刷题
导入试题
【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
推荐试题
【单选题】
下列哪种激素是蛋白质合成与贮存所不可缺少的___
A. 胰高血糖素
B. 胰多肽
C. 胰岛素
D. 生长抑素
E. 氢化可的松
【单选题】
下列有关胰岛素的叙述,错误的是___
A. 促进糖的储存和利用
B. 促进葡萄糖转变为脂肪
C. 抑胃肽对胰岛素的分泌有调节作用
D. 促进脂肪和蛋白质的分解和利用
E. 与生长激素有协同效应
【单选题】
调节胰岛素分泌最重要的刺激因素是___
A. 血中氨基酸水平
B. 血糖水平
C. 血中脂肪酸水平
D. 乙酸胆碱
E. 胰高血糖素
【单选题】
通过旁分泌的方式抑制胰岛素分泌的激素是___
A. 抑胃肽 
B. 肾上腺素
C. 生长抑素  
D. 胰高血糖素 
E. 皮质醇
【单选题】
胰高血糖素调节糖代谢的主要靶器官或靶组织是___
A. 肝 
B. 肾 
C. 骨骼肌
D. 脑组织  
E. 心
【单选题】
下列哪种激素与水、钠代谢无关___
A. 氢化可的松 
B. 醛固酮
C. 雌激素
D. 胰高血糖素
E. 抗利尿激素
【单选题】
调节胰高血糖素分泌最重要的因素是___
A. 血糖浓度 
B. 血中氨基酸浓度
C. 胰岛素分泌量
D. 生长抑素分泌量  
E. 生长激素分泌量
【单选题】
下列关于糖皮质激素作用的叙述错误的是___
A. 减弱机体对有害刺激的耐受
B. 促进蛋白质分解,抑制其合成
C. 分泌过多时可引起脂肪重新分布
D. 对保持血管对儿茶酚胺的正常反应有重要作用
E. 有一定的保钠排钾作用
【单选题】
糖皮质激素的作用有___
A. 促进肝组织蛋白质分解和葡萄糖的利用
B. 抑制肝内糖异生
C. 抑制脂肪分解
D. 使血糖降低
E. 使外周血液中红细胞、血小板和中性粒细胞增加,嗜酸性粒细胞和淋巴细胞减少
【单选题】
糖皮质激素升高血糖的机制是___
A. 减少糖异生
B. 抑制肝外组织的葡萄糖利用
C. 促进糖类转变为脂肪
D. 促进脂酸合成
E. 促进葡萄糖氧化
【单选题】
肾上腺皮质功能低下时出现的变化是___
A. 血容量减少
B. 血压升高
C. 血浆Na+浓度升高
D. 血浆K+浓度降低
E. 血容量增多
【单选题】
机体受到刺激而发生应激反应的系统是___
A. 下丘脑-腺垂体~肾上腺皮质系统
B. 下丘脑-神经垂体系统
C. 交感-肾上腺髓质系统
D. 迷走-胰岛素系统
E. 下丘脑-腺垂体-甲状腺系统
【单选题】
机体在发生应激反应时,血中浓度明显升高并起关键作用的激素是___
A. GHRH、GH
B. TSH、T3、T4
C. ACTH、 GC
D. 3 FSH、LH
E. ADH、OT
【单选题】
保钠排钾作用最强的肾上腺皮质激素是___
A. 皮质醇
B. 可的松
C. 皮质酮
D. 脱氧皮质酮
E. 醛固酮
【单选题】
下列有关醛固酮的叙话, 哪项是正确的___
A. 由肾上腺皮质束状带分泌的一种激素
B. 分泌调节的主要因素是AcTH
C. 肾素-血管紧张素系统对其分泌调节的作用极微
D. 血浆中Na+和K+浓度变化对其分泌的调节无作用
E. 作用是促进远曲 小管和集合管对Na+的主动重吸收,同时促进
【单选题】
引起醛固酮分泌的因素有___
A. 细胞外液渗透压升高
B. 严重失血后
C. 垂体功能低下
D. 垂体功能亢进
E. 血钾降低
【单选题】
关于ACTH分泌的调节,错误的是___
A. 受下丘脑促肾上腺皮质激素释放激素的调节
B. 受肾上腺皮质分泌糖皮质激素的反馈调节
C. 受醛固酮的反馈调节
D. 受下丘脑-垂体-肾上腺皮质轴调节
E. 有与光照无关的日周期变化
【单选题】
以IP3和 DG作为第二信使的激素是___
A. 肾上腺素
B. 醛固酮
C. 促肾上腺皮质激素
D. 甲状腺激素
E. 胰岛素
【单选题】
机体在遇到环境因素紧急变化时,即刻被调动的系统是___
A. 迷走-胰岛系统
B. 交感-肾上腺髓质系统
C. 下丘脑-神经垂体系统
D. 肾素-血管紧张素-醛固嗣系统
E. 下丘脑-腺垂体-甲状腺系统
【单选题】
关于肾上腺髓质的叙述,下列哪项是错误的___
A. 受交感神经节前纤维支配
B. 节前神经末梢释放乙酰胆碱
C. 神经递质作用于嗜铬细胞上的N型受体
D. 释放去甲肾上腺素为主
E. 在应急反应时激素释放增加
【单选题】
实验发现,糖皮质激素本身对血管平滑肌收缩并无直接影响,但缺乏糖皮质激素的动物注射去甲肾上腺素的缩血管效应显著低于正常对照动物。糖皮质激素与去甲肾上腺素之间的相互关系是___
A. 相加作用
B. 相减作用
C. 协同作用
D. 拮抗作用
E. 允许作用
【单选题】
女,40岁。闭经、溢乳半年,磁共振发现垂体1.5cmx1.0cm占位病变,需做激素检查。下列无助于诊断的检查是___
A. 泌乳素
B. 生长激素
C. 促肾上腺皮质激素
D. 血管升压素甲
E. 促甲状腺激素
【单选题】
26岁女性患者,因马术训练不慎跌落,导致头部严重挫伤,CT检查发现其垂体柄完全离断。推测其血浆中水平可能升高的激素是___
A. GH
B. OT
C. TSH
D. PRL
E.
F. SH
【单选题】
某患者因脑肿瘤浸润下丘脑室旁核,其所致分泌障碍的下列激素是___
A. LH
B. GH
C. PRL
D. ADH
E. ACTH
【单选题】
43岁男性患者就诊时发现,头、手、足均增大:呈鼻宽、唇厚、粗犷容貌;脊柱变形,体毛多并伴有乳房增大与泌乳现象。患者最可能发生病变的部位是___
A. 睾丸
B. 肾上腺
C. 腺垂体
D. 下丘脑
E. 神经垂体
【单选题】
9岁女童, 因确诊为体肿瘤而行放射性治疗,而后患儿的垂体功能完全丧失,其后将导致的功能显著变化将是___
A. 生长加速
B. 出现甲状腺肿
C. 性腺发育障碍
D. 血浆 ACTH水平升高
E. 血浆 TSH水平升高
【单选题】
25岁妇女就诊,主诉体重减轻,怕热,出汗过多和疲乏无力。体检发现甲状腺肿。化验检查,血中TSH和甲状腺激素浓度升高,但未检测到抗甲状腺抗体。推测符合这些症状的诊断很可能是___
A. Graves 病
B. 甲状腺激素抵抗
C. 甲状腺腺瘤
D. 5-脱碘酶缺乏
E. 分泌TSH的垂体瘤
【单选题】
女,27岁。多食、善饥、大便次数增多,体重下降1个月。经甲疏咪唑治疗1个月后。FT3、FT4 正常,TSH 0.01umol/ml。查体:P78次/分,BP120/60mmHg, 甲状腺Ⅲº肿大,左侧明显气管右偏。患者拟行甲状腺手术治疗,术前准备应选择的药物是___
A. 左甲状腺素钠
B. 普萘洛尔
C. 糖皮质激素
D. 丙硫氧嘧啶
E. 复方碘溶液
