相关试题
【单选题】
以整体寓言构文形式来阐发深微玄奥的哲学道理的作品是___
A. 《三王墓》
B. 《秋水》
C. 《徐文长传》
D. 《前赤壁赋》
【单选题】
被鲁迅先生称之为“史家之绝唱,无韵之《离骚》”的史书是___
A. 《史记》
B. 《战国策》
C. 《资治通鉴》
D. 《五代史》
【单选题】
《战国策》一书的整理编订者是___
A. 郭茂倩
B. 刘向
C. 司马迁
D. 班固
【单选题】
中国最早的“新感觉派”的代表作家是___
【单选题】
下列诗歌中,被王国维在《人间词话》中称赞为“最得风人深致”的是___
A. 《蒹葭》
B. 《早雁》
C. 《饮酒》
D. 《秋兴》
【单选题】
《饮酒》(其五)中,体现诗人鄙弃世俗功名心态的诗句是___
A. 结庐在人境,而无车马喧
B. 采菊东篱下,悠然见南山
C. 山气日夕佳,飞鸟相与还
D. 此中有真意,欲辩已忘言
【单选题】
《再别康桥》中,诗人用以自喻的事物是___
【单选题】
戴望舒《雨巷》中,“雨巷”的象征意义是___
A. 坎坷而迷茫的人生道路
B. 高洁而幽然的美好理想
C. 迷茫凄苦中的探索寻求
D. 环境遭际的不幸与无常
【单选题】
冰心《往事》(——之十四)借助对大海的描绘,来抒写自己的主观情志,这叫做___
A. 铺张扬厉
B. 托物言志
C. 映衬对比
D. 渲染烘托
【单选题】
宝黛吵架后,宝玉“又自己后悔:‘方才不该和他较证,这会子他这样光景,我又替不了他。’”这里所运用的人物描写方法是___
A. 语言描写
B. 心理描写
C. 行为描写
D. 细节描写
【单选题】
老舍《断魂枪》:“他打了趟查拳:腿快,手飘洒,一个飞脚起去,小辫儿飘在空中,象从天上落下来一个风筝”。其修辞方法是___
【单选题】
行政公文附件的正确位置是___
A. 正文之下,机关署名和成文日期之上
B. 机关署名和成文日期之下,主题词之上
C. 主题词之下,抄送机关之上
D. 抄送机关之下,印文日期之上
【单选题】
“青青子衿,悠悠我心。”出自《诗经·郑风·子衿》,曹操在《短歌行》(其一)中引用,借以表达的心情是___
A. 思慕贤才
B. 对贤才无所依托的思虑
C. 礼遇贤才
D. 与贤才久别重逢的欣慰
【单选题】
王实甫《西厢记·长亭送别》的体裁是___
【单选题】
下列句子中“之”可译成“他”的是___。
A. 诗曰:“孝子不匾,永锡尔类.”其是之谓乎?
B. 公赐之食,食舍肉。
C. 广之将兵……见水,士卒不尽饮,广不近水。
D. 道德之归也有日矣,况其外之文乎!
【单选题】
一份文件的主题词中,排列在最后的一个必然是___
A. 机关名称
B. 文种名称
C. 文件名称
D. 文章名称
【单选题】
屠格涅夫的最后一部重要作品是___
A. 《猎人笔记》
B. 《散文诗集》
C. 《罗亭》
D. 《三人》
【单选题】
说明文《沙漠里的奇怪现象》的作者是___
A. 朱光潜
B. 华罗庚
C. 钱钟书
D. 竺可桢
【单选题】
《关于农村情况与农村读物的调查》一文,标题是___
A. 新闻式标题
B. 公文式标题
C. 文学式标题
D. 文章式标题
【单选题】
《氓》中运用“赋”的诗句是___
A. 桑之未落,其叶沃若
B. 淇则有岸,隰则有泮
C. 总角之宴,言笑晏晏
D. 于嗟鸠兮,无食桑葚
【单选题】
下列全部属于行政公文下行文的一组是___
A. 请示、函、决定
B. 函、会议纪要、报告、通知
C. 通知、决定、批复
D. 通报、报告、通知
【单选题】
下列作家属于“文学研究会”成员的是___
A. 沈雁冰
B. 闻一多
C. 郭沫若
D. 郁达夫
【单选题】
