【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
推荐试题
【单选题】
临产后听胎心应在何时___
A. 任何时期
B. 宫缩间歇期
C. 宫缩减弱时
D. 宫缩刚开始时期
E. 宫缩最强时
【单选题】
产后出血的处理原则为___
A. 止血、扩容、抗休克、抗感染
B. 输血、抗凝、抗感染、抗休克
C. 纠酸、扩容、抗感染
D. 切除子宫、扩容、抗感染
E. 病情观察、不急于处理
【单选题】
初产妇,25岁,GIPO,孕40周临产10小时入院。骨盆外测量正常,估计胎儿体重3500g。宫口开4cm,S-1,宫缩30-40秒,间隔3分钟,中强。首选下列哪项处理___
A. 等待自然分娩
B. 肌注哌替啶
C. 静推地西泮
D. 人工破膜
E. 静滴缩宫素
【单选题】
张女士,停经90天,近日阴道有少量出血,小腹隐痛,腹部检查发现子宫底达脐部,未能触及胎体,B超显示子宫腔内为落雪状图案。应考虑___
A. 葡萄胎
B. 羊水过多
C. 子宫肌瘤
D. 子宫肉瘤
E. 先兆流产
【单选题】
妊娠期母体变化,以下哪项不正确___
A. 妊娠32~34周血容量增加达高峰
B. 妊娠晚期易发生外阴及下肢静脉曲张
C. 子宫峡部在妊娠后期形成子宫下段
D. 妊娠末期孕妇血液处于低凝状态
E. 妊娠后卵巢不排卵
【单选题】
患者34岁,妊娠足月临产,滞产,胎儿胎盘娩出后,出现间歇性阴道流血,量较多。检查子宫体柔软。其出血原因最大可能是___
A. 软产道损伤
B. 胎盘剥离不全
C. 子宫收缩乏力
D. 凝血功能障碍
E. 子宫破裂
【单选题】
下列哪项不是造成不孕的原因___
A. 子宫发育不良
B. 子宫肌瘤
C. 子宫内膜异位症
D. 子宫颈内口松弛
E. 子宫内膜结核
【单选题】
关于胎动错误的是___
A. 胎动小于10次/12小时,提示胎儿宫内缺氧
B. 胎动消失,常发生于胎心消失前2~3天
C. 胎动小于3次/小时,提示胎儿有缺氧可能
D. 胎动突然频繁,一般提示胎儿有较好的储备力
E. 孕晚期胎动可稍减少
【单选题】
新生儿出生后,四肢青紫,吸痰器清理呼吸道时患儿有恶心表现,四肢稍屈,心搏90次/分,呼吸浅、慢、不规则。请用Apgar评分法,评定新生儿为多少分___
A. 0分
B. 2分
C. 4分
D. 6分
E. 8分
【单选题】
在下列有关痛经的描述中,错误的是___
A. 行经前后或经期出现下腹痛或其他不适,以致影响生活和工作质量称为痛经
B. 痛经分为原发性痛经和继发性痛经
C. 原发性痛经指生殖器宫无器质性病变者发生的痛经
D. 继发性痛经指生殖器宫有器质性病变者发生的痛经
E. 原发性痛经者应接受前列腺素治疗
【单选题】
导致子宫破裂的原因,错误的是___
A. 胎先露下降受阻
B. 宫缩剂使用不当
C. 各种不适当的阴道助产手术
D. 急性羊水过多
E. 子宫壁瘢痕破裂
【单选题】
某患者,24岁,尿频、尿痛3天,近2天白带增多呈脓性就诊。妇科检查:阴道黏膜充血,以手指压尿道腺时有脓性分泌物流出,触痛明显。最可能的诊断是___
A. 生殖器结核
B. 滴虫阴道炎
C. 念珠菌阴道炎
D. 淋病
E. 艾滋病
【单选题】
放疗患者应暂停照射的指征不包括___
A. 白细胞<3×10/L
B. 血小板低于(50~100)×10/L
C. 血红蛋白<70g/L
D. 放射性直肠炎
E. 皮肤溃疡
【单选题】
周女士,27岁,确诊妊娠,末次月经2005年3月14日开始,预产期是___
A. 2005/11/21
B. 2005/12/21
C. 2005/10/21
D. 2005/11/28
E. 2005/10/28
【单选题】
有关更年期的描述,不正确的是___
A. 目前将更年期称为围绝经期
B. 是妇女卵巢功能逐渐减退、生殖器宫逐渐萎缩的一个过渡时期
C. 所有妇女在此时期都会出现明显症状,不必介意也无需治疗
D. 鼓励更年期妇女参加文体活动,保持乐观情绪
E. 每年应进行身体检查及妇科检查,包括防癌检查
【单选题】
高危妊娠管理中要提高的三个率及其目的,其中不包括___
A. 高危妊娠检出率
B. 高危妊娠治愈率
C. 高危妊娠随诊率
D. 高危妊娠住院分娩率
E. 降低围产儿死亡率
【单选题】
妊娠早期心脏病患者,决定是否连续妊娠的主要依据是___
A. 心脏病种类
B. 孕妇的体重
C. 胎儿大小
D. 病变发生部位
E. 患者年龄
【单选题】
某产妇,产后第6天发热达40℃,恶露多而浑浊,有臭味,子宫复旧不佳,有压痛。下述哪一项护理不妥___
A. 半卧位
B. 床边隔离
C. 物理降温
D. 抗感染治疗
E. 坐浴1~2次/天
【单选题】
经腹输卵管结扎术前护理,哪项不需要___
A. 阴道冲洗3天
B. 解除恐惧心理,提供心理支持
C. B.解除恐惧心理,提供心理支持
D. 测体温、脉搏、呼吸、血压
E. 准备腹部备皮
【单选题】
急性羊水过多发生时间在___
A. 孕16~20周
B. 孕20~24周
C. 孕24~28周
D. 孕28~32周
E. 孕32~36周
【单选题】
胎膜早破的后果是___
A. 早产
B. 感染
C. 母体活动受限
D. 脐带脱垂
E. 胎儿宫内窘迫
【单选题】
关于妇女一生各阶段的生理变化,下列说法正确的是___
A. 卵巢激素减少至不能引起子宫内膜脱落出血,最后一次经期过后停经1年以上称为绝经
B. 第二性征的出现,标志着青春期开始
C. 月经初潮标志着卵巢功能的成熟,为性成熟的开始
D. 更年期一般历时3年
E. 幼年期儿童体格及内、外生殖器同时发育
【单选题】
有关骨盆,下列陈述错误的是___
A. 骨盆入口平面即真假骨盆分界面
B. 骨盆入口平面呈横椭圆形
C. 中骨盆平面为骨盆最小平面
D. 中骨盆横径大于前后径
E. 出口平面由两个不同平面的三角形组成
【单选题】
在孕妇腹壁上听诊,除听到胎心外,还可听到___
A. 腹主动脉音
B. 脐带杂音
C. 子宫杂音
D. 胎动杂音
E. 羊水流动音
【单选题】
后穹窿穿刺下列哪项是对的___
A. 仰卧位,用4号针头
B. 坐卧位,用5号针头
C. 膀胱截石位,使用9号针头
D. 侧卧位,用12号针头
E. 随意卧位,几号针头都可以
【单选题】
葡萄胎、侵蚀性葡萄胎和绒毛膜癌共有的临床表现是___
A. 妊高征
B. 阴道流血
C. 腹痛
D. 子宫增大
E. 咯血
【单选题】
某初产妇,26岁,孕41周,因臀位行臀牵引术。胎儿娩出后5分钟突发阴道大量出血,约400ml,检查血压100/60mmHg,脉搏100次/分,宫底脐平。此时最适宜的护理措施是___
