【单选题】
计算机硬件系统中最核心的部件是___。(易)(基础知识)
A. 微处理器
B. 主存储器
C. 只读光盘
D. 输入输出设备
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
计算机在实现工业自动化方面的应用主要表现在___。(难)(基础知识)
A. 数据处理
B. 数值计算
C. 人工智能
D. 实时控制
【单选题】
为提高字符和图形显示的清晰度,应选择___的显示器。(易)(基础知识)
A. 分辩率较高
B. 对比度较好
C. 高度较大
D. 屏幕尺寸较大
【单选题】
计算机发生死机, 且已不能接收键盘信息时, 应采用___方法重新启动机器。(难)(基础知识)
A. 热启动
B. 按CTRL+ALT+DEL
C. 复位启动
D. 过一段时间再热启动
【单选题】
计算机指令的集合称为___。(难)(基础知识)
A. 机器语言
B. 高级语言
C. 程序
D. 计算机语言
【单选题】
我们经常说的E-mail是___的简写。(易)(基础知识)
A. 电子商务
B. 电子邮件
C. 特快邮件
D. 网上聊天
【单选题】
最早面世的一台计算机是在美国设计并制造的,它的名字叫做___。(易)(基础知识)
A. ENIC
B. LYRIC
C. ENIAC
D. ENYA
【单选题】
操作系统的作用是___的接口(中)(基础知识)
A. 主机和外设
B. 用户和计算机
C. 系统软件和应用软件
D. 高级语言和机器语言
【单选题】
微机中最常用的输入设备之一是___。(易)(基础知识)
【单选题】
微型计算机最常用的输入设备和输出设备是___。(易)(基础知识)
A. 显示器和打印机
B. 键盘和鼠标
C. 打印机和鼠标
D. 键盘和显示器
【单选题】
操作系统是一种___。(易)(基础知识)
A. 便于计算机操作的硬件
B. 便与计算机操作的规范
C. 管理计算机系统资源的软件
D. 计算机系统
【单选题】
DOS命令实质上就是一段___。(易)(基础知识)
A. 数据
B. 可执行程序
C. 数据库
D. 计算机语言
【单选题】
IP地址是一个___位的二进制地址 。(中)(基础知识)
【单选题】
下列设备中属于输入设备的是___。(易)(基础知识)
A. 显示器
B. 打印机
C. 鼠标
D. 绘图仪
【单选题】
一般情况下,鼠标的左键用于___。(易)(基础知识)
【单选题】
在微型计算机中的存储介质中,访问速度最快的是___。(中)(基础知识)
A. 硬盘
B. 光盘
C. 软盘
D. ROM(只读存储器)
【单选题】
关机后,计算机内存(RAM)中的信息___。(中)(基础知识)
A. 不会丢失
B. 部分丢失
C. 全部丢失
D. 都不是
【单选题】
微型计算机中,用来执行程序指令,完成各种运算和控制功能的部件是___。(难)(基础知识)
A. 内存
B. 外存
C. 控制器
D. 中央控制单元
【单选题】
由CPU为主要芯片构成的计算机叫___。(中)(基础知识)
A. 微型计算机
B. 小型计算机
C. 大型计算机
D. 巨型计算机
【单选题】
下列关于硬盘驱动器,最合适的说法是___。(中)(基础知识)
A. 不用时应套入纸套,防止灰尘进入
B. 耐震性差,搬运时要注意保护
C. 没有易碎件,在搬运时不象显示器那样要注意保护
D. 全封闭,容量大,速度快
【单选题】
"办公自动化"的英文缩写是___。(易)(基础知识)
A. CAD
B. AI
C. MIS
D. OA
【单选题】
ENTER 键是___。(易)(基础知识)
A. 输入键
B. 回车换行键
C. 空格键
D. 换档键
【单选题】
有一种打印机具有打印精度非常高,打印速度快,无噪声,但格较高,这种打印机是___。(易)(基础知识)