曾经荣获“人民艺术家”称号的作家是___
【单选题】
在我国现代诗歌史上,最能体现“五四”精神的诗集是___
A. 《女神》
B. 《红烛》
C. 《死水》
D. 《北方》
【单选题】
《张中丞传后叙》歌颂的三个主要正要人物是___
A. 张巡,张籍,雷万春
B. 李翰,张巡,许远
C. 张巡,许远,南霁云
D. 许远,雷万春,南霁云
【单选题】
大量创作“无题”诗,并对后世特别是宋初西昆派诗人产生很大影响的诗人是___
A. 王昌龄
B. 王维
C. 李白
D. 李商隐
【单选题】
根据2012年4月16日中共中央办公厅、国务院办公厅印发的《党政机关公文处理工作条例》的规定,我国现有的公文种类有___种。
【单选题】
在一篇文章中,记述两件或多件同时发生的事情,这种叙述方式是___
【单选题】
下列句子运用的修辞方法分析错误的一项是___
A. 晋祠,真不愧为我国锦绣河山中一颗璀璨的明珠。(比喻)
B. 希特勒,墨索里尼,不都在人民面前倒下去了吗?(设问)
C. 西湖,仿佛在半醒半睡。(拟人)
D. 千万条腿来千万只眼,也不够我走来也不够我看!(夸张)
【单选题】
主张文章应“惟陈言之务去”的文学家是___
A. 韩愈
B. 柳宗元
C. 欧阳修
D. 王安石
【单选题】
下面的诗句中,体现诗人积极人生追求和无畏探索精神的—句是___
A. 不安分的帆儿却祈求风暴,仿佛风暴里有宁静之邦,(莱蒙托夫《帆》)
B. 我好似一朵孤独的流云,高高地飘游在山谷之上。(华兹华斯《咏水仙》)
C. 北风卷地白草折,胡天八月即飞雪。(岑参《白雪歌送武判官归京》)
D. 天门中断楚江开,碧水东流至此回。(李白《望天门山》
【单选题】
选出下列诗句中意境最为开阔的一句___
A. 疏影横斜水清浅,暗香浮动月黄昏
B. 几处早莺争暖树,谁家新燕啄春泥。
C. 八百里分麾下炙,五十弦翻塞外声,沙场秋点兵。
D. 茅檐低小,溪上青青草。醉里吴音相媚好,白发谁家翁媪?
【单选题】
马致远《天净沙·秋思》抒写羁旅之情的方法主要是___
A. 直抒胸臆
B. 借景抒情
C. 寓情于事
D. 寓情于理
【单选题】
公务文书对某一问题进行说明时,十分强调___
A. 说明的客观性
B. 说明的形象性
C. 论证的正确性
D. 语言的生动性
【单选题】
下面一段文字是对我国享有盛名的“三峡景观”的描绘,其中搭配和衔接不恰当的一句是___
A. 有人说,三峡像一轴展不尽的山水画卷。
B. 也有人说,三峡是一条丰富多彩的文化艺术长廊。
C. 依我们看,三峡倒更像一部辉煌的交响乐。
D. 它由“瞿塘雄,巫峡秀,西陵险”这三个具有各自不同旋律、节奏的优美的画面组成。
【单选题】
工作研究《劳务输出是贫困地区经济起飞的有效途径》一文标题写法是___
A. 提出问题,引人深思
B. 说明探讨研究对象
C. 揭示文章基本观点
D. 正副标题结合的双标题
【单选题】
属于行政公文开端用语的一组是___
A. 经、业经、现将、责成
B. 据、根据、依照、为了
C. 为此、据此、鉴于、总之
D. 此复、特此报告、专此报告
【多选题】
战国四公子是指 ___
A. 信陵君
B. 春申君
C. 孟尝君
D. 龙阳君
E. 平原君
【多选题】
《史记》共130篇,52余万字,全书包括 ___
A. 10篇“表”
B. 8篇“书”
C. 30篇“世家”
D. 70篇“列传”
E. 12篇“本纪”
【多选题】
下列诗篇于乐府旧题的有___
A. 《关山月》
B. 《从军行》
C. 《行路难》
D. 《短歌行》
推荐试题
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124