相关试题
【单选题】
党的思想路线的核心是___
A. 解放思想
B. 实是求是(传统说法)
C. 与时俱进
D. 求真务实(当前说法)
【单选题】
辩证法所要回答的是___
A. 世界的本原是什么的问题
B. 世界的状况是怎么样的问题
C. 世界是否可知性的问题
D. 世界的本质是什么的问题
【单选题】
唯物辩证法认为,主观辩证法是___
A. 头脑中自生的
B. 对客观辩证法的反映
C. “绝对观念”固有的
D. 从书本上学来的
【单选题】
唯物辩证法和形而上学分歧的焦点是___
A. 是否承认事物的内部结构性
B. 是否承认事物的量变
C. 是否承认事物发展的根本原因在于事物内在的矛盾性
D. 是否承认事物的相对静止
【单选题】
唯物辩证法的总特征是___
A. 矛盾的同一性和斗争性相结合的观点
B. 普遍联系和永恒发展的观点
C. 矛盾的对立面既统一又斗争的观点
D. 运动和静止辩证统一的观点
【单选题】
“在对现存事物的肯定的理解中同时包含着对现存事物的否定的理解,即对现存事物必然灭亡的理解。”这是一种___
A. 唯物辩证法的观点
B. 相对主义诡辩论的观点
C. 激变论的观点
D. 庸俗进化论的观点
【单选题】
我国汉朝的董仲舒说,“古之天下,亦今之天下;今之天下,亦古之天下”。这是___观点
A. 唯物论
B. 唯心论
C. 辩证法
D. 形而上学
【单选题】
唯物辩证法和形而上学根本对立的焦点在于是否承认___
A. 事物的普遍联系
B. 事物的运动、变化、发展
C. 事物发展的动力是内部矛盾
D. 经过量变过渡到质变
【单选题】
唯物辩证法所理解的联系是指___
A. 各种事物和现象之间没有确定的界限,一切都是“亦此亦彼”
B. 每一事物和现象都同其他事物和现象相区别
C. 相互区别的事物和现象彼此都是孤立的
D. 一切事物和现象都处于相互影响、相互作用和相互制约之中
【单选题】
在联系问题上,唯心主义者否认联系的___
A. 客观性
B. 主观性
C. 多样性
D. 必然性
【单选题】
唯物辩证法认为事物的联系构成运动和变化,而形而上学则___
A. 只承认联系,否认发展
B. 只承认发展,否认联系
C. 从否认联系到否认运动、变化和发展
D. 只承认运动,否认联系和发展
【单选题】
一切以条件为转移,这是___
A. 否认主观能动性的观点
B. 机械唯物论的观点
C. 唯物辩证法普遍联系的观点
D. 形而上学绝对主义的观点
【单选题】
唯物辩证法说的联系是有条件的,这种条件是___
A. 不可改变的
B. 可以改变的
C. 可以任人创造的
D. 完全与人无关的
【单选题】
“城门失火,殃及池鱼”说明___
A. 任何事物和现象都是彼此联系的
B. 任何事物和现象都是彼此孤立的
C. 任何事物和现象之间的联系是主观随意的
D. 事物之间是互不影响的
【单选题】
“任何一个事物都和物质世界的其他事物处于普遍联系之中”这是___
A. 唯心主义诡辩论的观点
B. 唯物辩证法的正确观点
C. 相对主义的观点
D. 形而上学的错误观点
【单选题】
“割下来的手就不再是人手”这句话体现了___
A. 形而上学片面的、孤立的观点
B. 辩证法普遍联系的观点
C. 唯心主义的观点
D. 诡辩论的观点
【单选题】
“是亦彼也,彼亦是也”,即只承认事物之间的联系,否认事物之间的区别。这是一种___
A. 形而上学观点
B. 相对主义观点
C. 唯心主义观点
D. 唯物主义观点
【单选题】
“只见树木,不见森林;只见局部,不见整体”这是___
A. 唯物辩证法观点
B. 唯心主义观点
C. 唯心辩证法观点
D. 形而上学观点
【单选题】
事物的联系和运动的关系是___
A. 先有联系、后有运动
B. 先有运动、后有联系
C. 运动构成联系
D. 联系构成运动
【单选题】
联系的客观性和普遍性原理的方法论意义在于___
A. 要求我们用联系的观点看世界