A. 静脉点滴催产素
B. 检查软产道有无损伤
C. 做好人工剥离胎盘术准备
D. 按摩子宫
E. 纱布填塞宫腔
【单选题】
妊娠期总血容量平均增加___
A. 20%~30%
B. 15%~30%
C. 20%~40%
D. 30%~40%
E. 10%~20%
【单选题】
关于阴道壁的描述,下列错误的是___
A. 阴道黏膜为复层鳞状上皮
B. 阴道壁富有静脉丛,局部损伤易形成血肿
C. 阴道上皮富有腺体,故妇女常有白带多的症状
D. 阴道黏膜受卵巢激素的影响,有周期性变化
E. 阴道壁有很多横纹皱襞,外覆有弹力纤维,故有很大的伸展力
【单选题】
关于孕产期保健,以下正确的是___
A. 产褥期是产妇分娩后生殖器宫恢复功能的时期
B. 围生期是对母体进行监护的医学保健
C. 科学接生可提高产科质量
D. 孕期检查从妊娠28周始
E. 分娩属于生理过程
【单选题】
产妇产后消化系统的变化是___
A. 胃酸分泌增多,胃蠕动减慢
B. 胃酸分泌减少,胃蠕动减慢
C. 胃酸分泌正常,胃蠕动减慢
D. 胃酸分泌增多,胃蠕动增快
E. 胃酸分泌正常,胃蠕动增快
【单选题】
患者,女,27岁,结婚2年,自然流产3次。宫腔镜检查可见双侧输卵管开口,宫底部向内突出。最可能的诊断是___
A. 双角子宫
B. 纵隔子宫
C. 单角子宫
D. 残角子宫
E. 黏膜下子宫肌瘤
【单选题】
关于胎膜早破的护理,下列哪项是错误的___
A. 破膜后立即听胎心
B. 卧床休息,防止脐带脱垂
C. 保持会阴清洁
D. 可下地活动
E. 破膜后注意体温、脉搏及呼吸变化
【单选题】
不协调性子宫收缩乏力的宫缩特点是___
A. 收缩强度低,具有协调性
B. 收缩力强,具有协调性
C. 收缩过强且持续,无节律性放松
D. 收缩极性倒置,间歇期子宫肌肉不能完全放松
E. 子宫上下段交界处子宫环形肌不协调性过强收缩
【单选题】
围生期是指___
A. 自妊娠26周末至产后14天
B. 自妊娠28周末至产后7天
C. 自妊娠28周末至产后14天
D. 自妊娠26周末至产后7天
E. 自妊娠27周末至产后14天
【单选题】
某孕妇,32岁,目前孕36周出现头痛伴视物不清2天。今晨头痛加剧,恶心、呕吐1次,随后剧烈抽搐约1分钟渐清醒即急诊入院。即刻测血压180/120mmHg,胎心140次/分,有不规律子宫收缩。肛查:羊膜未破,子宫口未开,骨盆测量均正常。对该孕妇的护理措施正确的是___
A. 安置于明亮房间
B. 听轻音乐
C. 取头高侧卧位
D. 每日听胎心一次
E. 留置尿管
【单选题】
当决定行阴道手术助产时,为了确诊胎方位,应以哪条颅缝结合囟门检查做依据___
A. 额缝
B. 冠状缝
C. 矢状缝
D. 人字缝
E. 颞缝
【单选题】
会阴湿热敷的面积,正确的应该是病损面积的___
A. 1倍
B. 1.5倍
C. 2倍
D. 2.5倍
E. 3倍
【单选题】
女性,28岁,因婚后两年未孕就诊,下列预测排卵的方法,不准确的是___
A. 基础体温测定
B. 宫颈黏液评分
C. 测定血LH水平
D. 诊刮术取子宫内膜来做病理检查
E. B超监测卵泡发育
【单选题】
孕妇骨盆外测量数值最小的是___
A. 骶耻外径
B. 髂嵴间径
C. 髂棘间径
D. 粗隆间径
E. 坐骨结节间径