刷题
导入试题
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
定向能武器|动能武器|声波武器|计算机网络攻防武器|非致命武器
解析
暂无解析
相关试题
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
推荐试题
【填空题】
27. 第一类分布式电源是指10千伏及以下电压等级接入,且单个并网点总装机容量不超过___的分布式电源。
【填空题】
28. 分布式电源项目应在并网点设置易操作、可闭锁、且具有___的并网开断设备。
【填空题】
29. 逆变器类型分布式电源接入10千伏配电网,分布式电源功率因数应在___~0.95___)范围内可调。
【填空题】
30. 分散式充电桩要求加装___保护,不允许倒送电。
【填空题】
31.露天或半露天变电所的变压器四周应设高度不低于___的固定围栏或围墙,变压器外廓与围栏或围墙的净距不应小于___,变压器底部距地面不应小于___。
【填空题】
32.100至1000千伏安油浸变压器外廓与变压器室后壁、侧壁最小净距为___,变压器外廓与门最小净距___。
【填空题】
33. 1250千伏安及以上油浸变压器外廓与变压器室后壁、侧壁最小净距为___,变压器外廓与门最小净距___。
【填空题】
34. 置在变电所内的非封闭式干式变压器,应装设高度不低于___m 的固定围栏,围栏网孔不应大于___mm。
【填空题】
35. 当低压配电装置两个出口间的距离超过___时应增加出口。
【填空题】
36. 自备应急电源指由客户___配备的,在正常供电电源全部发生中断的情况下,能够至少满足对客户___不间断供电的___电源。
【填空题】
37. 大容量非线性负荷指接入___电压等级电力系统的电弧炉、轧钢设备、地铁、电气化铁路牵引机车,以及单台4000kVA及以上整流设备等具有波动性、冲击性、___的负荷。
【填空题】
38. 在多尘或有腐蚀性气体严重影响变压器安全运行的场所,应选用___或___的变压器。
【填空题】
39.采用双电源或双回路的同一重要电力用户,不应采用___供电。
【填空题】
40.居民电采暖谷时段是___至次日___。
【简答题】
分布式电源接入配电网的电压等级确定的原则是什么?
【简答题】
各竣工检验现场查验内容都有哪些?
【简答题】
变电站形式选择应符合哪些规定?
【简答题】
高压配电装置的“五防”功能的内容是什么?
【简答题】
变电所的所址应该如何选择?
【简答题】
电动汽车充换电设施低压供电,按照什么原则确定电压等级和供电方式?
【简答题】
《供电营业规则》规定:用户重要负荷的保安电源,可由供电企业提供,也可由用户自备。遇有什么情况,保安电源应由用户自备?
【简答题】
《承装(修、试)电力设施许可证管理办法》规定,承装(修、试)电力设施许可证分为哪几级?分别从事什么业务?
【简答题】
国网公司压减流程环节的主要做法有哪些?
【简答题】
省公司各类客户业扩配套电网项目工程投资界面标准。
【简答题】
高压客户竣工检验收资清单的内容有哪些?
【简答题】
用电申请开展“一证受理”业务后,非居民客户应承诺哪些内容?
【单选题】
根据《供电营业规则》,供电企业因供电设施检修,依法限电,或者用户违法用电等原因,需要中断供电时,供电企业应当按照国家有关规定___用户。
A. 在中断供电的同时告知
B. 在中断供电后告知
C. 事先通知
D. 事后通知。
【单选题】
用户自助充电过程中遇到问题,可以拨打95598电话报修,检修人员会在___到达现场处理。
A. 30分钟内
B. 45分钟内
C. 60分钟内
D. 90分钟内
【单选题】
根据《国家电网公司95598客户服务业务管理办法》规定, 承办部门接到国网客服中心派发的客户投诉后___个工作日内联系客户(除保密工单外),(C)个工作日内按照有关法律、公司相关要求进行调查、处理,答复客户,并反馈国网客服中心。
A. 3、5
B. 1、7
C. 1、6
D. 3、7
【单选题】
《居民用户家用电器损坏处理办法》规定,供电企业如能提供证明,居民用户家用电器的损坏是不可抗力、第三人责任、受害者自身过错或产品质量事故等原因引起,并经___核实无误,供电企业不承担赔偿责任。
A. 电力监管部门
B. 上级主管部门
C. 县级以上电力管理部门
D. 居民所在居委会(村委会)
【单选题】
《国家电网公司供电服务质量标准》规定:居民客户需要获知电费信息的,供电企业应在缴费截止日前___天告知。
A. 1
B. 3
C. 5
D. 7
【单选题】
根据《供电营业规则》规定,因电能质量某项指标不合格而引起责任纠纷时,不合格的质量责任由___负责技术仲裁。
A. 电力管理部门
B. 省电网经营企业
C. 电力管理部门认定的电能质量技术检测机构
D. 供电企业认定的电能质量技术检测机构
【单选题】
《电力供应与使用条列》规定,用户对供电质量有特殊要求的,供电企业应当根据其___和电网的可能,提供相应的电力。
A. 重要性
B. 必要性
C. 急迫性
D. 可行性
【单选题】
《国家电网公司供电服务质量标准》规定:网上营业厅应 24 小时受理客户需求,如需人工确认的,服务人员在 ___个工作日内与客户确认。
A. 1
B. 3
C. 5
D. 7
【单选题】
取得五级《承装(修、试)电力设施许可证》的,可以从事___千伏及以下电压等级电力设施的安装、维修或者试验活动。
A. 110
B. 66
C. 35
D. 10
【单选题】
《电力供应与使用条例》规定:擅自伸入或者跨越供电营业区供电的,由电力管理部门责令改正,没收违法所得,可以并处违法所得___的罚款。
A. 10倍以上
B. 7-10倍
C. 5-7倍
D. 5倍以下
【单选题】
《供电营业规则》规定:当用电计量装置不安装在产权分界处时,线路与变压器损耗的有功与无功电量均须由___负担。
A. 供电企业
B. 客户负担
C. 供电企业与客户协商确定
D. 产权所有者
【单选题】
在公共场所施工,应有安全措施,悬挂施工单位标志、___,并配有礼貌用语。
A. 安全警示
B. 安全标示
C. 安全标志
D. 告知牌
【单选题】
依据《供电营业规则》,由于电力企业电力运行事故造成某居民用户停电时,供电企业应按该户在停电时间内可能用电量的电度电费的___给予赔偿。
A. 三倍
B. 四倍
C. 五倍
D. 六倍
【单选题】
《国家电网公司供电服务质量标准》规定:___是指电力供应过程中,企业为满足客户获得和使用电力产品的各种相关需求的一系列活动的总称。
A. 供电服务
B. 供电客户服务
C. 供电客户服务项目
D. 供电客户服务渠道
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用