B. 它是认识事物本质的基础
C. 它是科学分门别类的客观依据
D. 它是正确区分不同事物的基础
【单选题】
系统论科学出现的意义在于它___
A. 高于唯物辩证法
B. 抛弃了唯物辩证法
C. 代替了唯物辩证法
D. 丰富了唯物辩证法
【单选题】
发展的实质是___
A. 事物的一般变化
B. 运动
C. 新事物的产生和旧事物的灭亡
D. 量变
【单选题】
唯物辩证法的实质和核心是___
A. 对立统一规律
B. 质量互变规律
C. 否定之否定规律
D. 世界的物质统一性原理
【单选题】
矛盾是反映___
A. 事物之间互相对立,互相排斥、互相否定关系的范畴
B. 对立面之间互相联系、互相转化关系的范畴
C. 事物内部或事物之间的对立和同一及其关系的基本哲学范畴
D. 主体和客体之间互相对立的范畴
【单选题】
矛盾范畴所包含的两种基本属性是___
A. 对抗性和非对抗性
B. 同一性和斗争性
C. 普遍性的特殊性
D. 平衡性和不平衡性
【单选题】
矛盾的同一性是指矛盾双方___
A. 绝对的一致
B. 完全的平衡
C. 无差别的统一
D. 矛盾双方相互联系、相互吸引的性质和趋势
【单选题】
矛盾的同一性和斗争性相互联系是指两者是___关系
A. 个别与一般
B. 现象与本质
C. 互为依存互为存在条件
D. 外部表现和内部表现
【单选题】
矛盾的斗争性是指矛盾着的对立面之间___
A. 相互离异、相互排斥的性质和趋势
B. 绝对的对立
C. 相互渗透和相互转化的性质和趋势
D. 相互依存
【单选题】
矛盾的转化是___
A. 向任何一个方向转化
B. 向自己的对立面转化
C. 向没有矛盾的方向转化
D. 向矛盾激化的方向转化
【单选题】
事物的性质主要是由___
A. 对抗性矛盾决定的
B. 矛盾的主要方面决定的
C. 主要矛盾和次要矛盾共同决定的
D. 矛盾的主要方面和次要方面共同决定的
【单选题】
事物发展的源泉是___
A. 事物的相对性
B. 事物的内在矛盾性
C. 事物的变化
D. 人的自觉能动性
【单选题】
在矛盾体系中,处于支配地位并对事物发展起决定性作用的矛盾是___
A. 普遍矛盾
B. 内部矛盾
C. 主要矛盾
D. 次要矛盾
【单选题】
矛盾普遍性和特殊性的关系是___的关系
A. 共性和个性
B. 主要和次要
C. 多数和少数
D. 决定与被决定
【单选题】
公孙龙的“白马非马”说之所以错误,在于它割裂了___
A. 主要矛盾和非主要矛盾的关系
B. 矛盾的同一性和斗争性的关系
C. 矛盾主要方面和次要方面的关系
D. 矛盾的普遍性和特殊性的关系
【单选题】
唯物辨证法认为,发展的实质是___
A. 事物数量的增加或减少
B. 事物的循环和重复
C. 新事物的产生和旧事物的灭亡
D. 物体的位置移动和场所的变更
【单选题】
新事物是指___的事物
A. 刚刚诞生的事物
B. 形式上的新发展
C. 比较弱小
D. 符合发展规律
【单选题】
区分新旧事物的标志在于,它___
A. 是不是在新时代产生的
B. 是不是具有新的特点
C. 是不是得到多数人的承认
D. 是不是符合事物发展规律
【单选题】
“沉舟侧畔千帆过,病树前头万木春。”诗句中包含的哲学原理是___
A. 矛盾是事物发展的动力
B. 事物是内容和形式的统一
C. 事物的变化是量变与质变的统一
D. 新事物代替旧事物是事物发展的总趋势
【单选题】
对立统一规律揭示了___
A. 事物发展的源泉和动力
B. 事物发展的形式和状态
C. 事物发展的方向和道路
D. 事物发展的全部内容
【单选题】
下列选项中,包含矛盾双方在一定条件下相互转化思想的是___
A. 祸兮福所倚,福兮祸所伏
B. 知彼知己,百战不殆
C. 城门失火,殃及池鱼
D. 月晕而风,础润而雨
推荐试题
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server