【单选题】
实践的主体是___
A. 绝对精神
B. 具有一定的主体能力、从事现实社会实践活动的人
C. 人
D. 人的意识
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
实践的客体是___
A. 绝对精神的对象化
B. 客观物质世界
C. 人的意识的创造物
D. 实践活动所指向的对象
【单选题】
“从群众中来,到群众中去”的过程,从认识论上看,就是___
A. 感性认识-理性认识-感性认识的过程
B. 认识-实践-认识的过程
C. 实践-认识-实践的过程
D. 理性认识-感性认识-理性认识的过程
【单选题】
恩格斯说:“人的智力是按照人如何学会改造自然界而发展的。”这说明___
A. 自然界是认识发展的动力
B. 实践是认识发展的动力
C. 人的认识具有主观能动性
D. 人具有认识自然的能力
【单选题】
实践作为检验真理的标准,之所以具有相对性、不确定性,主要是因为一定历史条件下的具体实践都具有___
A. 自觉能动性
B. 客观物质性
C. 直接现实性
D. 历史局限性
【单选题】
“纸上得来终觉浅,绝知此事要躬行。”这句话强调的是___
A. 直接经验是知识的唯一来源
B. 书本知识是根本不可靠的
C. 间接经验是知识的唯一来源
D. 实践在认识活动中起着决定作用
【单选题】
感性认识和理性认识的区别是___
A. 感性认识是可靠的,理性认识是不可靠的
B. 感性认识来源于实践,理性认识来源于书本
C. 感性认识是对现象的认识,理性认识是对本质的认识
D. 感性认识来源于直接经验,理性认识来源于间接经验
【单选题】
我们通过眼、耳、鼻、舌、身各种感官感觉到一个梨子的各种属性,在意识中把它们联系起来形成了关于这个梨子的感性形象,这种反映形式是___
【单选题】
真理与谬误之间的相互关系是___
A. 在任何情况下都是绝对对立的
B. 没有相互转化的可能性
C. 在一定条件下可以互相转化
D. 两者之间没有原则区别
【单选题】
对客观事物的认识即为真理,这个观点是___
A. 混淆了真理性认识与一般认识的错误观点
B. 辩证唯物主义的真理观
C. 一切唯物主义的真理观
D. 混淆了真理的客观性与规律客观性
【单选题】
承认真理的相对性___
A. 必然归结为诡辩论
B. 必然归结为怀疑主义
C. 必然归结为不可知论
D. 可以防止认识的僵化
【单选题】
“人的思维是否具有真理性,这并不是一个理论的问题,而是一个实践的问题。人应该在实践中证明自己思维的真理性,即自己思维的现实性和力量,亦即自己思维的此岸性。”这一论断说明了___
A. 实践是认识的来源和动力
B. 实践是检验认识是否具有真理性的唯一标准
C. 实践检验真理不需要理论指导
D. 认识活动与实践活动具有同样的作用和力量
【单选题】
马克思指出:“搬运夫和哲学家之间的原始差别要比家犬和猎犬之间的差别小得多,它们之间的鸿沟是分工掘成的。”这表明___
A. 人的聪明才智无先天区别
B. 人的聪明才智的大小主要取决于主观努力的程度
C. 人的聪明才智主要来源于后天实践
D. 人的聪明才智由人的社会政治地位决定
【单选题】
真理和谬误的界限在于___
A. 是否符合人的利益和愿望
B. 是否符合马克思主义
C. 是否正确地反映了客观事物的本质和规律
D. 是否为大多数人所接受
【单选题】
真理观上的相对主义,错误在于___
A. 夸大真理的相对性,否认真理的绝对性
B. 夸大真理的绝对性,否认真理的相对性
C. 只讲真理的客观性,否认真理的相对性
D. 认为关于同一对象真理性的认识只有一个
【单选题】
那种主张“天赋的才能”、“天生的心灵禀赋”的观点属于___
A. 唯心主义先验论
B. 旧唯物论的直观反映论
C. 唯物主义反映论
D. 辩证唯物论的能动反映论
【单选题】
在真理问题上坚持辩证法,就是要承认任何真理都是___
A. 客观性和主观性的统一
B. 主观性和相对性的统一
C. 客观性和绝对性的统一
D. 绝对性和相对性的统一
【单选题】
马克思主义认识论认为,真理的发展是一个___
A. 从主观真理走向客观真理的过程
B. 从局部真理走向全面真理的过程
C. 从相对真理走向绝对真理的过程
D. 从具体真理走向抽象真理的过程
【单选题】
人们认识世界的目的在于___
A. 发展个人的兴趣爱好
B. 实现对自身能力的改造
C. 满足人类的求知欲望
D. 实现对客观世界的改造
【单选题】
下列各项中,强调认识来源于实践的是___
A. 不积跬步,无以至千里
