刷题
导入试题
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
光辐射|_早期核武器
解析
暂无解析
相关试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
推荐试题
【多选题】
价值的基本特性有___
A. 主体性
B. 客观性
C. 多维性
D. 社会历史性
【多选题】
对待马克思主义,必须___
A. 解放思想、实事求是、与时俱进、求真务实
B. 坚持实践创新和理论创新
C. 把马克思主义作为进一步研究的出发点和供这种研究的方法,而不是教义
D. 把马克思主义作为永恒真理,只能坚持不能发展
【多选题】
下列选项中,正确表述感性认识和理性认识关系的有___
A. 理性认识依赖感性认识
B. 感性认识有待于发展到理性认识
C. 理性认识比感性认识真实可靠
D. 理性认识和相互渗透感性认识
【多选题】
人民群众创造历史的作用表现在 ___
A. 创造社会的物质财富
B. 创造社会的精神财富
C. 不受任何条件的制约
D. 是社会历史变革的决定力量
【多选题】
生产方式对社会发展起决定作用表现在 ___
A. 它是人类社会赖以存在的物质基础
B. 它决定着社会形态的更替
C. 它制约着整个社会生活过程
D. 它是人类其他一切活动的首要前提
【多选题】
社会发展的根本动力是___
A. 阶级斗争
B. 生产力和生产关系的矛盾
C. 社会改革
D. 经济基础和上层建筑的矛盾
【多选题】
推动人类社会发展的动力有 ___
A. 社会基本矛盾是人类社会发展的根本动力(或基本动力)
B. 阶级斗争是阶级社会发展的直接动力
C. 革命和改革是社会发展的重要动力
D. 科学技术是社会发展的重要动力
【多选题】
下列各项属于社会意识相对独立性表现的有 ___
A. 社会意识与社会存在的变化发展的不完全同步性
B. 社会意识与经济发展水平的不平衡性
C. 社会意识各种形式之间相互影响
D. 社会意识的发展具有历史继承性
【多选题】
下面属于不变资本的有 ___
A. 机器
B. 厂房
C. 设备
D. 劳动力
【多选题】
商品的价值量 ___
A. 由体现在商品中的劳动量来计量
B. 在同类商品生产者的竞争中实现的
C. 取决于生产商品时所耗费的社会必要劳动时间
D. 随着劳动生产率的变化而变化
【多选题】
价值规律的内容和要求是 ___
A. 商品的价值量由生产商品的社会必要劳动时间决定
B. 商品交换以商品的价值量为基础
C. 商品交换必须实行等价交换
D. 商品价格围绕商品价值自发波动
【多选题】
剩余价值 ___
A. 是工人在剩余劳动时间内创造的价值
B. 是资本家全部预付资本所带来的收益
C. 是资本主义生产的根本目的
D. 体现了资本家对工人的剥削关系
【多选题】
产业资本的运动,必需具备两个基本前提条件是:___
A. 三种职能在空间上并存
B. 三种职能在时间上继起
C. 资本运动时间
D. 资本运动构成
【填空题】
1 ___是属于游戏的特征
【填空题】
2 幼儿常见的游戏分为___类
【填空题】
3 创造游戏中,规则是___的。是随游戏者个体的认知水平和游戏需要而变化的,是游戏者对自己行为的一种自觉的限制。
【填空题】
4 一般而言,幼儿每天用于专心自由游戏的时间不能少于___分钟。
【填空题】
5 自发游戏中,幼儿是游戏的___。
【填空题】
6 游戏环境规划的原则有安全性、___、发展性、参与性和开放性。
【填空题】
7 幼儿园户外游戏中,最突出的特点是___。
【填空题】
8 幼儿园室内环境规划中,___是幼儿来去自由,谁进去就属于谁的独立小王国。
【填空题】
9 在游戏材料投放中,前期投入更适合___年龄段的孩子。
【填空题】
10 游戏活动观察的常用方法有描述法、取样法和___。
【填空题】
11 游戏材料色彩鲜艳、能发出声响、形象生动逼真的玩具是属于___。
【填空题】
12 ___幼儿在游戏当中经常忘记自己是什么角色,需要教师给与启发,增强他们的角色意识。
【填空题】
13 当幼儿在游戏过程中出现严重违反规则、攻击性等危险行为时,教师应___。
【填空题】
14 在游戏开始的阶段,教师是环境、材料的___。
【填空题】
15 幼儿在角色游戏中,既是演员,也是导演,还是观众和制作人,是属于角色游戏___的特点。
【填空题】
16 在玩“娃娃家”时,考虑到有的幼儿不喜欢当孩子,而要当妈妈,这时向幼儿提出:玩娃娃家时,如果有人老是选自己喜欢的角色,那谁来当娃娃呢?这种说法属于 ___。
【填空题】
17 幼儿的生活经验越丰富,角色游戏的水平也就___。
【填空题】
18 ___指本身具有较固定的具体形象玩具,材料造型基本与实物相符。
【填空题】
19 对于游戏材料的投放,年龄渐大的幼儿,___的数量要逐渐减少,半成品的数量加大。
【填空题】
20 在游戏进行中,教师是观察者和幼儿遇到困难的___。
【填空题】
21 苏联的阿尔金称游戏为:“ ___ ”
【填空题】
22 ___是开展游戏指导的前提。
【填空题】
23 有效的观察方法有扫描观察法、___和追踪观察法。
【填空题】
24 将现实生活中的真实情境迁移到一个假象的情景中,使动作脱离原来的真实情景而具有象征性。这句话属于___。
【填空题】
25 某幼儿在游戏活动中的情绪状态需要采取___的策略实施游戏观察。
【填空题】
26 游戏是幼儿身心发展的___,在游戏中幼儿的身心发展有最真实自然的反映。
【填空题】
27 在规则性游戏中,规则是___的,是游戏者集体共同约定和遵守的行为规范,是对游戏者之间的互动关系的调节。
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用