【判断题】
Q_20725:行政机关公开政府信息,应当遵循公正、公平、便民的原则。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
Q_20652:人民法院对委托或者指定的鉴定部门出具的鉴定书,无需审查鉴定的过程。
【判断题】
Q_20651:某市工商局在行政程序中依照法定程序要求钱某提供证据,钱某依法应当提供而拒不提供,进入诉讼程序后,钱某才提供该证据,对此证据,人民法院一般不予采纳。
【判断题】
Q_20650:在行政诉讼中,由于以审查被诉具体行政行为的合法性为主,因而作为被告的行政机关或者法律、法规、规章授权的组织对其所作的行政行为承担举证责任,是证明责任的主要承担者。
【判断题】
Q_20649:根据行政诉讼法的规定,在诉讼过程中,被告及诉讼代理人不得自行向原告、第三人和证人收集证据。
【判断题】
Q_20648:凡是伪造证据、隐匿证据或毁灭证据,无论属于何方,必须受法律追究。
【判断题】
Q_20647:行政诉讼中,原告提供的证据不能证明被诉具体行政行为违法的,不能免除被告的相应举证责任。
【判断题】
Q_20646:对非原件的复制性书证,要提供由有关部门保管的书证原件的复制件、影印件或者抄录件的,应当注明出处,并经该部门核对无异后加盖其印章。
【判断题】
Q_20645:当事人提供的声音资料证据,应当附有该声音内容的文字记录。
【判断题】
Q_20644:原告或第三人不能自行收集证据,但能够提供证据的确切线索的,可以向法院申请调取证据。
【判断题】
Q_20643:根据行政诉讼法的有关规定,当事人在行政诉讼中可以向人民法院申请保全证据。
【判断题】
Q_20642:证据的合法性是指证据的形式及其取得必须符合法律规定。
【判断题】
Q_20641:证据应当在法庭上出示,并经庭审质证。
【判断题】
Q_20640:当事人在庭前证据交换过程中没有争议并记录在卷的证据,经审判人员在庭审中说明后,可以作为认定案件事实的依据。
【判断题】
Q_20639:经合法传唤,因被告无正当理由拒不到庭而需要缺席判决的,被告提供的所有证据都不能作为定案的依据。
【判断题】
Q_20638:被告在行政诉讼中仅对其所作具体行政行为负有举证责任。
【判断题】
Q_20637:被告应当在收到起诉状副本之日起15日内,提供据以作出具体行政行为的全部证据和所依据的规范性文件。
【判断题】
Q_20636:被告不提供或者无正当理由逾期提供证据、依据的,应当认定该具体行政行为没有证据、依据。
【判断题】
Q_20635:证据涉及国家秘密、商业秘密或者个人隐私的,提供人应当作出明确标注,并向法庭说明,法庭予以审查确认。
【判断题】
Q_20598:两个以上行政机关共同行使行政职权时侵犯公民、法人和其他组织的合法权益造成损害的,共同行使行政职权的行政机关为共同赔偿义务机关。
【判断题】
Q_20597:受害的公民死亡,其继承人和有抚养关系的人提起行政赔偿诉讼,应当提供赔偿请求人与死亡公民之间的关系证明。
【判断题】
Q_20596:受害的法人或者其他组织终止,承受其权利的法人或者其他组织无权要求赔偿。
【判断题】
Q_20595:行政机关工作人员与行使职权无关的个人行为,国家不承担赔偿责任。
【判断题】
Q_20594:在行政赔偿中,致人精神损害的,应当在侵权行为影响的范围内,为受害人消除影响,恢复名誉,赔礼道歉;造成严重后果的,应当支付相应的精神损害抚慰金。
【判断题】
Q_20593:行政赔偿义务机关赔偿损失后,应当责令故意或重大过失的工作人员承担部分或者全部赔偿费用。
【判断题】
Q_20592:行政赔偿以支付赔偿金为主要方式。
【判断题】
Q_20591:赔偿义务机关被撤销的,首先由撤销该赔偿义务机关的行政机关做为赔偿义务机关。
【判断题】
Q_20590:行政机关及其工作人员违法行使行政职权造成公民身体伤害或者死亡的,受害人有取得赔偿的权利。
【判断题】
Q_20529:公民、法人或者其他组织直接向人民法院提起诉讼的,应当自知道或者应当知道作出行政行为之日起六个月内提出。法律另有规定的除外。
【判断题】
Q_20528:在行政诉讼过程中,作为被告的某市教委可以自行向原告和证人收集证据。
【判断题】
Q_20527:对两个以上人民法院都有管辖权的案件,原告可以选择其中一个人民法院提起诉讼。原告向两个以上有管辖权的人民法院提起诉讼的,由最先立案的人民法院管辖。
【判断题】
Q_20526:市税务局工作人员刘某对市税务局对其作出的降级处分不满,遂向人民法院提起的行政诉讼,人民法院应当受理。
【判断题】
Q_20525:人民法院审理行政案件,对行政行为是否合理进行审查。
【判断题】
Q_20524:在行政诉讼中,由原告承担主要的举证责任来证明该行政行为违法。
【判断题】
Q_20523:行政诉讼中,被告不提交答辩状的,人民法院应当终止对行政行为的审理。
【判断题】
Q_20522:因不动产提起的行政诉讼,由不动产所在地人民法院管辖。
【判断题】
Q_20521:同提起诉讼的行政行为有利害关系的其他公民、法人或其他组织,可以作为第三人申请参加诉讼。
【判断题】
Q_20520:行政机关及其工作人员不得干预、阻碍人民法院受理行政案件。
【判断题】
Q_20519:行政行为,既包括国家行政机关作出的行政行为,也包括法律、法规、规章授权的组织作出的行政行为。
【判断题】
Q_20518:行政机关认为已发生法律效力的判决、裁定确有错误的,可以向上一级人民法院申请再审,但判决、裁定不停止执行。
【判断题】
Q_20517:被诉行政机关负责人应当出庭应诉。不能出庭的,应当委托行政机关相应的工作人员出庭。
推荐试题
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group