【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
推荐试题
【填空题】
4. 文化是一种跨越国界、跨越民族、跨越时空的普适性精神力量,因此,要积极融入世界文化,完全没有必要坚守中华文化立场、走中国特色社会主义文化发展道路。___
【填空题】
5.共享发展注重的是解决社会公平正义的问题。___
【填空题】
6.创新是党执政兴国的第一要务。___
【填空题】
8.在中国实行人民代表大会制度,是中国人民在人类政治制度史上的伟大创造。___
【填空题】
9.我国人民民主专政与人民代表大会制度的关系是,前者是国家权利机关,后者是国家管理机关。___
【填空题】
10.中国共产党领导的多党合作和政治协商制度作为我国一项基本政治制度,是中国共产党、中国人民和各民主党派、无党派人士的伟大政治创造,是从中国土壤中生长出来的新型政党制度。___
【填空题】
1.___提出了到2020年全面建成小康社会的奋斗目标。
【填空题】
2.对全面建成小康社会,错误的认识是___。
【填空题】
3. 我国社会主义市场经济体制已经初步建立,要继续朝着加快完善社会主义市场经济体制的目标努力,着力健全使___在资源配置中起决定性作用和更好发挥___作用的制度体系。
【填空题】
4. 党的十八届三中全会通过了《中共中央关于全面深化改革若干重大问题的决定》,提出全面深化改革的总目标是___。
【填空题】
5. ___明确把依法治国确立为治理国家的基本方略,把建设社会主义法治国家确定为社会主义现代化建设的重要目标。
【填空题】
6. 社会主义法治最根本的保证是___。
【填空题】
7. 新时代党的建设总要求是:坚持和加强党的___,坚持党要管党、全面从严治党,以加强党的长期执政能力建设、先进性和纯洁性建设为主线,以党的政治建设为统领,以坚定理想信念宗旨为根基,以调动全党积极性、主动性、创造性为着力点,全面推进党的政治建设、思想建设、组织建设、作风建设、纪律建设,把制度建设贯穿其中,深入推进反腐败斗争,不断提高党的建设质量,把党建设成为始终走在时代前列、人民衷心拥护、勇于自我革命、经得起各种风浪考验、朝气蓬勃的马克思主义执政党。
【填空题】
8. 中国共产党最大的政治优势是___。
【填空题】
9.“四个全面”战略布局是我们党在新的历史起点上,总结我国发展实践,适应新的发展要求,坚持和发展中国特色社会主义新探索新实践的重要成果。在“四个全面”战略布局中,具有突破性和先导性的关键环节是___
【填空题】
10. 在“四个全面”战略布局中,居于引领地位的是___
【填空题】
11.从现在到2020年,是全面建成小康社会的决胜期,也是确保实现第一个百年目标,为第二个百年目标打好基础的关键阶段。面对各种严峻复杂的挑战,如期全面建成小康社会必须打好攻坚战。摆在攻坚战首位的是___
【填空题】
13.经济体制改革是全面深化改革的重点,核心问题是处理好___
【填空题】
14.社会主义初级阶段的基本经济制度是公有制为主体、多种所有制经济共同发展。必须毫不动摇地鼓励、支持和引导非公有制经济发展的依据在于___
【填空题】
15.解决好农业农村发展面临的各种矛盾和问题,根本靠深化改革。新形势下深化农村改革,主线仍然是处理好___
【填空题】
17.正确处理改革、发展、稳定三者关系的重要结合点是___
【填空题】
18.推进中国特色社会主义法治体系建设,要建立严密的法治监督体系。其重点在于___
【填空题】
19.党的十九大报告提出了新时代党的建设的总要求,其中,作为新时代党的建设的统领的是___
【填空题】
1. 全面建成小康社会,更重要、更难做到的是“全面”。全面小康,___。
【填空题】
2. 党的十八届五中全会顺应我国经济社会新发展和广大人民群众新期待,赋予“小康”更高的标准、更丰富的内涵。具体包括___。
【填空题】
3. 不实行改革开放死路一条,搞否定社会主义方向的“改革开放”也是死路一条,不论怎么改革、怎么开放,都要始终坚持___。
【填空题】
4. 处理好改革、发展、稳定的关系,___。
【填空题】
5. 关于全面依法治国,以下哪些提法是正确的 ___
【填空题】
6. 建设中国特色社会主义法治体系,要___。
【填空题】
7. 新时代党的建设面临的新形势包括___。
【填空题】
8. 把全面从严治党引向深入,要___
【填空题】
9.“四个全面”战略布局是一个整体,既包括战略目标,又包括战略举措。其中,作为推动实现战略目标、被比喻为“鸟之两翼”或“车之双轮”的是___
【填空题】
10.全面小康,覆盖的区域要全面,是城乡区域共同发展的小康。缩小城乡区域发展差距。包括缩小___
【填空题】
11.中国共产党第十八届五中全会根据国内外形势的新变化,顺应我国经济社会新发展和广大人民群众新期待,对全面建成小康社会进行了总体部署,提出了新的目标要求,主要有___
【填空题】
13.2017年12月召开的中央经济工作会议提出,今后3年要重点抓好决胜全面建成小康社会的防范化解重大风险、精准脱贫、污染防治三大攻坚战。坚决打好污染防治攻坚战,要细化打好污染防治攻坚战的重大举措,尊重规律,坚持底线思维。要坚持源头防治,调整___
【填空题】
14.关于改革开放,说法正确的是___
【填空题】
15.全面深化改革要取得成功,必须坚持___
【填空题】
16.国家治理体系和国家治理能力的关系是___