相关试题
【多选题】
消防通信系统辅助决策数据包括___等信息。
A. 气象、电话号码
B. 消防地理、消防水源
C. 消防实力、灭火救援备用器材
D. 灭火剂储备、消防安全重点单位、各类火灾与灾害事故特性
【多选题】
现场350MHz消防无线通信网内各台应自觉遵守___的原则。
A. 属台服从主台
B. 下级台服从上级台
C. 固定台照顾移动台
D. 移动台照顾固定台
【多选题】
为防止通信覆盖越区,可限制___。
A. 接收机功率
B. 天线高度
C. 基站发射机功率
【多选题】
专用调度系统又分为___等移动通信系统。
A. 常规
B. 模拟集群
C. 数字集群
D. 单向
【多选题】
使用电台通信时应严格按照无线电台的___等相应规则呼叫
A. 呼叫程序
B. 回答程序
C. 发话程序
D. 收话程序、结束程序
【多选题】
在无线通信中,话音信号是靠对电磁波的___进行调制而将话音信息传播出去的。
【多选题】
在建立现场有线通信网时,应遵循的原则是___。
A. 先主后次、先急后缓
B. 先通后整
C. 先前方后后方、先长途后内部
D. 警报信息和特急电话优先传递
【多选题】
与有线通信相比,微波通信具有___的特点。
A. 灵活性大
B. 投资较省
C. 建设速度快
D. 耗电较大
【多选题】
消防通信按技术组成可分为哪三类___。
【多选题】
通信工作的原则是___。
A. 准确原则
B. 迅速原则
C. 求实原则
D. 保密原则
【多选题】
数字通信比模拟通信的优点是___。
A. 抗干扰能力强
B. 通信距离远、质量好
C. 便于加密处理,便于存储、处理、交换
D. 便于设备的集成化、微型化
【多选题】
简易通信方法主要有___。
A. 手旗孙
B. 哨、号
C. 灯光
D. 绳索
【多选题】
消防通信的具体工作内容:___。
A. 受理火警
B. 调度指挥
C. 现场通信
D. 消防勤务通信
【多选题】
灭火救援管理系统水源管理能实现哪些功能___?
A. 水源信息查询、统计;
B. 水源信息采集;
C. 检查、维修登记;
D. 水源熟悉。
【多选题】
灭火救援管理系统预案管理能实现哪些功能___?
A. 生成需制定灭火救援的对象(重大危险源、重点单位、重大活动等);
B. 灭火救援预案(对象/类型)的录入、审批和发布;
C. 为消防接处警系统和跨区域指挥调度系统提供数据支撑。
D. 管理预案单位的消防设施
【多选题】
无线通信网有以下几种组网方式___。
A. 单频单工大区覆盖网
B. 双频半双工大区覆盖网
C. 判选接收网
D. 多基地台中区覆盖网
【多选题】
通信网有以下几种基本结构___。
A. 网型
B. 星型
C. 复合型
D. 环型和总线型
【多选题】
增援力量及物资的调度方法:___
A. 途中调度
B. 计划调度
C. 临场调度
D. 紧急调度
【多选题】
对电话通信的要求是___。
A. 声音响度要适宜
B. 要有适当的清晰度
C. 减少听觉的疲乏和消除声的掩蔽现象
D. 电话机间传输衰耗对清晰度的影响要小
【多选题】
无线通信网中频道的选择方式有几种___。
A. 专用呼叫频道方式
B. 循环定位主试
C. 循环不定位方式
D. 循环分散定位方式
【多选题】
现场通信规范的内容包括:___
A. 现场通信组织
B. 现场350MHz无线通信组网
C. 辅助通信手段应用
D. 现场通信员交接
【多选题】
在计算机局部网络中,常用的传输介质主要有___。
A. 绞线
B. 同轴电缆
C. 光钎
D. 电话线
【多选题】
公安机关计算机信息系统安全保护工作___。
A. 坚持积极防御、综合防范的方针
B. 坚持安全技术与规范化管理相结合的原则
C. 坚持“专网专用”、“专机专用”的原则
D. 实行“谁管理、谁负责”、“谁使用、谁负责”的安全责任制
【多选题】
电话机的信号设备通常用来___。
A. 发送话音电流
B. 接受话音电流
C. 发送呼叫信号
D. 接受呼叫信号
【多选题】
无线电发射设备主要有哪几部分组成___。
【多选题】
市话通信网主要有几部分组成___。
A. 用户终端设备
B. 线路设备
C. 交换设备
D. 电源设备
【多选题】
火场无线通信网的应急调整的主要手段有___。
A. 改频
B. 转信
C. 合并
D. 启用备用台
【多选题】
消防无线通信网络包括___。
A. 城市覆盖网
B. 消防常规网
C. 灭火战斗网
D. 现场指挥网
【多选题】
消防通信按照技术组成可以分成___。
A. 有线通信
B. 无线通信
C. 计算机通信
D. 网络通信
【多选题】
通信电源系统由___组成。
A. 交流供电
B. 分散供电
C. 直流供电
D. 接地系统
【多选题】
现场无线通信应严格遵守___的原则,建立良好的现场通信秩序。
A. 属台服从主台
B. 主台服从属台
C. 下级台服从上级台
D. 上级台服从下级台
【多选题】
《公安消防部队通信管理规定》要求:通信系统基础文档包括___等。
A. 辖区道路水源图
B. 辖区消防车辆人员分布图
C. 无线通信联络组织图
D. 综合布线及配线图表
【多选题】
电台使用应注意___。
A. 携带手台时禁止手持天线
B. 电台必须使用配套天线
C. 电池装在电台上充电,应确保电台关机
D. 电台电池充电前最好先放电
【多选题】
无线电频率的特点是:___。
A. 资源有限
B. 实体的信道资源
C. 在时间上有可再用性
D. 容易形成多种干扰
【多选题】
通信业务考核主要考核___。
A. 通信人员业务能力
B. 指挥人员通信指挥水平
C. 通信设备运行维护状况
D. 通信任务完成情况
【多选题】
集群通信系统与GSM系统的主要区别___。
A. 集群通信强调指挥调度功能
B. 集群通信强调缩短呼叫建立时间
C. 集群通信要求简明扼要
D. 集群通信强调电话功能
【多选题】
常规移动通信系统的缺点是___。
A. 频率利用率低
B. 易阻塞
C. 接续慢
D. 不保密
【多选题】
在公安信息网上,严禁___等操作行为。
A. 非法侵入他人计算机信息系统
B. 未经授权对他人计算机信息系统的功能进行删除、修改、增加和干扰,影响计算机信息系统正常运行
C. 故意制作、传播计算机病毒等破坏程序
D. 一机两用
【多选题】
集群系统与常规系统有何不同___。
A. 集群系统信道利用率比常规系统高
B. 集群与常规相比具有通话私密性
C. 集群系统具有交换功能,可联网
D. 集群系统具有控制中心,具有控制管理功能
推荐试题
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256