B. 蝉噪林愈静,鸟鸣山更幽
C. 不积小流,无以成江海
D. 近水知鱼性,近山识鸟音
【单选题】
马克思主义哲学认为,人们追求符合客观实际的科学认识,归根到底是为了___
A. 把握事物现象
B. 揭示事物本质
C. 追求自我实现
D. 改造客观世界
【单选题】
能动反映论区别于机械反映论的根本标志是___
A. 肯定思维能正确地反映存在
B. 认为认识过程是纯粹的观念创造
C. 肯定思维对存在的决定作用
D. 认为认识过程是反映和创造的统一
【单选题】
毛泽东在《实践论》中有一句话:“感觉只解决现象问题,理论才解决本质问题”,这句话说明___
A. 感性认识是微不足道的
B. 感性认识有待于发展到理性认识
C. 理性认识是唯一可靠的
D. 理性认识有待于深化为感性认识
【单选题】
在真理标准问题上坚持辩证法,就是要承认实践标准___
A. 既是抽象的又是具体的
B. 既是必然的又是偶然的
C. 既是普遍的又是特殊的
D. 既是绝对的又是相对的
【单选题】
“哲学家们只是用不同的方式解释世界,问题在于改变世界”的提出者是___
A. 黑格尔
B. 费尔巴哈
C. 马克思
D. 恩格斯
【单选题】
马克思主义认识论认为,认识的本质是___
A. 主体对客体的直观反映
B. 主体对客体的自由创造
C. 主体对客体的能动反映
D. 主体对客体的简单摹写
【单选题】
党的思想路线的核心是___
A. 一切从实际出发
B. 理论联系实际
C. 实事求是
D. 实践是检验真理的唯一标准
【单选题】
人类认识发展的根本动力是___
A. 兴趣爱好
B. 社会实践
C. 求知欲望
D. 好奇心理
【单选题】
任何真理都是具体的,包罗万象的真理是不存在的,这是因为真理具有___
A. 绝对性
B. 相对性
C. 全面性
D. 片面性
【单选题】
真理是没有阶级性的,在真理面前人人平等。这是因为___
A. 真理是绝对正确的,与人的阶级地位无关
B. 真理具有客观性,包含着不依赖于人和人的意识的客观内容
C. 真理具有相对性,是不断发展的
D. 真理是具体的,都有其适用的条件和范围
【单选题】
16世纪末,伽利略通过在比萨斜塔所做的自由落体实验,推翻了亚里士多德关于物体的降落速度与物体的重量成正比的说法。这件事说明___
A. 真理是对事物及其规律的正确反映
B. 真理是由相对真理走向绝对真理的过程
C. 实践是认识发展的动力
D. 实践是检验认识是否正确的唯一标准
【单选题】
与辩证唯物主义认识论相比较,旧唯物主义认识论有两个缺陷,一个是缺乏辩证法的观点,另一个是___
A. 缺乏实践的观点
B. 缺乏反映论的观点
C. 缺乏一元论的观点
D. 缺乏可知论的观点
【单选题】
“感觉到了的东西,我们不能立刻理解它,只有理解了的东西才能更深刻地感觉它”,这句话表明___
A. 感性认识是微不足道的
B. 感性认识是认识的高级阶段
C. 理性认识是唯一可靠的
D. 理性认识是认识的高级阶段
【单选题】
一个完整的认识过程,需要经过两次飞跃。下列选项中属于第二次飞跃的是___
A. 调查研究,了解情况
B. 深入思考,形成理论
C. 精心安排,制定策略
D. 执行计划,付诸实践
【单选题】
一个完整的认识过程是___
A. 感觉—知觉—表象
B. 概念—判断—推理
C. 认识—实践—认识
D. 实践—认识—实践
【单选题】
作为真理的马克思主义是发展的、与时俱进的,这是因为真理具有___
A. 相对性
B. 能动性
C. 绝对性
D. 普遍性
【单选题】
检验认识的真理性,就是要检验人们的认识是否___
A. 与多数人的愿望和要求相符合
B. 与已被实践证明的理论相符合
C. 与客观事物及其规律相符合
D. 与党的路线方针政策相符合
【单选题】
感觉、知觉、表象是___
A. 感性认识的三种形式
B. 理性认识的三种形式
C. 社会心理的三种形式
D. 思想体系的三种形式
【单选题】
有人认为只有写到书本上的理论才是真实可靠的,从而不顾实际情况,死搬书本上的教条。这在认识论上犯了类似于___
A. 唯心主义先验论的错误
B. 直观被动反映论的错误
C. 唯理论的错误
D. 经验论的错误
【单选题】
一个完整的认识过程包括两次飞跃,其中第二次飞跃是___
A. 从概念到判断的过程
B. 从认识到实践的过程
C. 从判断到推理的过程
D. 从感觉到概念的过程
推荐试题
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall