【多选题】
与“三型两网、世界一流”战略目标相比,公司物联网整体建设与应用仍存在不足,主要体现在( )。
A. 企业运营
B. 电网运行
C. 新兴业务
D. 基础设施
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
泛在电力物联网建设,在现有基础上,从( )几个方面进行提升, 支撑“三型两网、世界一流”战略目标。
A. 全息感知
B. 泛在连接
C. 开放共享
D. 融合创新
【多选题】
建设泛在电力物联网,构建与公司“三型两网”相适应的全场景安全防护体系,开展( )相关技术的研究及应用,为各类物联网业务做全环节安全服务保障
A. 可信互联
B. 安全互动
C. 智能报警
D. 智能防御
【多选题】
建设泛在电力物联网,应遵循以下哪些原则( )
A. 统一标准、鼓励创新
B. 继承发展、精准投资
C. 集约建设、共建共享
D. 经济实用、聚焦价值
【多选题】
以下是泛在电力物联网对内业务建设内容是( )
A. 提升电网安全经济运行水平
B. 提升企业经营绩效
C. 促进清洁能源消纳
D. 培育发展新兴业务
【判断题】
中国共产党人的初心和使命,就是为中国人民谋幸福,为中华民族谋复兴。
【判断题】
思想上要多个角度来了解和认识“四个自信”,分别是道路自信、理论自信、文化自信、经济自信。
【判断题】
劳动合同的中止是指劳动合同存续期间,由于某些因素导致劳动关系主体双方主要权利义务在一定时期内暂时停止履行。
【判断题】
因员工过错,用人单位依法解除或者终止劳动合同的,员工可以不按照劳动合同的约定向用人单位支付违约金。
【判断题】
员工在公司系统内调动时,劳动合同的用人单位订立主体不变的,不需要重新签订岗位协议。
【判断题】
劳动合同订立时所依据的客观情况发生较大变化,或劳动合同约定内容发生变化的,用人单位可单方变更劳动合同约定的内容,并在一个月内与员工订立劳动合同变更协议书。
【判断题】
劳动合同的中止是指劳动合同存续期间,由于某些因素导致劳动关系主体双方主要权利义务在一定时期内暂时停止履行。
【判断题】
用人单位与员工协商一致,可以解除劳动合同。
【判断题】
员工待岗期间的工资执行当地月最低工资标准(扣除保险前)。
【判断题】
用人单位未按《劳动合同法》及劳动合同约定要求,为员工提供劳动保护、劳动报酬、社会保险等合同约定行为的,员工可以解除劳动合同。
【判断题】
员工惩处主要包括纪律处分、 经济处罚和组织处理三种方式, 三种惩处方式应单独运用。
【判断题】
国网公司量化考核的要求:工作有标准、管理全覆盖、考核无盲区、奖惩有依据。
【判断题】
绩效管理实行分级管理和分类考核的方式。
【判断题】
在Word2010文档编辑中,新建Word空白文档的快捷键是Ctrl + X。
【判断题】
在word2010文档编辑中,要将插入光标移动到文档的开头的位置,快捷键是Home。
【判断题】
在Wor2010文档编辑中,要选中不连续的多处文本,应按下Ctrl键控制选取。
【判断题】
在Word2010文档编辑中,要选择光标所在段落,可三击该段落。
【判断题】
在Word2010中,打开“段落”对话框的方式是单击“段落”选项组的对话框启动器按钮。
【判断题】
在Word2010文档中,给选定的文本添加阴影、发光或映像等外观效果的命令称为文本效果。
【判断题】
在Word 2010编辑中,将鼠标指针放置到文档左侧的选定栏,按Ctrl键单击鼠标,可以实现快速选定整个文档。
【判断题】
如果要在Word2010文档中寻找一个关键词,需使用视图选项卡中的“查找”命令。
【判断题】
在Word2010中,如果键入的字符替换或覆盖插入点后的字符,这种方式叫改写方式。
【判断题】
在Excel2010编辑状态下,当单元格一列中的数据相同时,只需要在第一行数据所在单元格右下方,双击,就可以将数据复制到整列。
【判断题】
在 Word2010中可以插入表格,而且可以对表格 进行绘制、擦除、合并和拆分单元格、插入和删除行列等操作。
【判断题】
在 Word2010中,不但可以给文本选取各种样式,而且可以更改样式
【判断题】
在 Word 2010中,文本框中的文字环绕方式都是浮于文字上方。
【判断题】
Word进行打印预览时,只能一页一页地观看。
【判断题】
普通视图模式是Word文档的默认查看模式。
【判断题】
在Word中,要在页面上插入页眉、页脚,应使用“视图”菜单下的“页眉和页脚”命令。
【判断题】
中央委员会全体会议由中央政治局召集,每年至少举行二次。中央政治局向中央委员会全体会议报告工作,接受监督。
【判断题】
必须把维护中央对香港、澳门特别行政区全面管治权和保障特别行政区高度自治权有机结合起来,确保“一国两制”方针不会变、不动摇,确保“一国两制”实践不变形、不走样。
【判断题】
党的组织建设是党的根本性建设,决定党的建设方向和效果。
【判断题】
从二O二O年到二O三五年,在全面建成小康社会的基础上,再奋斗十五年,实现社会主义现代化。
推荐试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management