A. 激光打印机
B. 喷墨打印机
C. 针式打印机
D. 热敏打印机
【单选题】
计算机网络最突出的优点是___。(易)(基础知识)
A. 共享资源
B. 精度高
C. 运算速度快
D. 内存容量大
【单选题】
通常人们所说的一个完整的计算机系统包括? ___。(易)(基础知识)
A. 主机,键盘,显示器
B. 计算机和它的外围设备
C. 系统软件和应用软件
D. 计算机的硬件系统和软件系统
【单选题】
灾害事故现场350MHz消防无线通信网应按照___的形式组织。(易)(应急通信)
A. 一级组网
B. 二级组网
C. 三级组网
D. 四级组网
【单选题】
消防___网,又称灭火救援战斗网(易)(应急通信)
【单选题】
火警受理系统___进行一次数据整理和备份(易)(消防业务信息系统)
A. 每半月
B. 每月
C. 每半年
D. 每季度
【单选题】
目前通信供电系统中广泛应用的直流供电方式是:___。(中)(基础知识)
A. 集中供电
B. 并联浮充供电
C. 分散供电
D. 串联浮充供电
【单选题】
UPS蓄电池环境温度应保持在___内。(易)(基础知识)
A. 25±2℃
B. 25±3℃
C. 20±2℃
D. 20±3℃
【单选题】
电缆可以按照其物理结构类型来分类,目前计算机网络使用最普遍的电缆类型有___、双绞线和光纤。(中)(基础知识)
A. 电话线
B. 同轴电缆
C. 光纤
D. 天线
【单选题】
对于重要的计算机系统,更换操作人员时,应当___系统的口令密码。(易)(基础知识)
A. 立即改变
B. 一周内改变
C. 一个月内改变
D. 3天内改变
【单选题】
在局域网中运行网络操作系统的设备是___。(中)(基础知识)
A. 网络工作站
B. 网络服务器
C. 网卡
D. 网桥
【单选题】
下列叙述中,___是正确的。 (中)(基础知识)
A. 反病毒软件总是超前于病毒的出现,它可以查、杀任何种类的病毒
B. 任何一种反病毒软件总是滞后于计算机新病毒的出现
C. 感染过计算机病毒的计算机具有对该病毒的免疫性
D. 计算机病毒会危害计算机用户的健康
【单选题】
计算机病毒最重要的特点是___。(易)(基础知识)
A. 可执行
B. 可传染
C. 可保存
D. 可拷贝
【单选题】
计算机感染病毒的可能途径之一是___。 (易)(基础知识)
A. 从键盘上输入数据
B. 随意运行外来的、未经消病毒软件严格审查的软盘上的软件
C. 所使用的软盘表面不清洁
D. 电源不稳定
【单选题】
计算机病毒除通过有病毒的软盘传染外,另一条可能途径是通过___进行传染。 (易)(基础知识)
A. 网络
B. 电源电缆
C. 键盘
D. 输入不正确的程序
【单选题】
在一般情况下,外存中存放的数据,在断电后___丢失。(易)(基础知识)
【单选题】
下面的叙述只有___是正确的。(中)(基础知识)
A. 计算机指令是指挥CPU进行输出的设备
B. 显示器既是输入设备又是操作设备
C. 微型计算机就是体积很小的计算机
D. 软盘驱动器属于主机,软盘属于外设
【单选题】
TCP/IP协议在Internet中的作用是___ (易)(基础知识)
A. 定义一套网间互连的通信规则或标准
B. 定义采用哪一种操作系统
C. 定义采用哪一种电缆互连
D. 定义采用哪一种程序设计语言
【单选题】
在下面的描述中,正确的是___。(中)(基础知识)
A. 外存的信息可直接被CPU处理
B. 键盘是输入设备,显示器是输出设备
C. 操作系统是一种很重要的应用软件
D. 计算机中使用的汉字编码和ASCII码是一样的
推荐试题
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring