【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
定向能武器|动能武器|声波武器|计算机网络攻防武器|非致命武器
相关试题
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
推荐试题
【单选题】
现场对成人进行口对口吹气前应将伤病员的气道打开___为宜
【单选题】
对成人进行口对口吹气时,吹气的频率为___
A. 5-6次/分钟
B. 20-24次/分钟
C. 10-12次/分钟
【单选题】
现场心肺复苏时,按压与吹气之比为___
【单选题】
现场对成人进行胸外按压时的部位是___
A. 胸骨中下1/3交界处
B. 胸部正中乳头连线水平
C. 胸骨上1/3
【单选题】
现场进行胸外心脏按压的频率为___
A. 60次/分钟
B. 至少100次/分钟
C. 80次/分钟
【单选题】
现场对成人进行胸外心脏按压的深度是___
A. 2-3厘米
B. 至少5厘米
C. 7-8厘米
【单选题】
现场救治成人气道异物梗塞,进行腹部冲击的部位是___
A. 脐上二横指
B. 胸骨下部
C. 脐下二横指
【单选题】
现场救治婴儿气道异物梗塞时,应将婴儿置于下列___体位
【单选题】
___以上地方各级人民政府人民防空主管部门管理本行政区域的人民防空作。
【单选题】
人民防空工程建设的设计必须报经___审查批准
A. 城市建设主管部门
B. 人民防空主管部门
C. 规划设计主管部门
【单选题】
火灾造成人员伤亡的主要原因有___
A. 跳楼不及时,或没有及时打开窗户和房门
B. 被烟雾和毒气窒息,或逃生行为不当等
C. 楼内缺少电梯,不能及时逃生
【单选题】
遇到火灾拨打119报警时,一定要说清楚___
A. 确切的失火地点和建筑物特点、火势大小、联系人的姓名、电话等
B. 失火现场救火的人数和救火的方法
C. 失火引起的原因和没能及时扑灭的原因
【单选题】
如果自己的衣服着火,又来不及脱衣时,可___
A. 立即躺倒,让别人用毯子或水将火焖灭或浇灭
B. 马上跑到安全的地方,把着火的衣服脱掉
C. 一边跳一边呼喊,找人来扑灭身上的火
【单选题】
如果火势不猛,有可能冲出火场的时候,可___
A. 向头上和身上淋水,或用湿毛毯包裹身体,冲出险区
B. 用双手抱住头或用衣服包住头,跑出火场
C. 边用衣服扑打火焰,边向火场外撤离
【单选题】
在下列确认患者有无意识的方法中,不宜采用的是___
A. 在患者耳边呼叫
B. 轻轻拍打患者肩部
C. 用力敲打患者头部
【单选题】
使冻伤人员的冻伤部位解冻时,应该用下述___方法
A. 火烤气
B. 不超过40℃的温水浸泡
C. 不低于50℃的热水浸泡
【单选题】
误服强酸后,以下方法中,___急救方法不正确
A. 口服牛奶或豆浆,并速送医院抢救
B. 口服花生油,并速送医院抢救
C. 大量喝水,并速送医院抢救
【单选题】
对无骨端外露骨折或严重软组织伤的肢体用夹板或木棍、树枝等固定时应:___
A. 超过伤口上关节
B. 超过伤口下关节
C. 超过伤口上.下关节
【单选题】
下列哪项可以提示心肺复苏有效___
A. 面色青紫
B. 微弱的自主呼吸
C. 瞳孔变大
【单选题】
对于头部外伤有脑脊液,血液自鼻腔耳道流出时,现场处理原则是___
A. 用冷水冲洗干净,用棉球塞住,再送医院
B. 用冷水冲洗干净后送医院
C. 不堵塞,利于流出
【单选题】
当发现室内有大量煤气泄漏时,救护员进入现场进行救护应注意___
A. 严禁点火和开启照明设备
B. 用湿毛巾捂住口鼻,以免中毒
C. 以上两项均应做好
【单选题】
“必须戴安全帽”属于安全标志中的___
【单选题】
为避免异物伤害,避震时可以___
A. 用枕头、被褥或书包保护头部
B. 用木板、铁板、玻璃板保护头部
C. 用塑料布、毛巾、床单保护头部
【单选题】
现场进行徒手心肺复苏时,伤病员的正确体位是___
A. 仰卧在坚硬的平面上
B. 仰卧在比较舒适的软床上
C. 侧卧位
【单选题】
减压病最有效的治疗是 ___
A. 吸入高浓度氧气
B. 肝素
C. 成分输血
D. 高压氧治疗
【单选题】
重度哮喘时,除吸氧外尚应采取下列哪些措施 ___
A. 尽可能找出过敏源,去除诱因或进行抗原脱敏疗法
B. 采用拟交感神经药,抗生素和促肾上腺皮质激素
C. 积极应用免疫抑制剂,色甘酸二钠,必要时用菌苗疗法
D. 改善通气,支气管解痉,控制感染,纠正水和电解质平衡失调, 应 用糖皮质激素
【单选题】
重度哮喘是指严重哮喘发作至少持续时间在___
A. 6小时以上
B. 12小时以上
C. 24小时以上
D. 48小时以上
【单选题】
支气管哮喘急性发作期动脉血气变化为 ___
A. Pa02下降,PaC0 2升高
B. Pa02正常,PaC02升高
C. Pa02下降,PaC02正常或下降
D. Pa02升高,PaC02降低或正常
【单选题】
应用氨茶碱治疗支气管哮喘,既能使其发挥最好疗效,又能防止药物中毒最有效的方法是:___
A. 缓慢静脉注射
B. 缓慢静脉滴注
C. 与舒喘灵合用
D. 与异丙肾上腺素合用
E. 血浓度检验
【单选题】
重度支气管哮喘,抢救措施中哪一项一般不用 ___
A. 静脉滴注氨茶碱
B. 静脉滴注糖皮质激素
C. 氧气吸入
D. 注射强心剂
E. 静脉补充液体
【单选题】
支气管哮喘发作期禁用___
A. 麻黄素
B. 肾上腺素
C. 吗啡
D. 氨茶碱
E. 舒喘灵
【单选题】
支气管哮喘的临床特征是 ___
A. 反复发作阵发性呼气性呼吸困难
B. 反复发作吸气性呼吸困难
C. 反复发作混合性呼吸困难
D. 夜间阵发性呼吸困难
【单选题】
支气管哮喘与心源性哮喘一时难以鉴别时,可采用下列哪种药物___
A. 呋塞米
B. 吗啡或度冷丁
C. 氨茶碱
D. 西地兰或毒毛旋花子甙K
E. 肾上腺素
【单选题】
支气管哮喘发作时,下列哪项因素能降低支气管扩张剂的疗效 ___
A. 酸中毒
B. 缺氧未纠正
C. 感染未控制
D. 未并用糖皮质激素
【单选题】
重度支气管哮喘发作时,最主要的临床表现是___
A. 发作性带哮鸣音的呼气性呼吸困难及双肺哮鸣音
B. 发作性带哮鸣音的吸气性呼气性呼吸困难及双肺哮鸣音
C. 带哮鸣音的混合性呼吸困难及双肺哮鸣音
D. 带哮鸣音的混合性呼吸困难及咯粉红色泡沫痰
E. 带哮鸣音的混合性呼吸困难及咯血
【单选题】
对重度哮喘伴心动过速的患者,下列哪项治疗措施是错误的___
A. 吸氧
B. 氨茶碱静注
C. 地塞米松静注
D. 心得安静注
E. 抗生素