weeks, the heroic survivors of Leningrad saw their invaders depart. By March 1944, the Ukraine farming region was again in Soviet hands. On May 9, 1944, Sevastopol was liberated from the Germans. The Russians were now heading for Berlin.
【简答题】
For Hitler, the invasion of the Soviet Union had turned into a military disaster. For the Russian people, it brought unspeakable suffering. The total Soviet dead in World War II reached almost 23 million.
【简答题】
The elements of nature must be reckoned with in any military campaign. Napoleon and Hitler both underestimated the severity of the Russian winter. Snow, ice, and freezing temperatures took their toll on both invading armies. For the Russian people, the winter was an icy defender.
【单选题】
________不属于鼠类及体表寄生虫携带的病原体。___
A. 鼠疫耶尔森菌
B. 汉坦病毒
C. 黄病毒属病毒
D. 致病性钩端螺旋体
【单选题】
病媒生物死体样本运送,如果在24h内不能到达实验室的,运送过程中箱内温度应保持在_____。___
A. 4℃以下
B. 0℃以下
C. -20℃以下
D. 4℃以上
【单选题】
病媒生物死体样本运送,如果在装箱后4h内能够到达实验室的,运送过程中箱内温度应保持在______。___
A. 4℃以下
B. 0℃以下
C. -20℃以下
D. 4℃以上
【单选题】
病媒生物的死体样本运送,如果4h-24h内能到达实验室的,应将样品置于-30℃冷冻后再送样,运送过程中箱内温度应保持在________。___
A. 4℃以下
B. 0℃以下
C. -20℃以下
D. 4℃以上
【单选题】
恰加斯病也称为美洲锥虫病,其重要的传播媒介是________。___
A. 采采蝇
B. 厩螫蝇
C. 锥蝽
D. 埃及伊蚊
【单选题】
_______是黑热病内脏利什曼病的主要传播媒介。___
【单选题】
对于用作虫媒病毒分离或检测的蚊类标本,现场采集后应采用_______方式处置和运送。___
A. 杀虫剂熏杀+常温运输
B. 等蚊虫自然死亡+常温运输
C. 冷冻处死+常温运输
D. 冷冻处死+冷冻状态运输
【单选题】
_______不适用于入出境集装箱携带蝇、蚊、蠓的采集。___
A. 挥网法
B. 电动吸蚊器法
C. 直接捡取法
D. 二氧化碳诱蚊灯法
【单选题】
入境航空器应在______开始病媒生物监测。___
A. 卸货完成后
B. 抵达后
C. 等航空公司通知
D. 发现病媒生物时
【单选题】
进行集装箱携带输入性病媒生物监测时应准备的个人防护用品包括______。___
A. 乳胶手套、防护服
B. 防毒面具
C. 自给式呼吸器
D. 化学防护服
【单选题】
若要对采集到的输入性鼠类进行携带的病毒进行检测,取得其内脏器官的保存温度是_____。___
A. -80℃或以下
B. 0℃
C. 常温
D. 4℃-8℃
【单选题】
截获输入性活鼠或来自鼠疫流行区死鼠及经总署专家组确认和复核属于全国口岸首次截获的病媒生物应在______报告总署。___
A. 2小时之内
B. 8小时之内
C. 12小时之内
D. 24小时之内
【单选题】
入境船舶的蚊类和蝇类等双翅目病媒生物监测调查应白天在检疫锚地停泊期间进行,锚位距陆地距离不少于______,或在船舶靠泊后_____内进行。___
A. 1000 m;1h
B. 800 m、2 h
C. 400 m、4 h
D. 100 m、24 h
【单选题】
开展入境船舶输入性病媒生物监测工作中,在采集并保存病媒生物时由________陪同人员确认。___
A. 旅行社
B. 船方
C. 代理公司
D. 海事部门
【单选题】
在国境口岸或者交通工具上发现______有反常死亡或者死因不明的,国境口岸有关单位或者交通工具的负责人,必须立即向卫生检疫机关报告,迅速查明原因,实施卫生处理。___
【单选题】
采用鼠夹法监测鼠密度,应连续布放______。___
【单选题】
______不属于口岸区域鼠类常用监测方法。___
A. 鼠笼法
B. 鼠夹法
C. 目测法
D. 粉迹法
【单选题】
采用粉迹法监测鼠类密度时,滑石粉块的尺寸是______。___
A. 20cm×20cm
B. 30cm×30cm
C. 40cm×40cm
D. 50cm×50cm
【单选题】
______不属于蚊虫幼虫监测指标。___
A. 容器指数
B. 刺叮指数
C. 房屋指数
D. 布雷图指数
【单选题】
______不属于蚊虫成虫监测方法。___
A. 人帐诱法
B. 人工小时法
C. 小黑板法
D. 诱蚊器收集法
【单选题】
______不属于蝇类成虫监测方法。___
A. 诱蝇笼诱捕法
B. 捕蝇网网捕法
C. 直接目测法
D. 路径指数法
【单选题】
啮齿动物的臼齿常具有_____。___
【单选题】
______是仓鼠科特征。___
A. 背部有背囊
B. 尾部有尾囊
C. 口中两侧有颊囊
D. 腹部腹面有腹囊
【单选题】
_______蜱类假头基通常为矩形。___
A. 花蜱属
B. 璃眼蜱属
C. 扇头蜱属
D. 异扇头蜱属
推荐试题
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic