【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
推荐试题
【多选题】
命令(令),适用于___
A. 公布行政法规和规章
B. 宣布施行重大强制性措施
C. 批转、转发公文
D. 批准授予和晋升衔级
E. 嘉奖有关单位和人员
【多选题】
以下关于“抄送”的描述,准确的有___
A. 抄送的对象,可以是平行机关,也可以是上级机关
B. 向下级机关的重要行文,一律不得抄送直接的上级机关
C. 上级机关向受双重领导的下级机关行文,可以抄送其另一上级机关
D. 请示不得抄送给下级机关
E. 不论哪种公文,都应当有主送机关和抄送机关
【多选题】
公文的特点包括___
A. 鲜明的政策性
B. 执行的参考性
C. 法定的权威性
D. 严格的规范性
E. 很强的实用性。
【多选题】
公文主体(文中)部分的格式要素包括___
A. 版头
B. 正文
C. 主送机关
D. 发文机关署名
E. 成文日期
【多选题】
下列哪些选项属于请示的写作要求?___
A. 请示的内容必须是属于本机关职责范围内无权或确实无力处理的问题或事项,不能超越职权请示不属本机关职责范围内的事项,也不应请示经过努力能够解决也有条件解决的问题
B. 可以多讲理由,且理据充分
C. 应当一文一事
D. 请示事项涉及其他部门业务范围时,应当经过协商并取得一致意见后上报,经过协商未能取得一致意见时,应当在请示中写明
E. 语气为祈求式
【多选题】
收文办理程序之一是“传阅”,它的要求包括___
A. 根据领导批示和工作需要,将公文及时送给传阅对象阅知或者批示
B. 及时了解掌握公文的报送时间和流向
C. 督促承办部门按期办结
D. 紧急公文或者重要公文应当由专人负责催办
E. 不得漏传、误传、延误
【多选题】
下列表述,不正确的是___
A. 单位的级别低,公文管理就不必那么严格
B. 同级党政机关、党政机关与其他同级机关不可以联合行文
C. 几个单位联合行文,落款时排名不分先后
D. 政府发文,不可以向党组织提要求
E. 党委、政府的部门之间不可以相互行文
【多选题】
收文办理的最后一个主要程序是“答复”,它的要求是___
A. 公文的办理结果应当及时答复来文单位
B. 公文的办理结果应该相互传阅
C. 紧急公文或者重要公文应当由专人负责接手
D. 督促承办部门按期办理
E. 根据需要,将公文的办理结果告知相关单位
【多选题】
《党政机关公文处理工作条例》第七条规定,各级党政机关办公厅(室)主管___
A. 给文件编好立卷的类目
B. 本机关的公文处理工作
C. 根据类目所列条款,准备对应的卷皮
D. 对下级机关的文件是否已处理完毕,进行检查
E. 对下级机关的公文处理工作进行业务指导和督促检查
【多选题】
函适用于不相隶属机关之间___
A. 商洽工作、询问和答复问题
B. 请求批准和答复审批事项
C. 传达重要精神
D. 告知复杂事项
E. 记载会议主要情况
【多选题】
签收的内容包括___
A. 商洽工作、询问和答复问题
B. 请求批准和答复审批事项
C. 对收到的公文逐件清点
D. 对收到的公文经核对无误后签字或者盖章
E. 注明签收时间
【多选题】
各级党政机关应当高度重视公文处理工作,包括___
A. 加强组织领导
B. 强化队伍建设
C. 商洽工作、询问和答复问题
D. 请求批准和答复审批事项
E. 设立文秘部门或者由专人负责公文处理工作
【多选题】
行文关系根据隶属关系和职权范围确定。下列表述正确的是___
A. 一般不得越级行文
B. 对下级机关的公文处理工作进行审批
C. 特殊情况需要越级行文的,应当同时抄送被越过的机关
D. 核对无误后签字或者盖章、越级行文
E. 注明签收时间
【多选题】
关于公文格式,以下描述正确的有___
A. 公文发文机关署名一律用简称
B. 联合行文的成文日期署最后签发机关负责人签发的日期
C. 所有公文都应该在版头(文头)标注签发人姓名
D. 联合行文时,使用主办机关的发文字号
E. 联合行文时,发文机关署名不分先后
【多选题】
公文起草应当做到___
A. 符合国家法律法规和党的路线方针政策
B. 对公文的印刷质量进行检查后分发
C. 完整准确体现发文机关意图
D. 抒发情怀,以接地气
E. 注明签收时间
【多选题】
《党政机关公文处理工作条例》适用于___
A. 上海市委
B. 上海市人大常委会
C. 上海市政府
D. 上海市政协
E. 驻沪部队
【多选题】
___必须套红头、编文号、盖公章。
A. 方案
B. 请示
C. 计划
D. 通知
E. 通报
【多选题】
一篇公文如有几个小标题,要尽可能讲求句式结构的整齐。下列几个小标题中,同属动宾结构的是___
A. 搞好用水总量控制
B. 水资源监控能力项目建设
C. 提高用水效率
D. 关于用水收费
E. 确保水质卫生
【多选题】
公文质量的高低,关系到机关能否有效地___
A. 实施领导
B. 改善态度
C. 处理公务
D. 履行职能
E. 服务企业
【多选题】
以下关于批复的表述,正确的是___
A. 完全同意的批复可以不写理由,只需明确表态
B. 不完全同意的批复,写作时先说明同意的部分,再讲不同意的部分和理由
