刷题
导入试题
【单选题】
(52题)对于企业来说,以下哪一项检索对其作用最大。___(单项选择题)
A. 会议论文的检索;
B. 学位论文的检索;
C. 专利商标信息的检索;
D. 专著的检索。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
(53题)以下哪一项是能够进行英文学术搜索的网站。___(单项选择题)
A. Yahoo;
B. Google Scholar;
C. Amazon;
D. eBay。
【单选题】
(54题)如果只有图片而不知图片名称或相关信息,可以在搜索引擎采用哪种方式进行检索。___(单项选择题)
A. 语音检索;
B. 图片检索;
C. 学术检索;
D. 新闻检索。
【单选题】
(55题)暑假里小叮当卖报纸,他每天早晨以8角的价格买30份《社区早报》,然后以每份1元的价格卖出,那么他每份报纸的利润率是。___(单项选择题)
A. 20%
B. 25%
C. 40%
D. 80%。
【单选题】
(56题)某投资者以2万元购买甲、乙两种股票,甲股票的价格为8元/股,乙股票的价格为4元/股,它们的投资额之比是4:1,在甲、乙股票价格分别为10元/股和3元/股时,该投资者全部抛出这两种股票,他共获利。___(单项选择题)
A. 3000元;
B. 3889元;
C. 4000元
D. 5000元。
【单选题】
(57题)一公司向银行借款34万元,欲按 (1/2):(1/3):(1/9)的比例分配给下属的甲、乙、丙三车间进行技术改造,则甲车间应得___万元。(单项选择题)
A. 4;
B. 8
C. 12;
D. 18。
【单选题】
(58题)小明卧室地面的长与宽分别为5米和4米,用边长为40厘米的正方形地砖铺满整个地面,至少需要多少___块这样的地砖。(单项选择题)
A. 115;
B. 120
C. 125
D. 130。
【单选题】
(59题)一款衬衣以原价格购买,可以买5件;降价后,可以买8件。则该衬衫降价的百分比是。___(单项选择题)
A. 25%;
B. 37.5%;
C. 40%;
D. 60%。
【单选题】
(60题)下面关于计量单位的描述错误的是。___(单项选择题)
A. 飞机每小时大约飞行800千米;
B. 课桌高约70厘米
C. 两袋水泥约重100千克
D. 1光年是365天。
【单选题】
(61题)下面关于计量单位的描述正确的是。___(单项选择题)
A. 如果每个学生体重是25千克,那么40个学生的体重就是1吨
B. 丽丽的身高是136分米
C. 1200千克—200千克=1000吨
D. 1千克棉花比1千克盐酸重。
【单选题】
(62题)BMI指数即体质指数,是用体重公斤数除以身高米数平方得出的数字,是目前国际上常用的衡量人体胖瘦程度的一个标准。成人的BMI数值与胖瘦关系如下:过轻(低于18.5),正常(18.5-24.99),过重(25-28),肥胖(28-32),非常肥胖(高于32)。小明身高为1.75米,体重为68千克,请问小明属于。___(单项选择题)
A. 过轻;
B. 正常;
C. 过重;
D. 肥胖。
【单选题】
(63题)我国和世界上大多数国家采用的1929年国际水文地理学会议通过的海里的标准长度,即1海里=1.852公里。一艘巡洋舰的速度为20节(1节等于每小时1海里),该舰的2小时可以行驶___千米。(单项选择题)
A. 74.08
B. 40
C. 37.04
D. 20。
【单选题】
(64题)布袋中装有1个红球,2个白球,3个黑球,它们除颜色外完全相同,从袋中任意摸出一个球,摸出的球是白球的概率是。___(单项选择题)
A. 1/5
B. 1/6
C. 1/2
D. 1/3。
【单选题】
(65题)有一个正方体,6个面上分别标有1-6这6个数字,投掷这个正方体一次,则出现向上一面的数字是偶数的概率为。___(单项选择题)
A. 1/3;
B. 1/2;
C. 1/6;
D. 1/4。
【单选题】
(66题)一年按365天算,两个人的生日相同的概率为。___(单项选择题)
A. 1/12;
B. 1/30;
C. 1/365;
D. 1/4。
【单选题】
(67题)下图是由四个直角边分别是3和4的全等的直角三角形拼成的“赵爽弦图”,小亮随机的往大正方形区域内投针一次,则针扎在阴影部分的概率是。___(单项选择题)
A. 1/25;
B. 1/12
C. 1/3
D. 1/4。
【单选题】
(68题)晓芳抛一枚硬币10次,有7次正面朝上,当她抛第11次时,正面向上的概率为。___(单项选择题)
A. 1/2
B. 1/11
C. 1/7
D. 1/18。
【单选题】
(69题)三个不同商店的消费者的年顾客数量的平均数是。___(单项选择题)
A. 2416
B. 1534
C. 2150
D. 2450。
【单选题】
(70题)中位数是对于有限的数集,可以通过把所有观察值高低排序后找出正中间的一个作为中位数。7个病人运动伤害的康复天数如下,请计算康复天数的中位数是。___(单项选择题)
A. 32
B. 12
C. 34
D. 27。
【单选题】
(71题)下面的散点图中的点呈现出___关系。(单项选择题)
A. 正相关
B. 负相关
C. 不相关
D. 其他。
【单选题】
(72题)请选出以下四只股票中波动率最低的一支股票。___(单项选择题)
A.
B.
C.
D.
