刷题
导入试题
【单选题】
The___ is the primary device for entering information into the computer
A. :disk
B. :printer
C. :keyboard
D. :memory
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
推荐试题
【多选题】
48要全面建成覆盖全民___的多层次社会保障体系。
A. 城乡统筹
B. 权责清晰
C. 保障适度
D. 可持续
【多选题】
49加强和创新社会治理,要___。
A. 创新社会治理体制
B. 改进社会治理方式
C. 加强预防和化解社会矛盾机制建设
D. 加强社会心理服务体系建设
【多选题】
50推进社会文明进步、安定和谐,必须积极培育___的社会心态。
A. 自尊自信
B. 理性平和
C. 积极向上
D. 争强好胜
【多选题】
51坚持总体国家安全观,需要___。
A. 完善国家安全体系
B. 健全公共安全体系
C. 推进平安中国建设
D. 加强国家安全能力建设
【多选题】
52坚持总体国家安全观,需要___。
A. 完善国家安全体系
B. 健全公共安全体系
C. 推进平安中国建设
D. 加强国家安全教育
【多选题】
53建设社会主义生态文明就是要建设以___的资源节约型、环境友好型社会。
A. 资源环境承载力为基础
B. 以自然规律为准则
C. 可持续发展为目标
D. 人的需求得到完全满足为目的
【多选题】
54在生态环境保护上,一定要树立___,不能因小失大、顾此失彼、寅吃卯粮、急功近利。
A. 区域观
B. 大局观
C. 长远观
D. 整体观
【多选题】
55形成人与自然和谐发展新格局,必须___。
A. 把节约资源放在首位
B. 坚持保护优先、自然恢复为主
C. 着力推进绿色发展、循环发展、低碳发展
D. 形成节约资源和保护环境的空间格局、产业结构、生产方式、生活方式
【多选题】
56建设生态文明是一场涉及___的革命性变革。
A. 生产方式
B. 生活方式
C. 思维方式
D. 价值观念
【多选题】
57加快生态文明体制改革,必须___。
A. 推进绿色发展
B. 着力解决突出环境问题
C. 加大生态系统保护力度
D. 改革生态环境监管体制
【多选题】
58解决突出环境问题,必须构建___的环境治理体系。
A. 政府为主导
B. 企业为主体
C. 社会组织共同参与
D. 公众共同参与
【多选题】
59文化强国是指一个国家具有强大的文化力量。这种力量表现为___。
A. 具有高度文化素养的国民
B. 发达的文化产业
C. 强大的文化软实力
D. 强力输出本国文化
【多选题】
60在中国特色社会主义新时代,我们要以更大的力度、更实的措施___。
A. 保障和改善民生
B. 加强和创新社会治理
C. 坚决打赢脱贫攻坚战
D. 促进社会公平正义
【多选题】
61培育和践行社会主义核心价值观,必须立足___。
A. 中华优秀传统文化
B. 世界优秀传统文化
C. 革命文化
D. 改革文化
【多选题】
62在生态环境保护上,一定要树立___,不能因小失大、顾此失彼、寅吃卯粮、急功近利。
A. 区域观
B. 大局观
C. 长远观
D. 整体观
【多选题】
63形成人与自然和谐发展新格局,必须___。
A. 把节约资源放在首位
B. 坚持保护优先、自然恢复为主
C. 着力推进绿色发展、循环发展、低碳发展
D. 形成节约资源和保护环境的空间格局、产业结构、生产方式、生活方式
【多选题】
64建设生态文明是一场涉及___的革命性变革。
A. 生产方式
B. 生活方式
C. 思维方式
D. 价值观念
【多选题】
65加快生态文明体制改革,必须___。
A. 推进绿色发展
B. 着力解决突出环境问题
C. 加大生态系统保护力度
D. 改革生态环境监管体制
【多选题】
66解决突出环境问题,必须构建___的环境治理体系。
A. 政府为主导
B. 企业为主体
C. 社会组织共同参与
D. 公众共同参与
【多选题】
1制度问题带有___,加强制度建设是全面从严治党的长远之策、根本之策。
A. 根本性
B. 全局性
C. 稳定性
D. 长期性
【多选题】
2全面建成小康社会,“全面”讲的是发展的___。
A. 平衡性
B. 协调性
C. 全面性
D. 可持续性
【多选题】
3下列有关全面小康的说法正确的是___。
A. 全面小康,覆盖的领域要全面,是“五位一体”全面进步的小康。
B. 全面小康,覆盖的人口要全面,是惠及全体人民的小康。
C. 全面小康,覆盖的区域要全面,是城乡区域共同发展的小康。
D. 全面小康,覆盖的国家要全面,是世界各国共同发展的小康。
【多选题】
4下列有关全面小康的说法正确的是___。
A. 全面建成小康社会,是“同一水平小康”。
B. 全面建成小康社会,要实事求是、因地制宜。
C. 全面建成小康社会是针对全国讲的,不是每个地区、每个民族、每个人都达到同一个水平。
