刷题
导入试题
【单选题】
组织理论上把管理层次多而管理幅度小的结构称之为___
A. 锥形结构
B. 扁平结构
C. 直线结构
D. 矩形结构
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
组织结构中最早使用的最简单的一种结构类型是___
A. 职能制
B. 事业部制
C. 直线——职能制
D. 直线制
【单选题】
组织设计的基本原则是___
A. 专业化分工
B. 统一指挥
C. 权责对等
D. 控制幅度
【单选题】
认为环境、战略、技术与组织规模是影响组织设计的因素的学者是___
A. 伯恩斯
B. 斯托克
C. 西拉季
D. 劳伦斯
【单选题】
的职能范围内行使某种职权,这是___
A. 职能取权
B. 直线职权
C. 参谋职权
D. 下属分权
【单选题】
以下组织结构中分权程度最高的是___
A. 直线制
B. 职能制
C. 直线一职能制
D. 事业部制
【单选题】
相对扁平式组织结构来说,锥型式组织结构具有的特点是___
A. 管理层级比较多,管理幅度比较小
B. 管理层级比较少,管理幅度比较小
C. 管理层级比较多,管理幅度比较大
D. 管理层级比较少,管理幅度比较大
【单选题】
在组织规模一定的情况下,管理幅度与组织层次之间体现为___
A. 正比例关系
B. 反比例关系
C. 没有关系
D. 间接关系
【单选题】
管理者直接指导下属工作的职权是___
A. 直线职权
B. 参谋职权
C. 职能职权
D. 权益职权
【单选题】
要求每位下属应该有一个并且仅有一个上级的组织设计原则是___
A. 统一指挥原则
B. 专业化分工原则
C. 控制幅度原则
D. 权责对等原则
【单选题】
钱德勒在研究组织结构与战略关系时提出战略发展的第一个阶段是___
A. 地区开拓阶段
B. 纵向联合发展阶段
C. 数量扩大阶段
D. 产品多样化阶段
【单选题】
组织层級与组织幅度的反比率关系决定的两种基本组织结构形态是___
A. 扁平式结构和锥型式结构
B. 矩阵型结构和动态网络型结构
C. 扁平式结构和动态网络型结构
D. 矩阵型结构和锥型式结构
【单选题】
根据梅尔斯和斯诺的观点,当组织处在比较稳定的环境中时,更适合采取的战略类型是___
A. 防御者型
B. 探险者型
C. 分析者型
D. 反映者型
【单选题】
具有更大灵活性和柔性,而且容易操作的组织结构形式是___
A. 矩阵型结构
B. 动态网络型结构
C. 直线职能制结构
D. 事业部制结构
【单选题】
是___
A. 直线职权
B. 职能职权
C. 参谋职权
D. 管理职权
【单选题】
是___
A. 单件小批量生产技术
B. 大批量生产技术
C. 流程生产技术
D. 连续生产技术
【单选题】
按照工作的过程标准划分的组织部门化形式是___
A. 职能部门化和流程部门化
B. 流程部门化和顾客部门化
C. 顾客部门化和地域部门化
D. 职能部门化和地域部门化
【单选题】
职权___
A. 矩阵型结构
B. 动态网络型结构
C. 扁平式组织结构
D. 锥形式组织结构
【单选题】
影响有效管理幅度的诸多因素中,与组织活动内容及政策调整频度和幅度有关的是___
A. 主管和下属的工作能力
B. 工作内容和性质
C. 工作条件的优劣
D. 组织环境稳定与否
【多选题】
组织目标形成一个有层次的体系,它的范围具体包括___
A. 长、中、短期目标
B. 组织的任务
C. 特定的个人目标
D. 管理层的目标
E. 组织战略性目标
【多选题】
组织的部门化形式主要有___
A. 职能部门化
B. 产品部门化
C. 服务部门化
D. 地域部门化
E. 顾客部门化
【多选题】
为了达到组织设计的理想效果,组织设计者需要完成的主要工作有___
A. 职能与职务的分析与设计
B. 部门设计
C. 设备配置
D. 人员配置
E. 层级设计
【多选题】
组织设计要坚持的原则有___
A. 统一指挥原则
B. 因人设事原则
C. 控制幅度原则
D. 责权对等原则
E. 柔性经济原则
【多选题】
组织结构可以用___等特性来描述。
A. 复杂性
B. 规范性
C. 集权性
D. 可变性
E. 成长性
【多选题】
影响组织设计的因素有___
A. 环境
B. 战略
C. 技术
D. 组织结构
E. 人员素质
【多选题】
有效的管理幅度受到诸多因素的影响,其中主要的有___
A. 工作能力
B. 工作内容
C. 工作条件
D. 工作环境
E. 设备
【多选题】
影响组织分权程度的主要因素有___
A. 组织规模的大小
B. 政策的统一性
C. 组织的可控性
D. 组织所处的成长阶段
E. 员工的数量和基本素质
【多选题】
组织设计的原则包括___
A. 专业化分工原则
B. 统一指挥原则
C. 柔性经济原则
D. 权责对等原则
E. 控制幅度原则
【多选题】
矩阵型组织结构的优点包括___
A. 能适应较高不确定性的环境
B. 增强职能人员参与项目管理的积极性
C. 获取专业化分工的好处
D. 有助于比较不同部门的页献
E. 易于协调管理
【多选题】
影响组织设计的主要因素有___
A. 环境
B. 战路
C. 技术
D. 规模
E. 生命周期
【多选题】
授权应遵循的原则有___
A. 重要性原则
B. 明确性原则
C. 适度原则
D. 权责一致原则
E. 级差授权原则
【多选题】
根据工作的多变性与可分析性两项维度标准,可以将技术划分为___
A. 常规型技术
B. 工艺型技术
C. 工程型技术
D. 非常规划型技术
E. 流程型技术
【多选题】
组织结构主要包括___
A. 职能结构
B. 层次结构
C. 部门结构
D. 职权结构
E. 人员结构
【多选题】
大型组织与小型组织在组织结构上的区别主要体现在___
A. 规范化程度
B. 集权化程度
C. 复杂化程度
D. 人员结构比例
E. 人员职称比例
【多选题】
按照工作的结果标准来划分的组织部门化形式有___
A. 职能部门化
B. 产品部门化
C. 地域部门化
D. 顾客部门化
E. 流程部门化
【多选题】
按照工作的过程标准来进行部门划分的部门化方法是___
A. 顾客部门化
B. 职能部门化
C. 流程部门化
D. 产品部门化
【多选题】
组织结构的特性包括___
A. 复杂性
B. 规范性
C. 集权性
D. 钝化性
E. 易变性
【多选题】
影响组织设计的主要因素有___
A. 环境
B. 战略
C. 技术
D. 规模
E. 生命周期
【多选题】
根据工作的多变性与可分析性两项推度标准,可以将技术划分为___
A. 常规型技术
B. 非常规型技术
C. 工艺型技术
D. 工程型技术
E. 服务型技术
【多选题】
维形式组织结构的特征包括___
A. 管理层级比较多
B. 管理幅度比较小
C. 层级之间关系比较紧密
D. 信息失真度比较低
E. 下属提升机会比较少
【单选题】
人力资源计划过程的第一个步骤是___
A. 招聘员工
B. 编制人力资源计划
C. 职前引导
D. 职业生涯法
推荐试题
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用