刷题
导入试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
50%
解析
暂无解析
相关试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
推荐试题
【单选题】
患者女性,67岁。在静脉推注化疗药物氮芥时出现局部疼痛.略有肿胀,应___
A. 减慢推注速度
B. 拔针重新穿刺,并远离原来的穿刺点
C. 停用静脉注射氮芥
D. 重新配制药液
E. 稀释氮芥滴注
【单选题】
可用于预测大肠癌预后的检查是___
A. 雌激素受体
B. 酸性磷酸酶
C. 乳酸脱氢酶
D. 甲胎蛋白
E. 癌胚抗原
【单选题】
患者男性,57岁。门诊时得知自己患上肺癌,眼神呆滞,反应迟钝,反复询问医生诊断是否有误。次日,该患者又去另一家医院就诊。目前其所处的心理分期属于___
A. 磋商期
B. 愤怒期
C. 否认期
D. 接受期
E. 抑郁期
【单选题】
膀胱癌最常见和最早出现的症状是 ___
A. 膀胱刺激征
B. 尿流变细
C. 尿潴留
D. 下腹部疼痛
E. 血尿
【单选题】
应高度警惕胃癌的一项是 ___
A. 慢性萎缩性胃炎
B. 多年溃疡病出现腹痛规律改变伴消瘦
C. 粪隐血试验阳性
D. 胃溃疡
E. 胃息肉
【单选题】
原发性肝癌早期重要的表现是 ___
A. 肝区疼痛
B. 进行性肝大
C. 黄疸
D. 食欲减退
E. 体重减轻
【单选题】
肺癌增大引起支气管狭窄时,可出现阻塞性咳嗽,其特征是___
A. 刺激性干咳
B. 持续性.高音调金属样咳
C. 间歇性咳嗽伴脓性痰
D. 夜间阵发性咳嗽
E. 间歇性低调鼾声样咳嗽
【单选题】
张先生,56岁。拟行Miles术,咨询结肠造瘘口的管理,下列解释哪项是错误的 ___
A. 便成形后可不用肛袋
B. 瘘口开放后取右侧卧位
C. 有3~4个肛袋交替使用
D. 时清除流出的粪便
E. 瘘口周围皮肤涂氧化锌软膏
【单选题】
下列可用于长春新碱解毒的是 ___
A. 硫代硫酸钠
B. 枸橼酸钠
C. 碳酸氢钠
D. 肝素钠
E. 亚硝酸钠
【单选题】
对放射性低度敏感的肿瘤是 ___
A. 鼻咽癌
B. 霍奇金病
C. 喉癌
D. 乳腺癌
E. 骨肉瘤
【单选题】
对放射性高度敏感的肿瘤是 ___
A. 鼻咽癌
B. 食管癌
C. 肺癌
D. 霍奇金病
E. 胃癌
【单选题】
普查原发性肝癌最简单有效的方法是___
A. B超检查
B. RI检查
C. FP测定
D. T检查
E. 血管造影术
【单选题】
一般良性骨肿瘤___
A. 生长慢有症状
B. 生长快有转移
C. 生长慢无症状
D. 生长快有症状
E. 生长慢有疼痛
【单选题】
不符合良性肿瘤特征的是 ___
A. 表面光滑
B. 常伴有溃疡
C. 膨胀性生长,有完整的包膜
D. 不发生转移
E. 肿瘤可巨大
【单选题】
化疗最严重的毒性反应___
A. 胃肠道反应
B. 脱发
C. 脉管炎
D. 骨髓抑制
E. 肝肾毒性反应
【单选题】
下列肿瘤中属于良性肿瘤的是 ___
A. 淋巴瘤
B. 神经母细胞瘤
C. 葡萄胎
D. 白血病
E. 色素瘤
【单选题】
氟尿嘧啶(5-Fu)属于抗化疗药物中的___
A. 细胞毒素类
B. 抗代谢类
C. 生物碱类
D. 激素类
E. 其他
【单选题】
下列属于肿瘤二级预防措施的___
A. 戒烟.戒洒
B. 控制大气污染
C. 防止日光曝晒
D. 定期普查
E. 不食烟熏食品以及质变食物
【单选题】
下列属于肿瘤促癌因素的是 ___
A. 大气污染
B. 不良生活习惯
C. 日光(紫外线)照射
D. 遗传因素
E. 慢性炎症
【单选题】
癌症是指 ___
A. 所有恶性肿瘤的统称
B. 所有肿瘤的统称
C. 癌和肉瘤
D. 间叶组织发生的恶性肿瘤的统称
E. 上皮组织发生的恶性肿瘤的统称
【单选题】