D. 如期全面建成小康社会,既坚持一定标准,又防止好高骛远;既考虑到2020年这个时间节点,又立足于打基础、谋长远、见成效。
【多选题】
5党的十八届五中全会,赋予“小康”更高的标准、更丰富的内涵___。
A. 经济保持中高速增长。
B. 创新驱动成效显著。
C. 发展协调性明显增强。
D. 人民生活水平和质量普遍提高。
【多选题】
6决胜全面建成小康社会,___。
A. 第一,坚决打好防范化解重大风险攻坚战。
B. 第二,坚决打好精准脱贫攻坚战。
C. 第三,坚决打好污染防治攻坚战。
D. 第四,确保经济社会持续健康发展。
【多选题】
7全面建成小康,缩小城乡区域发展差距,是___。
A. 缩小国内生产总值总量和增长速度的差距
B. 老百姓之间的差距
C. 缩小居民收入水平、基础设施通达水平、基本公共服务均等化水平、人民生活水平等方面的差距
D. 实现收入平均化
【多选题】
8中国特色社会主义进入新时代,要站在更高起点谋划和推进改革,改革是___的。
A. 有目标
B. 有方向
C. 有立场
D. 有原则
【多选题】
9党是改革的___,改革能否顺利推进,关键取决于党,取决于党的领导。
A. 倡导者
B. 获利者
C. 推动者
D. 领导者
【多选题】
10我国改革开放之所以能取得巨大成功___。
A. 关键是我们把党的基本路线作为党和国家的生命线
B. 始终坚持把以经济建设为中心同四项基本原则、改革开放这两个基本点统一于中国特色社会主义伟大实践
C. 既不走封闭僵化的老路,也不走改旗易帜的邪路
D. 坚定不移走中国特色社会主义道路
【多选题】
11坚持社会主义市场经济改革方向___。
A. 是经济体制改革的基本遵循
B. 是全面深化改革的重要依托
C. 是改革开放的前提
D. 是改革开放的核心
【多选题】
12下列有关国家治理体系和治理能力说法正确的是___。
A. 国家治理体系和治理能力是一个国家的制度和制度执行能力的集中体现,两者相辅相成。
B. 国家治理体系是在党领导下管理国家的制度体系,包括经济、政治、文化、社会、生态文明和党的建设等各领域体制机制、法律法规安排,即一整套紧密相连、相互协调的国家制度
C. 国家治理能力则是运用国家制度管理社会各方面事务的能力,包括改革发展稳定、内政外交国防、治党治国治军等各个方面
D. 不能把国家治理体系和国家治理能力等同起来,不是国家治理体系越完善,国家治理能力越强。
【多选题】
13要大力培育和弘扬社会主义核心价值体系和核心价值观,加快构建充分反映中国特色、民族特性、时代特征的价值体系,努力抢占价值体系的制高点,___。
A. 处理好解放思想和实事求是的关系
B. 处理好顶层设计和摸着石头过河的关系
C. 时代特征
D. 历史特点
【多选题】
14正确处理全面深化改革中的重大关系包括___。
A. 处理好解放思想和实事求是的关系。
B. 处理好顶层设计和摸着石头过河的关系。
C. 处理好整体推进和重点突破的关系
D. 处理好改革、发展、稳定的关系
【多选题】
15注重___是全面深化改革的内在要求,也是推进改革的重要方法。
A. 全面性
B. 系统性
C. 整体性
D. 协同性
【多选题】
16___是我国社会主义现代化建设的三个重要支点
A. 改革
B. 全面
C. 发展
D. 稳定
【多选题】
17中国特色社会主义法治道路___。
A. 坚持中国共产党的领导
B. 坚持人民在全面依法治国中的主体地位
C. 坚持法律面前人人平等
D. 坚持依法治国和以德治国相结合
【多选题】
18全面依法治国,总目标是___。
A. 建设中国特色社会主义法治体系
B. 实现民主化
C. 建设社会主义法治国家
D. 建设民主政治
【多选题】
19全面依法治国必须坚持厉行法治,推进___,推进中国特色社会主义法治体系建设,全面深化依法治国实践。
A. 科学立法
B. 严格执法
C. 公正司法
D. 全民守法
【多选题】
20新时代党的建设总要求是___。
A. 坚持和加强党的全面领导,坚持党要管党、全面从严治党
B. 以加强党的长期执政能力建设、先进性和纯洁性建设为主线,以党的政治建设为统领,以坚定理想信念宗旨为根基,以调动全党积极性、主动性、创造性为着力点
C. 全面推进党的政治建设、思想建设、组织建设、作风建设、纪律建设,把制度建设贯穿其中,深入推进反腐败斗争,不断提高党的建设质量
D. 把党建设成为始终走在时代前列、人民衷心拥护、勇于自我革命、经得起各种风浪考验、朝气蓬勃的马克思主义执政党
【多选题】
21把党的政治建设摆在首位的原因是:___。
A. 旗帜鲜明讲政治是我们党作为马克思主义政党的根本要求
B. 党的政治建设是党的根本性建设,决定党的建设方向和效果
C. 注重抓党的政治建设是党的十八大以来全面从严治党的成功经验
D. 党的政治建设是党的基础性建设
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用