刷题
导入试题
【多选题】
领导情景论包括 ___
A. 领导行为论
B. 管理方格论
C. 权变理论
D. 路径一目标理论
E. 领导生命周期理论
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
CDE
解析
暂无解析
相关试题
【多选题】
根据确定控制标准Z值得方法分类的控制类型包括 ___
A. 程序控制
B. 跟踪控制
C. 自适应控制
D. 最佳控制
E. 反馈控制
【多选题】
韦伯认为,传统式权威的基础是 ___
A. 先例
B. 惯例
C. 英雄主义
D. 法律
E. 发布命令的权利
【多选题】
企业的利益相关者包括 ___
A. 股东
B. 员工
C. 消费者
D. 供应商
E. 竞争者
【多选题】
全球化经营的国际直接投资进入主要包括 ___
A. 特许进入
B. 合资进入
C. 独资进入
D. 新建进入
E. 购并进入
【多选题】
信息的存储工作环节包括 ___
A. 归档
B. 登录
C. 编目
D. 编码
E. 排架
【多选题】
下列属于集体决策方法的有 ___
A. 头脑风暴法
B. 名义小组技术
C. 德尔菲技术
D. 线性规划
E. 动态规划
【多选题】
企业评价细分市场的主要指标包括 ___
A. 企业的产品结构
B. 细分市场规模及其成长状况
C. 细分市场结构的吸引力
D. 企业的目标和资源状况
E. 企业的竞争对手状况
【多选题】
迈克尔·波特在《竞争战略》一书中提出,企业应根据各自具体情况采取的不同竞争战略包括 ___
A. 市场渗透战略
B. 市场开发战略
C. 成本领先战略
D. 差异化战略
E. 集中化战略
【多选题】
组织所采取的传统绩效评估方法有 ___
A. 个人自我评价法
B. 小组评议法
C. 工作标准法
D. 业绩表评估法
E. 排列评估法
【多选题】
菲得勒将领导权变理论具体化的几个方面是 ___
A. 职位权利
B. 任务结构
C. 上下级关系
D. 领导方式
E. 组织目标
【多选题】
平衡积分卡的控制指标涉及的范围包括 ___
A. 财务方面
B. 客户方面
C. 内部经营过程
D. 学习和成长
E. 竞争对手
【多选题】
道德发展的前惯例层次对应的道德发展阶段包括___
A. 遵守规则以避免受到物质惩罚
B. 在符合你的直接利益时才遵守规则
C. 通过履行你允诺的义务来维持平常秩序
D. 你周围的人所期望的事
E. 遵守自己选择的伦理准则,即使这些准则违背了法律
【多选题】
27.按决策问题重要性程度分类的决策包括___
A. 战略决策
B. 战术决策
C. 业务决策
D. 确定型决策
E. 不确定型决策
【多选题】
决策过程中,人们对待风险的态度主要有___
A. 风险厌恶型
B. 风险中立型
C. 风险爱好型
D. 风险追求型
E. 风险回避型
【多选题】
良好的细分市场应具有的特征包括 ___
A. 可测量性
B. 可接近性
C. 可实现性
D. 丰富性
E. 竞争性
【多选题】
根据工作的多变性与可分析性两项维度标准,可以将技术划分为 ___
A. 常规型技术
B. 非常规型技术
C. 工艺型技术
D. 工程型技术
E. 服务型技术
【多选题】
锥形式组织结构的特征包括___
A. 管理层级比较多
B. 管理幅度比较小
C. 层级之间关系比较紧密
D. 信息失真度比较低
E. 下属提升机会比较少
【多选题】
组织变革的内容包括___
A. 人员变革
B. 结构变革
C. 技术与任务变革
D. 制度变革
E. 环境变革
【多选题】
导致组织内冲突的原因大致包括___
A. 沟通差异
B. 结构差异
C. 个体差异
D. 管理差异
E. 地域差异
【多选题】
根据时机、对象和目的的分类的控制类型包括___
A. 程序控制
B. 跟踪控制
C. 前馈控制
D. 同期控制
E. 反馈控制
【多选题】
预算的内容包括___
A. 收入预算
B. 支出预算
C. 现金预算
D. 赘金支出预算
E. 资产负债预算
【多选题】
以下属于管理社会属性的有 ___
A. 生产者
B. 生产方式
C. 生产力
D. 生产关系
E. 上层建筑
【多选题】
全面质量管理作为一种管理理念,其要点包括 ___
A. 关注顾客
B. 注重持续改善
C. 关注流程
D. 精确测量
E. 授权于员工
【多选题】
全球化经营进入方式中的非股权安排包括 ___
A. 直接出口
B. 特许
C. 合同制造
D. 管理合同
E. 合资进人
【多选题】
根据SWOT矩阵,企业在不同内外环境下的战略选择包括 ___
A. SW战略
B. SO战略
C. W0战略
D. ST战略
E. WT战略
【多选题】
与其他资源相比较,人力资源所具有的特点包括 ___
A. 能动性
B. 时效性
C. 再生性
D. 社会性
E. 私有性
【多选题】
研究领导行为论的学者有 ___
A. R李克特
B. 弗莱西
C. 布莱克
D. 穆顿
E. 菲德勒
【多选题】
根据需要层次论,下列属于自我实现需要范畴的有 ___
A. 友谊、爱情的需要
B. 内部尊重和外部尊重的需要
C. 成长与发展的需要
D. 发挥自身潜能的需要
E. 实现理想的需要
【多选题】
管理冲突通常的处理办法包括 ___
A. 回避
B. 迁就
C. 强制
D. 妥协
E. 合作
【多选题】
根据审查主体和内容的不同而划分的审计类型包括 ___
A. 外部审计
B. 内部审计
C. 管理审计
D. 销售审计
E. 利润审计
【多选题】
经营比率包括 ___
A. 负债比率
B. 盈利比率
C. 库存周转率
D. 固定资产周转率
E. 销售收人与销售费用比率
【多选题】
科学管理理论的主要代表人物是 ___
A. ,泰罗
B. 亨利?法约尔
C. 吉尔布雷斯夫妇
D. 甘特
E. 马斯洛
【多选题】
全球化管理的一般环境因素包括 ___
A. ,政治环境
B. 法律环境
C. 技术环境
D. 文化环境
E. 经济环境
【多选题】
组织决策的影响因素包括 ___
A. 环境因素
B. 组织文化
C. 组织自身的因素
D. 决策问题的性质
E. 决策主体的因素
【多选题】
按照计划内容的明确性标准来划分,计划的类型分为 ___
A. 业务计划
B. 财务计划
C. 人事计划
D. 具体性计划
E. 指导性计划
【多选题】
有效授权必须掌握的原则是___
A. 重要性原则
B. 适度原则
C. 最优原则
D. 权贵一致原则
E. 级差授权原则
【多选题】
31.管理人员招聘的标准包括 ___
A. ,管理的欲望
B. 良好的品德
C. 勇于创新的精神
D. 极强的理论研宄能力
E. 较髙的决策能力
【多选题】
按照领导生命周期理论划分,具体的领导方式为 ___
A. ,指导型领导
B. 推销型领导
C. 民主型领导
D. 参与型领导
E. 授权型领导
【多选题】
按照功能划分,沟通可以划分为 ___
A. 工具式沟通
B. 个体间沟通
C. 感情式沟通
D. 单向沟通
E. 双向沟通
【多选题】
下列属于财务控制方法的有 ___
A. ,库存分析
B. 经营审计
C. 质量分析
D. 比率分析
E. 生产控制
推荐试题
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用