刷题
导入试题
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
光辐射|_早期核武器
解析
暂无解析
相关试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
推荐试题
【判断题】
现金是企业获利能力最低 流动性最强的资产。
A. 对
B. 错
【判断题】
资产负债表结构分析是指通过对资产负债表各个组成部分占总资产的百分比,然后比较各个组成部分的增减变动情况,分析评价企业总体财务状况。
A. 对
B. 错
【判断题】
分析企业的速动比率,可以判断企业的营运能力。
A. 对
B. 错
【判断题】
如果某公司资产总额800万元,流动负债40万元,长期负债260万元,则可以计算出资产负债率为37.5%。
A. 对
B. 错
【判断题】
27如果已知负债与所有者权益的比率为40%,则资产负债率为60%。
A. 对
B. 错
【判断题】
如果已知所有者权益的比率为40%,则资产负债率为60%。
A. 对
B. 错
【判断题】
权益乘数为4,则资产负债率为25%。
A. 对
B. 错
【判断题】
一般而言,利息保障倍数越大,表明企业可以偿还长期债务的可能性就越小。
A. 对
B. 错
【判断题】
产权比率为1,则权益乘数也为1。
A. 对
B. 错
【判断题】
流动比率 速动比率 现金比率这三个短期偿债能力指标,现金比率最能反映企业的短期偿债能力。
A. 对
B. 错
【判断题】
产权比率反映了由债务人提供的资本与所有者提供的资本的相对关系,反映了自有资金偿还全部债务的能力.
A. 对
B. 错
【判断题】
某公司2018年度税后净利润544万元,利息支出为320万元,所得税为256万元,则该公司利息保障倍数为3.5
A. 对
B. 错
【判断题】
应收账款周转率是企业一定时期内赊销收入净额与应收账款余额的比率,反映一定时期内收回应收账款的能力。
A. 对
B. 错
【判断题】
应收账款周转次数与周转天数成正比。
A. 对
B. 错
【判断题】
市盈率是普通股每股收益与普通股每股市价的比率。
A. 对
B. 错
【判断题】
市净率是是指每股市价与每股净资产的比值,反映股票的市场价值是净资产的倍数。
A. 对
B. 错
【判断题】
企业的应收账款周转率越高,说明发生坏账损失的可能性越大。
A. 对
B. 错
【判断题】
市盈率越高的股票,其投资的风险也会越大。
A. 对
B. 错
【判断题】
存货周转率是用营业收入除以存货平均余额。
A. 对
B. 错
【判断题】
利息保障倍数也称为已获利息倍数,是指企业息税前利润与利息费用的比率,衡量企业支付利润的能力。
A. 对
B. 错
【判断题】
利润表的水平分析就是把企业连续两期或多期利润表中的数据进行比较,计算利润表中各项目的增减变动的数额和增减率,从而了解企业利润变动数额 变动方向和变动幅度据以预测企业未来经营成果的发展前景。
A. 对
B. 错
【判断题】
利润表的结构分析就是以利润表中的营业成本项目为100%,计算出利润表中的各个项目占营业成本项目的百分比,然后比较各个项目百分比在不同时期的差异,以此判断成本 费用 利润等项目的变动规律和趋势。
A. 对
B. 错
【判断题】
在分析资产周转率时,只需选用年末资产余额作基数即可。
A. 对
B. 错
【判断题】
销售增长率是反映企业发展能力的首要指标。
A. 对
B. 错
【判断题】
市盈率越高,公司的前景越差。
A. 对
B. 错
【判断题】
应收账款周转天数=360/应收账款周转率。
A. 对
B. 错
【判断题】
利润表是反应企业一定会计期间的经营成果的报表。
A. 对
B. 错
【判断题】
利润总额是营业利润减所得税费用
A. 对
B. 错
【判断题】
营业利润等于营业收入减去营业成本。
A. 对
B. 错
【判断题】
印花税应在利润表的“税金及附加”项目下列示。
A. 对
B. 错
【判断题】
存货周转率是用营业收入除以存货的平均余额。
A. 对
B. 错
【判断题】
如果流动负债为60万元,流动比率为 2.5,速动比率为1.4,则年末存货价值为84万元。
A. 对
B. 错
【判断题】
营运能力是指企业资产的利用效率的分析。
A. 对
B. 错
【判断题】
现金流量表结构分析是以现金流量表为基础,通过计算各项现金流入量和流出量占现金流入流出总量的比重,反映企业经营活动 投资活动和筹资活动的现金流量对净现金流量的影响方向和幅度
A. 对
B. 错
【判断题】
现金净流量结构分析可以明确的反映出本期现金净利润主要为哪些活动产生,并以此来说明净利润形成的原因是否合理。
A. 对
B. 错
【判断题】
经营活动业绩评价使用的利润表和现金流量表都以权责发生制为基础反映。
A. 对
B. 错
【判断题】
现金流量表是以现金及现金等价物为编制基础。
A. 对
B. 错
【判断题】
经营活动产生的现金流量通常可以采用直接法和间接法两种列报方法。
A. 对
B. 错
【判断题】
现金流动负债比率是经营活动产生的现金净流量与流动负债的比值。
A. 对
B. 错
【判断题】
现金流量表中的现金包括库存现金 可以随时支付的银行存款和其他货币资金。
A. 对
B. 错
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用