【单选题】
(73题)点1至点100来自同一个序列,请问第101个点最有可能在以下哪个位置。___(单项选择题)
A. A区域;
B. B区域
C. C区域
D. D区域。
【单选题】
(74题)董事长:如果提拔小李,就不提拔小孙。以下哪项符合董事长的意思。___(单项选择题)
A. 如果不提拔小孙,就提拔小李;
B. 不能小李和小孙都提拔
C. 小李和小孙都不提拔
D. 除非提拔小李,否则不提拔小孙。
【单选题】
(75题)北方人不都爱吃面食,但南方人都不爱吃面食。如果已知上述第一个断定真,第二个断定假,则以下哪项据此不能确定真假。___(单项选择题)I 北方人都爱吃面食,有的南方人也爱吃面食;II有的北方人爱吃面食,有的南方人不爱吃面食;III北方人都不爱吃面食,南方人都爱吃面食。
A. 只有I
B. 只有II
C. 只有III
D. 只有II和III。
【单选题】
(76题)网球男子单打比赛在A、B、C和D四人之间进行。对于谁能夺冠,甲乙丙丁四人进行猜测。甲:A或者B会夺冠;乙:A和B不可能夺冠;丙:D不可能夺冠;丁:C会夺冠。结果表明只有一个人才对了,请问是___夺冠。(单项选择题)
A. A夺冠;
B. B夺冠
C. C夺冠
D. D夺冠
【单选题】
(77题)某数学家对某经济学家说,“数学对于经济学研究是不可或缺的”;经济学家反驳说,“再怎么学习数学对于经济学都是不够的”,然后举了很多例子,最后总结说,“所以我不同意你的观点”。请问该经济学家的论证犯了什么错误。___(单项选择题)
A. 把必要条件当成充分条件;
B. 把充分条件当成必要条件
C. 把充要条件当成必要条件
D. 把充要条件当成充分条件。
【单选题】
(78题)布莱德的年龄是其父亲年龄的一半,而他父亲的年龄是他侄女艾美达年龄的三倍,他们三个人的年龄之和等于布莱德88岁祖母的年龄。布莱德的年龄是多大。___(单项选择题)
A. 24
B. 30
C. 33
D. 88。
【单选题】
(79题)掷两颗骰子,两颗骰子点数之和必然在2和12之间,问点数之和出现的可能性最大是多少。___(单项选择题)
A. 10;
B. 8;
C. 7;
D. 6。
【单选题】
(80题)将正整数按如图所示的规律排列下去,若用有序数对(n,m)表示第n排、第m个数,比如(4,3)表示的数是9,则(7,2)表示的数是。___(单项选择题)1/ 2 3/ 4 5 6/7 8 9 10/…………………………
A. 14
B. 20
C. 21
D. 23。
【单选题】
(81题)根据牛顿的万有引力定律,即任意两个物体有通过连心线方向上的力相互吸引。该引力大小与它们质量的乘积成正比与它们距离的平方成反比。请问如下两个物体之间是否存在万有引力。___(单项选择题)I 地球和月球之间 ;II 地球和地球上的人之间; III 上升的火箭和火星; IV 上升的火箭和地面上的人。
A. 只有I;
B. 只有I和II
C. 只有I,II和III
D. I,II,III IV。
【单选题】
(82题)下列事件中,必然事件是。___(单项选择题)
A. 中秋节晚上能看到月亮;
B. 今天考试小明能得满分;
C. 早晨的太阳从东方升起;
D. 明天气温会升高。
【单选题】
(83题)分子是由 ___ 构成的。(单项选择题)
A. 离子;
B. 粒子;
C. 原子;
D. 电子。
【单选题】
(84题) “墙内开花墙外香”的原因是。___(单项选择题)
A. 分子不断分解
B. 分子变成原子
C. 分子是静止的
D. 分子不断运动.
【单选题】
(85题)气体可压缩存储在钢瓶中是因为。___(单项选择题)
A. 分子之间有间隔;
B. 分子有弹性;
C. 分子不断运动
D. 分子可分解为原子。
【单选题】
(86题)水蒸发时,水由液态变为气态,水分子。___(单项选择题)
A. 分解成氢原子与氧原子;
B. 体积膨胀;
C. 没有改变;
D. 质量变小。
【单选题】
(87题)物质从固态变成液态的过程叫做。___(单项选择题)
A. 溶解
B. 熔化
C. 升华
D. 凝固。
【单选题】
(88题)水“开”了这一生活用语在物理中叫做。___(单项选择题)
A. 沸腾
B. 煮开
C. 液化
D. 升华。
【单选题】
(89题)以下哪一种力不是四大基本相互作用力。___(单项选择题)
A. 万有引力
B. 弹力
C. 强相互作用
D. 电磁相互作用。
【单选题】
(90题)以下哪一种现象和气压无关。___(单项选择题)
A. 马德堡半球实验
B. 伯努利效应
C. 高压锅煮饭
D. 冬天窗上的冰花。
【单选题】
(91题)大气压是大气产生的压强,标准大气压等于760mm水银柱产生的压强,大小为1.013×105Pa,当随着高度增高的时候大气压会怎样变化。___(单项选择题)
A. 变大
B. 变小
C. 不变
D. 先变小后变大。
【单选题】
(92题)以下哪一种做法是为了减小摩擦力。___(单项选择题)
A. 往锁眼里加碳粉;
B. 体操运动员上场前涂的白色粉末;
C. 下雪后往路面上撒煤渣。
推荐试题
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用