相关试题
【多选题】
辛亥革命失败后资产阶级革命派继续进行了哪些革命活动 ___
A. 二次革命
B. 护国运动
C. 护法战争
D. 抗税斗争
【多选题】
袁世凯窃取政权,实行军阀专制统治,其主要表现在 ___
A. 扩充军阀军队,建立警察特务系统
B. 制造“宋案”
C. 废除《中华民国临时约法》
D. 复辟帝制
【多选题】
中华民国南京临时政府具有局限性,体现在 ___
A. 企图用承认列强与清政府签订的不平等条约和外债来换取帝国主义的承认
B. 没有提出可以满足农民土地要求的政策和措施
C. 以保护私有财产为借口,维护封建土地制度以及官僚、地主所占有的上地和财产
D. 没有提出鼓励发展资本主义经济的措施
【多选题】
以下对辛亥革命后成立的南京临时政府的表述,正确的是 ___
A. 是资产阶级共和国性质的革命政权
B. 是过渡时期的政权
C. 有其局限性
D. 政权实行维护封建土地制度的政策
【多选题】
三民主义中民族主义的基本含义是 ___
A. 反对帝国主义
B. 推翻实行民族歧视政策的清政府
C. 主张民族平等
D. 推翻投靠帝国主义的清政府
【多选题】
1904年至1905年,为争夺中国东北而在中国国土上进行战争的国家有 ___
【多选题】
1911年,决定在武昌举行起义的革命团体有 ___
A. 共进会
B. 岳王会
C. 文学社
D. 光复会
【多选题】
20世纪初宣传资产阶级民主革命思想的陈天华写下了 ___
A. 《猛回头》
B. 《革命军》
C. 《警世钟》
D. 《驳康有为论革命书》
【多选题】
武昌起义后,各省独立政权情况复杂,有 ___
A. 革命党人主动把权力让给立宪派和旧官僚、旧军官
B. 政权被立宪派和旧官僚、旧军官篡夺
C. 旧官僚和旧军官改头换面地维持着旧政权
D. 虽是革命党人掌权,但很快蜕变为新军阀、新官僚
【多选题】
辛亥革命失败后中国曾发生的复辟帝制的活动有 ___
A. 袁世凯复辟
B. 张勋复辟
C. 段祺瑞复辟
D. 黎元洪复辟
【多选题】
孙中山为了防止袁世凯专制而提出的条件有 ___
A. 奠都南京
B. 新总统到南京就职
C. 遵守临时约法
D. 清帝退位
【多选题】
“二次革命”起因是 ___
A. 反对袁世凯刺杀宋教仁
B. 反对“善后大借款”
C. 反对袁世凯称帝
D. 反对张勋复辟帝制
【多选题】
传播资产阶级民主革命思想的宣传家和代表作是___
A. 严复:《天演论》
B. 邹容:《革命军》
C. 陈天华:《猛回头》《警世钟 》
D. 章炳麟:《驳康有为论革命书》
【多选题】
20世纪初建立的资产阶级革命团体是___
A. 华兴会
B. 光复会
C. 科学补习所
D. 岳王会
【多选题】
反对北洋军阀统治的革命斗争有___
A. 武昌起义
B. 二次革命
C. 护法运动
D. 护国运动
【多选题】
辛亥革命失败的原因包括___
A. 没有彻底的反帝反封建纲领,不能建立坚强的革命政党
B. 不能充分发动和依靠群众
C. 民族资产阶级的软弱和妥协
D. 中外反动势力勾结,过于强大
【多选题】
辛亥革命的历史意义有___
A. 推翻了清政府的封建统治,结束了中国两千年的封建帝制
B. 给中国人带来了一次思想的解放
C. 打击了帝国主义侵略势力
D. 促使了社会经济、思想习惯和社会风俗等方面发生了积极变化
【多选题】
戊戌变法和辛亥革命共同的特点有___
A. 是爱国救亡的政治运动
B. 是资产阶级性质的政治运动
C. 未提出彻底的反帝反封建纲领
D. 促进了思想解放
【多选题】
1911年10月10日凌晨处决的辛亥三烈士是___
A. 彭楚藩
B. 刘公
C. 刘复基
D. 杨宏胜
【多选题】
府院之争主要是___和( B )之争。
A. 段祺瑞
B. 黎元洪
C. 张作霖
D. 冯国璋
【多选题】
与中国近代史上的太平天国农民起义和戊戌维新运动相比,虽然都是为了反帝反封,但辛亥革命有着本质的不同,表现在:___
A. 有一个完整的资产阶级革命纲领:三民主义
B. 有一个统一的资产阶级革命政党:同盟会
C. 有一个明确的资产阶级革命目标:中华民国
D. 充分地依赖和发动人民群众
