刷题
导入试题
【判断题】
新时代我国面临的安全和发展环境并不复杂,各种可以预见和难以预见的风险因素明显减少。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
党和政府应加强和创新对建设社会主义和谐社会各项工作的领导,把发展经济、提高国家文化软实力作为社会建设的根本任务。
A. 对
B. 错
【判断题】
虽然说生态兴则文明兴,生态衰则文明衰,但随着人类文明的发展,生态环境可以找到替代品。
A. 对
B. 错
【判断题】
在生态系统保护和修复中,把利用自然力修复生态系统放在首位。
A. 对
B. 错
【判断题】
全面小康,覆盖的人口要全面,是惠及全体人民的小康。全面小康,覆盖的区域要全面,是城乡共同发展的小康。
A. 对
B. 错
【判断题】
国家治理体系和治理能力是一个国家的制度和制度执行能力的集中体现。
A. 对
B. 错
【判断题】
严格依法办事是法治区别于人治的重要标志。
A. 对
B. 错
【判断题】
党的十一届三中全会明确提出了“发展社会主义民主、健全社会主义法治”的重大方针。
A. 对
B. 错
【判断题】
“坚持党要管党、全面从严治党”是新时代党的建设的根本方针。
A. 对
B. 错
【判断题】
全面小康,覆盖的领域要全面,是“三位一体”全面进步的小康。
A. 对
B. 错
【判断题】
改革是经济社会发展的强大动力,发展是解决一切经济社会问题的前提,稳定是改革发展的关键。
A. 对
B. 错
【判断题】
法律具有规范社会行为、调节社会关系、维护社会秩序的作用。道德不具有这些方面的作用。
A. 对
B. 错
【判断题】
党的组织建设的核心是保持党同人民群众的血肉联系。
A. 对
B. 错
【判断题】
依法治军是人民军队建军之本、强军之魂。
A. 对
B. 错
【判断题】
实现把人民军队全面建成世界一流军队目标的时间是在2035年。
A. 对
B. 错
【判断题】
科技是现代战争的核心战斗力。
A. 对
B. 错
【判断题】
党委统一的集体领导下的首长分工负责制是党领导军队的根本制度。
A. 对
B. 错
【判断题】
和平共处五项原则一直是我国处理对外关系的基本准则。
A. 对
B. 错
【判断题】
实现中华民族伟大复兴的中国梦的奋斗目标,必须要有和平国际环境。
A. 对
B. 错
【判断题】
中国坚定不移地奉行独立自主的和平外交政策,是由我国的社会主义性质和在国际上的地位所决定的。
A. 对
B. 错
【判断题】
推动建立新型国际关系,要坚决维护国家核心利益。
A. 对
B. 错
【判断题】
“一带一路”与构建人类命运共同体没有关系。
A. 对
B. 错
【判断题】
构建人类命运共同体既是中国外交的崇高目标,也是世界各国的共同责任和历史使命。
A. 对
B. 错
【判断题】
中国共产党的领导地位是历史和人民的选择。
A. 对
B. 错
【判断题】
历史表明,中国共产党领导中国人民开辟的中国特色社会主义道路是正确的,必须长期坚持、永不动摇。
A. 对
B. 错
【判断题】
历史表明,中国共产党和中国人民扎根中国大地、吸纳人类文明优秀成果、独立自主实现国家发展的战略是正确的,必须长期坚持、永不动摇。
A. 对
B. 错
【判断题】
实现中华民族伟大复兴关键在全面依法治国。
A. 对
B. 错
【判断题】
中国特色社会主义是改革开放以来党的全部理论和实践的主题,是党和人民历尽千辛万苦、付出巨大代价取得的根本成就。
A. 对
B. 错
【判断题】
坚持中国共产党的领导,是党和国家的根本所在、命脉所在。
A. 对
B. 错
【单选题】
我国采用()HZ的正弦交流电定为工业标准频率。
A. 50
B. 60
C. 80
D. 100
【单选题】
如果将额定电压为220/36V变压器接入220V的直流电源,将发生什么现象? ()
A. 输出电压低于36V
B. 36V的直流电压
C. 输出36V电压,一次侧绕组过热
D. 没有电压输出,一次侧严重过热而烧坏
【单选题】
变压器一、二次侧绕组因数不同将导致一、二次侧绕组的电压高低不等,数多的一边电压()。
A. 高
B. 低
C. 可能高也可能低
D. 无关系
【单选题】
变压器铁芯的结构一般分为()和壳式两类。
A. 圆式
B. 角式
C. 芯式
D. 球式
【单选题】
电力变压器利用电磁感应原理将()。
A. 一种电压等级的交流电转变为同频率的另一种电压等级的交流电
B. 一种电压等级的交流电转变为另一种频率的另一种电压等级的交流电
C. 一种电压等级的交流电转变为另一种频率的同一电压等级的交流电
【单选题】
关于电力变压器能否转变直流电的电压,下列说法中正确的是()。
A. 变压器可以转变直流电的电压
B. 变压器不能转变直流电的电压
C. 变压器可以转变直流电的电压,但转变效果不如交流电好
D. 以上答案皆不对
【单选题】
变压器一、二次侧感应电势之比()一、二次侧绕组数之比。
A. 大于
B. 小于
C. 等于
D. 无关
【单选题】
磁导率的国际单位是()。
A. A/m
B. T
C. H/m
D. Wb
【单选题】
磁感应强度的国际单位是()。
A. A/m
B. T
C. H/m
D. W
【单选题】
一台三相变压器的额定容量SN=3200KVA,额定电压为U1N/U2N=35/10.5KV其一次侧额定电流为()A。
A. 52.8
B. 91.4
C. 304.8
D. 380
【单选题】
变压器一、二次电流的有效值之比与一、二次绕组的数比()
A. 成正比
B. 成反比
C. 相等
D. 无关系
【单选题】
磁通的国际单位是()。
A. A/m
B. T
C. H/m
D. Wb
推荐试题
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用