【单选题】
甲状腺切除术后半年,患者出现乏力、便秘、怕冷、体重增加,最可能需要的治疗药物是___
A. 左甲状素钠
B. 普萘洛尔
C. 糖皮质激素
D. 内硫氧嘧啶
E. 复方碘溶液
【单选题】
甲状腺功能减退症患者有严重的智力低下、聋哑,估计其甲状腺功能减退始于___
A. 胎儿期或新生儿期
B. 3~5岁
C. 6~10岁
D. 11~17岁
E. 18岁以后
【单选题】
某男性患者,因甲状腺手术不当损伤甲状旁腺十余天,其可能出现的变化是___
A. 低血钙、低血磷,全身僵直
B. 低血钙、低血磷,手足抽搐
C. 低血钙,肌兴奋增强,手足抽搐
D. 高血钙、高血磷,骨基质脱钙
E. 高血钙,肌兴奋增强,骨基质脱钙
【单选题】
符合甲状旁腺功能亢进症的实验室检查结果是___
A. 高血钙、高血磷和低尿钙
B. 高血钙、低血磷和低尿钙
C. 低血钙、低血磷和高尿钙
D. 高血钙、低血磷和高尿钙
E. 低血钙、高血磷和高尿钙
【单选题】
某患者低钙饮食约两月余,可能引起的变化是___
A. 减少小肠上皮细胞钙结合蛋白量
B. 促进24,25-二羟维生素D3合成
C. 提高血磷水平
D. 升高血浆降钙素水平
E. 刺激甲状旁腺激素分泌
【单选题】
女性,45岁。脸圆、变红1年,体重增加、月经稀发6个月。查体: BP160100mmHg,向心性肥胖,皮肤薄,面部痤疮较多,下颌小胡须,全身毳毛增多。腹部、大腿根部可见宽大紫纹。血钾3. 3mmol/L,空腹血糖15.4mmol/L. 该患者最可能的诊断是___
A. 原发性醛固酮增多症
B. 原发性高血压
C. 女性男性化
D. 库欣综合征
E. 糖尿病
【单选题】
66女性,45岁。脸圆、变红1年,体重增加、月经稀发6个月。查体: BP160100mmHg,向心性肥胖,皮肤薄,面部痤疮较多,下颌小胡须,全身毳毛增多。腹部、大腿根部可见宽大紫纹。血钾3. 3mmol/L,空腹血糖15.4mmol/L. 该患者最可能的诊断是库欣综合征,为明确诊断,该患者首先要做的检查是___
A. 促肾上腺皮质激素、皮质醇
B. 肾素、醛固酮
C. 催乳素
D. 尿绒毛膜促性腺激素
E. 肾上腺素
【单选题】
肾上腺皮质功能低下的患者,排除水分的能力大为减弱,可出现“水中毒”,补充下列哪种激素可缓解症状___
A. 胰岛素
B. 糖皮质激素
C. 醛固酮
D. 肾上腺素
E. 胰高血糖素
【单选题】
患者长期大量使用糖皮质激素时,下列哪种变化正确___
A. 血中CRH增加
B. 血中ACTH减少
C. 血中TSH增加
D. 血中GH减少
E. 血中 PRL增加
【单选题】
某人因肾病长期大量用糖皮质激素治疗,患者不会因此而出现___
A. 血糖升高
B. 蛋白质合成增加
C. 面部和躯干脂肪增加
D. 红细胞、血小板增多
E. 淋巴细胞减少
【单选题】
下列关于消化道平滑肌生理特性的叙述正确的是
A. 兴奋性比骨骼肌高
B. 收缩缓慢
C. 对化学刺激不敏感
D. 自律性频率较高且稳定
E. 没有伸展性
【单选题】
消化道平滑肌基本电节律的产生主要由于___
A. Ca2*的跨膜扩散
B. K*的跨膜扩散
C. Na*的跨膜扩散
D. 生电性钠泵周期性变化
E. H*的跨膜扩散
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用