C. 完全不同意的批复,一定要讲明不同意的理由和根据
D. 不完全同意的批复,只需说明不同意部分的理由,同意的部分只需表态不需说明理由
E. 既有同意的,又有不同意的,总的提法应该是“原则同意”
【多选题】
以下公文属于双向行文的是___
A. 请示与批复
B. 报告与通告
C. 函与函
D. 意见与通知
E. 请示与报告
【多选题】
以下关于报告的描述,准确的有___
A. 报告是一种陈述性公文
B. 报告是双向行文,需要上级机关的批复或指示
C. 报告属于上行文
D. 报告不能和请示杂糅在一起,没有“请示报告”这一文种
E. 报告中,不得夹带请示事项
【多选题】
公文的规范性,包括___
A. 阅读规范
B. 格式规范
C. 处理程序规范
D. 行文规范
E. 写作规范
【多选题】
下列可以用作公文结尾语的是___
A. 此致敬礼
B. 特此函告
C. 顺颂商祺
D. 以上请予支持并盼复
E. 当否,请批示
【多选题】
党政机关公文中,具有嘉奖、表彰、表扬先进用途的文种有___
A. 命令(令)
B. 通知
C. 决定
D. 通报
E. 公告
【多选题】
下列小标题中,同属介词结构的是___
A. 关于去年工作
B. 关于今年打算
C. 加强组织领导
D. 确保完成任务
E. 关于指标调整
【多选题】
下列句子表达有误的是___
A. 本市要尽早出台健康促进相关法律、法规,确保健康促进工作持续发展
B. 这项工作,最迟必须在今年10月底前后完成
C. 要制定城市建设和管理方面的具体实施细则
D. 各区县已对80岁以上高龄的纯老家庭中的年纪大的人提供居家养老服务
E. 要认真总结这次血的安全生产事故的经验和教训
【多选题】
通知可以用作___
A. 上行文
B. 平行文
C. 下行文
D. 上行文和平行文
E. 上行文和下行文
【多选题】
上级收到报告后___
A. 一定作出批复
B. 根据情况决定是否批复
C. 领导可以作批示,但批示不能视作批复
D. 立即派人核实情况
E. 一般根据领导职务高低,从高到低传阅
【多选题】
“转发文件”中的“转发”,用于___
A. 上级转发下级文件
B. 下级转发上级文件
C. 平级转发平级文件
D. 印发非公文
E. 印发其它公文
【多选题】
公文的发送形式有___
A. 抄报
B. 主送
C. 报送
D. 专送
E. 抄送
【多选题】
公文具有___
A. 震撼力
B. 执行力
C. 公信力
D. 领导力
E. 凝聚力
【多选题】
___为句末点号。
A. 句号
B. 逗号
C. 感叹号
D. 分号
E. 问号
【多选题】
___为收文办理程序中的环节而不是公文拟制程序中的环节。
A. 草拟
B. 印制
C. 签收
D. 承办
E. 复核
【多选题】
简报(信息)的特点有___
A. 内容的真实性
B. 情况的特殊性
C. 材料的价值性
D. 篇幅的限制性
E. 传递的及时性
【多选题】
中央提出了创新、___发展理念。
A. 协调
B. 绿色
C. 和谐
D. 开放
E. 共享
【多选题】
函的结尾语,可以用___
A. 以上当否,请予批复
B. 特此函告
C. 以上请予支持为盼
D. 以上去函,必须回复
E. 以上可否,请予函复
【多选题】
修改公文文稿,需遵守下列原则___
A. 尊重原稿本意
B. 展开想象翅膀
C. 贯彻领导意图
D. 大胆推倒重来
E. 重新补写一段
【多选题】
农业部领导: 为贯彻落实《国务院关于长江三角洲地区区域规划的批复》(国函〔2010〕38号)精神,进一步加强本市在“十三五”期间与贵部的合作,经研究,本市拟商请与贵部签署共同推进农业现代化建设合作备忘录。“十三五”期间是本市加快转变农业发展方式,推进农业现代化的关键时期。本市在发展现代农业过程中,需要得到贵部进一步关心和支持。为此,本市将“推进农业现代化建设”作为合作主题,起草了《农业部 ××市人民政府共同推进农业现代化建设合作备忘录(草案)》(见附件),请贵部审核。特此函告并盼批复。××市人民政府2017年8月30日分析正确的是___:
A. 主送单位有误
B. 文种应为函
C. 大标题提出请对方“签署”备忘录,而正文提出请对方“审核”备忘录,题、文不一致
D. ××市人民政府不可以同农业部签署备忘录
E. 结尾语有问题
【多选题】
下面为一篇公文代拟稿××市人民政府办公厅关于邀请保监会领导前来举办保险公开课的函保监会办公厅:为贯彻国务院相关文件精神,加快推动本市国际保险中心建设,进一步提升保险业服务本市经济社会大局的能力,拟邀请保监会领导今年9月下旬拨冗前来本市,围绕“保险业的改革与发展”作专题报告,全面系统地介绍我国保险业改革发展情况,以政府部门带头营造全社会学保险、懂保险、用保险的舆论氛围。专此报告。××市人民政府办公厅 二〇一六年八月十日。有几处分析,正确的是___:
A. 大标题提出请对方“举办保险公开课”,而正文提出请对方“作专题报告”,题、文不一致
B. 正文中,“拟邀请”应该为“特邀请”
C. “以政府部门带头营造全社会学保险、懂保险、用保险的舆论氛围”这句不通
D. 结尾语没有问题
E. 成文日期应该用阿拉伯数字