刷题
导入试题
【判断题】
甲是某小学的班主任,利用单独给学生辅导功课的便利,多次猥亵女学生,被法院判处刑罚,同时被禁止在刑罚执行完毕后5年内从事教师职业。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
判处管制,可以根据犯罪情况,同时禁止犯罪分子在执行期间从事特定活动,进入特定区域、场所,接触特定的人。
A. 对
B. 错
【判断题】
 刑法中禁止令的期限,既可以与管制执行的期限相同,也可以短于管制执行的期限,但判处管制的,禁止令的期限不得少于3个月。
A. 对
B. 错
【判断题】
 被判处管制的犯罪分子,管制期满,执行机关应即向本人宣布解除管制,但不宜向其所在单位和居住地的群众宣布。
A. 对
B. 错
【判断题】
管制的刑期,从判决执行之日起计算;判决执行以前先行羁押的,羁押1日折抵刑期1日。
A. 对
B. 错
【判断题】
陆某在16周岁时杀人,到19周岁时被抓捕归案,审判时20周岁。对陆某可以判处死刑。
A. 对
B. 错
【判断题】
犯罪的时候不满18周岁的人和审判的时候怀孕的妇女,不适用死刑。
A. 对
B. 错
【判断题】
判处死刑缓期执行的,在死刑缓期执行期间,如果确有重大立功表现,2年期满后,减为25年有期徒刑。
A. 对
B. 错
【判断题】
被剥夺政治权利的犯罪分子,不得担任公司、企业的领导职务。
A. 对
B. 错
【判断题】
判处管制附加剥夺政治权利的,剥夺政治权利的期限与管制的期限相等,先后执行。
A. 对
B. 错
【判断题】
判处有期徒刑、拘役附加剥夺政治权利的,剥夺政治权利的刑期,从主刑执行完毕之日或者假释之日起计算并执行。在有期徒刑、拘役执行期间,犯罪分子应当享有政治权利。
A. 对
B. 错
【判断题】
又聋又哑的人或者盲人犯罪,应当从轻、减轻或者免除处罚。
A. 对
B. 错
【判断题】
犯罪分子虽然不具有《刑法》规定的减轻处罚情节,但是根据案件的特殊情况,经高级人民法院批准,也可以在法定刑以下判处刑罚。
A. 对
B. 错
【判断题】
 被判处有期徒刑以上刑罚的犯罪分子,刑罚执行完毕或者赦免以后,在5年以内再犯应当判处有期徒刑以上刑罚之罪的,是累犯,应当从重处罚,但是过失犯罪和不满18周岁的人犯罪的除外。
A. 对
B. 错
【判断题】
被判处有期徒刑以上刑罚被假释的犯罪分子,从假释开始之日起,在5年以内再犯应当判处有期徒刑以上刑罚之罪的,是累犯。
A. 对
B. 错
【判断题】
甲因消防责任事故罪被判处有期徒刑2年,刑满释放2年后又因盗窃被判处有期徒刑1年。甲构成累犯。
A. 对
B. 错
【判断题】
甲因犯非法持有毒品罪被判处有期徒刑5年,执行4年后被减刑释放。释放后第4年又因涉嫌重大责任事故罪被判处有期徒刑2年。甲系累犯。
A. 对
B. 错
【判断题】
 被判处有期徒刑以上刑罚的犯罪分子,刑罚执行完毕或者赦免以后,在5年以内再犯应当判处有期徒刑以上刑罚之罪的,除了过失犯罪,均构成累犯。
A. 对
B. 错
【判断题】
危害国家安全的犯罪分子,在刑罚执行完毕之后,在任何时候再犯恐怖活动犯罪的,以累犯论处。
A. 对
B. 错
【判断题】
甲被拘传后,如实供述了司法机关还未掌握的本人其他罪行,应以自首论。
A. 对
B. 错
【判断题】
张某犯罪后本无投案意图,在其姐姐劝说、教育下同意投案。尽管张某能如实供述自己的罪行,并接受司法机关的审判,但不能认定为自首。
A. 对
B. 错
【判断题】
只要犯罪分子有揭发他人犯罪行为,或者提供重要线索的,应当认定为立功,可以从轻或者减轻处罚。
A. 对
B. 错
【判断题】
甲在判决宣告以前犯抢劫罪、盗窃罪与贩卖毒品罪,分别被判处13年、8年、15年有期徒刑。法院数罪并罚决定执行21年有期徒刑。
A. 对
B. 错
【判断题】
为实施其他犯罪,偷开机动车辆当犯罪工具使用后,即使将偷开的机动车辆送回,车辆未丢失的,也应当按照盗窃罪和其所实施的犯罪数罪并罚。
A. 对
B. 错
【判断题】
陈某于某晚潜入胡某家中盗窃贵重物品时,被主人发现。陈某夺门而逃,胡某也没有再追赶。陈某就躲在胡某家墙根处的草垛里睡了一晚,第二天早上村长高某路过时,发现陈某行踪诡秘,就对其盘问。陈某以为高某发现了自己昨晚的盗窃行为,就对高某进行打击,致其重伤。陈某构成盗窃罪、故意伤害罪,应数罪并罚。
A. 对
B. 错
【判断题】
甲被判处有期徒刑和管制,有期徒刑执行完毕后,管制无须再执行。
A. 对
B. 错
【判断题】
法定最高刑为5年以上不满10年有期徒刑的,经过10年以后认为必须追诉的,须报请最高人民检察院核准。
A. 对
B. 错
【判断题】
在公安机关立案侦查或者在人民法院受理案件以后,逃避侦查或者审判的,不受追诉期限的限制。
A. 对
B. 错
【判断题】
被害人在追诉期限内提出控告,人民法院、人民检察院、公安机关应当立案而不予立案的,不受追诉期限的限制。
A. 对
B. 错
【判断题】
追诉期限从犯罪之日起计算;犯罪行为有连续或者继续状态的,从犯罪行为终了之日起计算。
A. 对
B. 错
【判断题】
法定最高刑为无期徒刑的,经过15年不再追诉。
A. 对
B. 错
【判断题】
马某系某水电站操作工,因受单位领导批评,为发泄不满,用炸药将水电站大坝炸毁,致使大坝下游200余户居民受淹,造成1人死亡,1人失踪。马某的行为构成爆炸罪。
A. 对
B. 错
【判断题】
王某使用雷管炸水库水闸,由于未造成严重后果,王某的行为不构成决水罪。
A. 对
B. 错
【判断题】
甲、乙二人购买1000克黑火药,并自制了土炸药,后携带炸药去水塘僻静处炸鱼。甲在岸边准备向水中掷炸药时,不慎引起炸药爆炸,将乙炸死,自己也受重伤。甲的行为构成过失爆炸罪。
A. 对
B. 错
【判断题】
司机马某冬季清晨出车,因天气寒冷,汽油上冻,汽车无法启动,便点燃木材烧烤油箱,不料油箱起火爆炸,当场炸死3人。马某的行为构成过失爆炸罪。
A. 对
B. 错
【判断题】
何某在马路边自家院内埋设油桶,贮藏柴油数百斤自用。某日油桶因静电爆炸,导致十余人伤亡,多栋房屋和过往车辆损坏。何某的行为成立过失爆炸罪。
A. 对
B. 错
【判断题】
过失投放危险物质而致人重伤、死亡的,按照过失致人重伤罪、过失致人死亡罪定罪处罚。
A. 对
B. 错
【判断题】
李某为了防止其承包的鱼塘被盗,在鱼塘附近私拉了电网。当地居民得知后,害怕触电,纷纷绕道行走,没有造成人员伤亡的严重后果。李某的行为构成以危险方法危害公共安全罪。
A. 对
B. 错
【判断题】
 某疾控中心发现其辖区内张某出现发热症状,疑似为“寨卡病毒”患者,要求其接受检疫,但张某坚持称自己是感冒而拒不接受检疫,致使与张某同住一胡同的8人受到“寨卡病毒”感染。张某的行为构成过失以危险方法危害公共安全罪。
A. 对
B. 错
【判断题】
犯组织、领导、参加恐怖组织罪,又实施杀人、爆炸、绑架等犯罪的,应数罪并罚。
A. 对
B. 错
【判断题】
甲资助恐怖活动培训,情节严重,构成帮助恐怖活动罪。
A. 对
B. 错
推荐试题
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用