【多选题】
袁世凯专制独裁的行径有___
A. 解散国民党
B. 解散国会
C. 制定颁布《中华民国约法》
D. 接受帝位
【多选题】
以下属于《中华民国临时约法》的内容有___
A. 中华民国主权在民;国内各民族平等
B. 国民有人身、居住、财产、言论、出版、集会、结社、宗教信仰自由
C. 有选举和被选举的权利
D. 参议院行使立法权,有弹劾总统的权力
【多选题】
孙中山辞去临时大总统前后对袁世凯提出的条件有___
A. 要赞成共和,遵守临时约法
B. 发展工商业
C. 反对外国侵略
D. 定都南京
【多选题】
辛亥革命失败的主要原因在于资产阶级革命派本身存在的许多弱点和错误,主要有___
A. 不能建立坚强的革命政党
B. 没有提出彻底的反帝反封建的革命纲领
C. 革命派没有先进思想武装
D. 不能充分发动和依靠人民群众
【多选题】
新文化运动前期的主要内容包括 ___
A. 提倡民主,反对专制
B. 提倡科学,反对愚昧和迷信
C. 提倡新道德,反对旧道德
D. 提倡新文学,反对旧文学
【多选题】
下列关于五四运动背景的叙述中,正确的是 ___
A. 随着中国资本主义发展,工人阶级队伍进一步壮大
B. 新文化运动推动了人民的思想解放
C. 北洋军阀政府的腐败统治和军阀混战,人民反抗情绪增强
D. 十月革命的胜利为中国人民指明了解放的道路
【多选题】
1919年五四运动中,爱国学生提出的口号有 ___
A. 外争国权,内除国贼
B. 取消“二十一条”,拒绝签订和约
C. 停止内战,一致对外
D. 还我青岛
【多选题】
五四运动中,出现了许多以往历史不具备的新因素,这些新因素是指 ___
A. 运动是在十月革命影响下发生的
B. 北洋军阀政府忙于军阀混战
C. 李大钊等先进知识分子起了领导作用
D. 中国工人阶级在运动中独立地走上政治舞台并起了重大作用
【多选题】
五四运动的直接结果有 ___
A. 释放被捕学生
B. 罢免曹、章、陆三个卖国贼职务
C. 未在“和约”上签字
D. 实现了反帝斗争目标
【多选题】
五四运动划时代的伟大意义是 ___
A. 五四运动是一次彻底的不妥协的反帝反封建的爱国运动
B. 五四运动是中国新民主主义革命的开端
C. 五四运动促进了马克思主义在中国的传播和与工人运动的结合
D. 五四运动从思想上和干部上为中国共产党的成立作了准备
【多选题】
1920年夏至1921年初,中国共产党早期组织在以下城市组建 ___
【多选题】
1920年8月,在上海组建的中国工人阶级政党组织成员是 ___
A. 李大钊
B. 李汉俊
C. 李达
D. 陈独秀
【多选题】
1919年9月,李大钊在《我的马克思主义观》这篇文章中系统地介绍了马克思的哪些学说和理论 ___
A. 唯物史观
B. 阶级斗争理论
C. 人权理论
D. 剩余价值学说
【多选题】
1920年10月,创立共产党北京支部的有 ___
A. 毛泽东
B. 陈独秀
C. 张国焘
D. 李大钊
【多选题】
列席中共一大的共产国际代表有 ___
A. 维经斯基
B. 马林
C. 尼柯尔斯基
D. 鲍罗廷
【多选题】
中共一大选出的中央局成员有 ___
A. 陈独秀
B. 李达
C. 李汉俊
D. 张国焘
【多选题】
中国共产党成立的伟大意义有 ___
A. 中国无产阶级有了自己的战斗司令部
B. 中国人民的革命事业有了坚强的领导核心
C. 中国革命有了明确的目标和方向
D. 中国革命的面貌从此焕然一新
【多选题】
中国共产党成立后,“中国革命的面貌焕然一新了”,其中“新”主要体现在___
A. 中国革命开始以马克思主义为指导
B. 中国革命开始了社会主义革命
C. 中国革命在无产阶级政党的领导下进行
D. 中国革命开始以社会主义、共产主义为远大目标
【多选题】
中共二大制定的党的纲领是 ___
A. 马克思主义和中国具体实际相结合的第一步
B. 党的最低纲领
C. 党的最高革命纲领
D. 实现了马克思主义和中国具体实际相结合的历史性飞跃
推荐试题
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first