刷题
导入试题
【单选题】
信息处理技术员资格考试的试卷包括信息处理基础知识、计算机基础知识、法律法规知识、专业英语、办公软件使用技能五个方面。某次考试后,对这五个方面分别统计了各考生的得分率以及全国的平均得分率。为了直观展现每个考生在各个方面的水平以及该考生的整体水平,并与全国平均水平进行比较,宜采用___。
A. :直方图
B. :圆饼图
C. :折线图
D. :雷达图
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
The___ is the primary device for entering information into the computer
A. :disk
B. :printer
C. :keyboard
D. :memory
【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
推荐试题
【单选题】
一家工商企业拟在金融市场上筹集长期资金,其可以选择的市场是__________
A. 股票市场
B. 同业拆借市场
C. 商业票据市场
D. 回购协议市场
【单选题】
我国建立了多层次的证券市场。其中,设立的目的是服务于高新技术或新兴经济企业的证券市场是__________
A. 代办股份转让市场
B. 主板市场
C. 创业板市场
D. 中小企业板市场
【单选题】
只由卖方提缴保证金,买方无须缴纳保证金,只支付期权费的交易是指__________
A.  期货交易
B.  套期交易
C.  期权交易
D.  现货交易
【单选题】
金融机构的资本包括附属资本和__________
A.  注册资本
B.  核心资本
C. 实收资本
D.  实收货币资本
【单选题】
我国确立的商业银行经营与管理原则强调_______第一。___
A.  安全性
B.  效益性
C.  流动性
D.  稳定性
【单选题】
金融机构在办理转账服务、汇兑和代客支付等业务时,其所承担的职能是__________
A. 支付中介
B. 信用中介
C. 创造信用工具
D. 将货币收入转化为资本
【单选题】
如果某投资者以100元的价格买入债券面值为100元、到期期限为5年、票面利率为5%、每年付息-次的债券,并在持有满-年后以101元的价格卖出,则该投资者的持有期收益率是__________
A. 0.02
B. 0.05
C. 0.06
D. 0.08
【单选题】
按照《中国人民银行法》的规定,中国人民银行__________
A.  可以经营国家黄金外汇储备
B.  可以自办经济实体
C.  可以兼办工商信贷业务
D.  可以兼办政策性银行业务
【单选题】
我国为企业集团成员单位提供财务管理服务的非银行金融机构是__________
A. 财务公司
B. 信托投资公司
C. 小额贷款公司
D. 金融租赁公司
【单选题】
目前,我国商业银行最主要的组织制度是__________
A. 单-银行制度
B. 分支银行制度
C. 持股公司制度
D. 连锁银行制度
【单选题】
在银行业监管中,监管当局对商业银行现场检查的基础是__________
A. 盈利性检查
B. 流动性检查
C. 风险性检查
D. 合规性检查
【单选题】
在一国的外汇市场上,因外汇对本币供不应求,外汇汇率急剧上涨,为稳定外汇汇率,该国应当采取会导致_______的经济政策。___
A.  本国实际利率相对上涨
B.  本国实际收入相对提高
C.  本国物价水平相对上升
D.  本国货币资产的安全性下降
【单选题】
商业银行在资产负债综合管理中,致力于实现资产与负债在期限上的匹配。这是商业银行进行_______管理的举措。___
A. 信用风险
B. 市场风险
C. 操作风险
D. 流动性风险
【单选题】
根据我国2013年1月1日施行的《商业银行资本管理办法(试行)》,我国商业银行的核心-级资本充足率不得低于__________
A. 0.08
B. 0.06
C. 0.05
D. 0.025
【单选题】
当-国出现国际收支逆差进而导致外汇储备不足时,该国可以采用紧缩性货币政策进行调节。这是因为,紧缩性货币政策可以同时导致_______,从而使国际收支逆差减少,乃至恢复均衡。___
A. 有支付能力的进口需求减少,国外资本因利率提高而流入
B. 有支付能力的进口需求增多,国外资本因利率提高而流入
C. 有支付能力的进口需求增多,国外资本因利率下降而流出
D. 有支付能力的进口需求减少,国外资本因利率下降而不再流入
【单选题】
逆向选择是指__________
A.  由于信息不对称造成交易过程中的“劣胜优汰”现象
B.  市场竞争过程中有实力的竞争者选择没有实力的做交易
C.  消费者交易时宁可选择质量差一点但更便宜的商品
D.  消费者交易时为了保证质量宁可选择价格更贵一些的商品
【单选题】
经济增长一般是指__________
A.  居民收入增加
B.  国内生产总值增加
C.  企业收入增加
D.  政府收入增加
【单选题】
金融市场的完善程度主要以_______来判断。___
A.  效率
B.  效益