下列肿瘤中属于癌前病变的是 ___
A. 大肠腺瘤
B. 甲状腺瘤
C. 皮下脂肪瘤
D. 子宫平滑肌瘤
E. 乳房纤维腺瘤
【单选题】
为防止肿瘤放疗时损伤皮肤,护理时应 ___
A. 热敷理疗
B. 肥皂水清洗
C. 保持皮肤清洁干燥
D. 冷敷
E. 按摩
【单选题】
恶性肿瘤诊断的最可靠依据是 ___
A. 实验室检查
B. 病理检查
C. B超
D. X线
E. 放射性核素检查
【单选题】
下列肿瘤中以局部破坏为主,很少发生转移的是___
A. 腺癌
B. 鳞癌
C. 黑色素瘤
D. 基底细胞癌
E. 恶性淋巴癌
【单选题】
下列不属于致癌因子的是 ___
A. 5-羟色胺
B. 亚硝胺
C. 苯胺
D. 二甲基氨基偶氮苯
E. 3,4-苯并芘
【单选题】
肿瘤性增生与炎性增生最根本的区别是 ___
A. 有核分裂象
B. 细胞生长活跃
C. 生长快,可压迫和阻塞器官
D. 有肿块形成
E. 细胞有异型性
【单选题】
与胃癌发病无关的疾病是 ___
A. 萎缩性胃炎
B. 胃平滑肌瘤
C. 胃溃疡
D. 胃息肉
E. 胃大部切除术后残余
【单选题】
下列描述不符合遗传性肿瘤特点的是___
A. 发病年龄较轻
B. 男性多于女性
C. 常为多发性肿瘤
D. 家族史阳性
E. 第一次突变发生在生殖细胞
【单选题】
不发生癌的组织是___
A. 皮肤附件
B. 胸腺
C. 子宫内膜
D. 甲状旁腺
E. 软骨组织
【单选题】
关于骨肉瘤的描述,不正确的是___
A. 多发生于骨骺生长活跃部位
B. 出现蜂窝状骨吸收区,夹有钙化斑块
C. 骨膜下三角形新生骨
D. 多见于年轻人
E. 早期出现肺转移
【单选题】
膀胱原位癌的病变___
A. 限于粘膜层
B. 限于固有层
C. 达到膀胱浅肌层
D. 达到膀胱深肌层
E. 侵犯膀胱外
【单选题】
血行转移的最主要依据是 ___
A. 恶性肿瘤侵犯动脉
B. 恶性肿瘤侵犯静脉
C. 肿瘤细胞进入血液
D. 肿瘤细胞栓塞于远隔器官
E. 在远隔器官形成同一类型肿瘤
【单选题】
放疗患者的皮肤护理措施不包括 ___
A. 嘱患者穿宽松柔软.吸湿性强的内衣
B. 干反应可涂0.2%薄荷淀粉
C. 湿反应可涂2%甲紫
D. 照射部位常规涂70%乙醇消毒
E. 有水疱可涂硼酸软膏
【单选题】
肉瘤的主要转移方式是___
A. 跳跃式淋巴转移
B. 区域淋巴转移
C. 种植转移
D. 直接蔓延
E. 血行转移
【单选题】
原发性肝癌最易转移的脏器是 ___
A. 肝内
B. 胃
C. 骨
D. 脑
E. 胰腺周围.腹膜后
【单选题】
前列腺癌血清中增高的物质是 ___
A. 酸性磷酸酶
B. 碱性磷酸酶
C. CA153
D. 癌胚抗原
E. CA199
【单选题】
患者男性,40岁。因怀疑肝癌入院。患者因焦虑和恐惧,在护士实施护理工作中表现出不合作。下列态度和措施中,你不该采取的是___
A. 责备患者的态度和行为
B. 对患者的表现表示理解
C. 引导患者接受病情并询问患者感受
D. 解释护理操作和操作中的感受
E. 关注患者的心理反应和行为反应
【单选题】
下列与癌症无关的疾病是 ___
A. 慢性肝硬化
B. 萎缩性胃炎
C. 结肠息肉病
D. 甲肝
E. EB病毒
【单选题】
壶腹周围癌的预后比胰头癌好的原因是 ___
A. 不易向淋巴结及肝脏转移
B. 肿瘤的恶性程度低
C. 肿瘤居于十二指肠腔内,不易向周围侵犯
D. 肿瘤居于肠腔内,易发生坏死脱落
E. 壶腹周围癌黄疸出现较早,容易早就医.早发现.早治疗
【单选题】
下列有关直肠癌的描述,不正确的是 ___
A. 常见部位为直肠壶腹部
B. 组织学分型中黏液癌多见,约占50%以上
C. 淋巴转移是主要扩散途径
D. 约占大肠癌的40%
E. 大体类型以溃疡型多见
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用