C.  市场深度
D.  金融机构数量
【单选题】
资产业务的多元化经营中,商业银行在资本市场、黄金市场、期货市场、期权市场或不动产市场上参与买卖,由于有关金融资产或实物资产的市场价格发生变动而蒙受经济损失的可能性,应视为__________
A.  利率风险
B.  投资风险
C.  信用风险
D.  竞争风险
【单选题】
下列项目中属于核心资本的有__________
A.  普通呆账准备金
B.  资产重估储备
C.  公开储备
D.  未公开储备
【单选题】
为逐步尝试性能更好的货币政策中介目标,我国在2010年中央经济工作会议上首次提出“社会融资总规模”概念。此概念是指-定时期内__________
A. 实体经济从金融体系获得的新增全部资金总额
B. 实体经济从金融体系获得的信贷总额
C. 金融体系从实体经济获得的全部存款总额
D. 金融体系从实体经济获得的全部资金总额
【单选题】
货币政策是中央银行为实现特定经济目标而采取的各种方针、政策、措施的总称。关于货币政策基本特征的说法,错误的是__________
A. 货币政策是宏观经济政策
B. 货币政策是调节社会总供给的政策
C. 货币政策主要是间接调控政策
D. 货币政策是长期连续的经济政策
【单选题】
衡量物价稳定的宏观经济指标是__________
A. 经济周期
B. 消费投资比例
C. GDP
D. 通货膨胀率
【单选题】
下列银行业从业人员的行为没有违反《银行业从业人员职业操守》中“同业竞争”有关规定的是__________
A. 免费向客户提供国际市场银行产品信息
B. 向客户反复强调竞争对手银行产品的负面报道
C. 向客户推销理财产品时承诺合约外的收益
D. 为争取客户而减少流程,绕过银行规定的必要手续为客户办理产品买卖
【单选题】
凯恩斯把货币供应量的增加并未带来利率的相应降低,而只是引起人们手持现金增加的现象称为__________
A. 资产证券化
B. 流动性陷阱
C. 资产货币化
D. 劣币逐良化
【单选题】
在中央银行的职能中,“银行的银行”的职能主要是指__________
A. 垄断发行货币,调节货币供应量
B. 代理国库,对政府融通资金
C. 集中保管存款准备金,充当最后贷款人
D. 实施货币政策,制定金融法规
【单选题】
_______不能直接发行证券。___
A.  政府
B.  企业
C.  个人
D.  银行
【单选题】
金融创新就是__________
A.  在金融领域内创造金融工具
B.  银行的信用创造
C.  在金融领域内各种要素实行新的组合
D.  在金融市场上开展金融业务
【单选题】
利率平价学说从_______角度来探讨汇率,考察利率对汇率的影响。___
A.  国际资本流动
B.  商品交易
C.  投资交易
D.  国际贸易
【单选题】
在美国的次贷危机中,很多依靠从银行借人次级贷款来购买住房的人,到期不能还本付息。这种情形对于发放次级贷款的银行而言,属于该银行承受的__________
A. 流动性风险
B. 操作风险
C. 法律风险
D. 信用风险
【单选题】
在金融宏观调控中,货币政策的传导和调控过程要经历金融领域和实物领域。此处的金融领域是指__________
A. 企业的股票发行与流通
B. 居民的金融投资
C. 政府的国债发行与流通
D. 货币的供给与需求
【单选题】
金融市场交易的客体是__________
A.  金融工具
B.  货币资金
C.  信用工具
D.  借贷利率
【单选题】
_______是商业银行不同于其他任何金融机构的最为独特的功能。___
A.  信用扩张
B.  信用创造
C.  吸收存款
D.  发放贷款
【单选题】
我国公债是_______的主要表现形式。___
A.  银行信用
B.  国家信用
C.  商业信用
D.  消费信用
【单选题】
通货紧缩的危害之-是,当物价水平持续性地普遍下降时,实际利率将会_______,从而损害债务人的利益。___
A. 降低
B. 不变
C. 升高
D. 为零
【单选题】
下列变量中,属于中央银行货币政策中介目标的是__________
A. 超额准备金
B. 货币供应量
C. 法定存款准备金
D. 国际收支
【单选题】
商业银行的市场营销主要表现为服务营销,其中心是__________
A. 金融产品
B. 营销渠道
C. 客户
D. 银行盈利
【单选题】
投资银行并不介入投资者和筹资者之间的资金权利和义务中,而是帮助投资者和筹资者进行金融工具的买卖,此时其收入只是表现为收取__________
A. 利息
B. 佣金服务费
C. 金融工具溢价收入
D. 登记结算费
【单选题】
狭义上说,指数是用于测定多个项目在不同场合下综合变动的一种特殊______。___
A. 算术平均数
B. 相对数
C. 总量指标
D. 几何平均数
【单选题】
下列哪项不属于外债范畴__________
A.  国际金融机构贷款
B.  境外发行股票
C.  发行国际债券
D.  外国商业贷款
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用