相关试题
【单选题】
“谬误在一定条件下可以转化为真理”这是( )
A. 形而上学的观点
B. 唯物主义的观点
C. 诡辩论的观点
D. 辩证物主义的观点
【单选题】
“绝对真理和相对真理的区分既是确定的又是不确定的”,这是( )
A. 诡辩论的观点
B. 实用主义的观点
C. 唯物辩证法的观点
D. 形而上学的观点
【单选题】
辩证唯物主义认识论认为真理的根本特征是( )
A. 主观的形式客观的内容
B. 客观的形式主观的内容
C. 主观同客观相符合的范畴
D. 绝对性和相对性的统一
【单选题】
实践作为检验认识真理性的标准,其主要依据是( )
A. 它具有客观实在性
B. 它具有直接现实性
C. 它具有形式的多样性
D. 它具有社会历史性
【单选题】
放在水中的筷子,看上去像是被折断了一样。对这一事实下列说法正确的是( )?
A. 亲眼所见的都是对客观真实的反映
B. 眼睛是最好的证人
C. 感性只是解决现象问题,理性才能解决本质问题
D. 这是一种用歪曲形式表现本质的现象
【单选题】
实践作为检验真理的标准,既是确定的又是不确定的,其不确定性是因为( )
A. 有些真理是根本无法通过实践来加以检验的
B. 任何实践检验都需要一定的逻辑证明作为其补充的手段
C. 作为检验真理标准的社会实践总要受历史条件的限制
D. 不同的人,不同的阶级各有其不同的实践标准
【单选题】
“马克思主义者承认,在绝对的总的宇宙发展过程中,各个具体过程的发展都是相对的,因而在绝对真理的长河中,人们对于在各个一定发展阶段上的具体过程的认识只是具有相对的真理性。无数相对真理之总和,就是绝对的真理。”这表明( )?
A. 人类认识是一个不断深化的过程,是从绝对真理走向相对真理的过程
B. 马克思主义者坚持真理问题上的绝对主义观点
C. 马克思主义者坚持真理问题上的相对主义观点
D. 任何真理性的认识都是由相对性真理向绝对性真理转化过程中的一个环节
【单选题】
直接经验和间接经验的关系是( )?
A. 认识内容和形式的关系
B. 感性认识和理性认识的关系
C. 认识中“源”和“流”的关系
D. 实践和理论的关系
【单选题】
以下论断属于唯心主义真理观的是( )
A. 有用即真理
B. 凡真理必有用
C. 有效的工具必以真理为依据
D. 真理能在实践中达到预期效果
【单选题】
现代科技日新月异,并取得了许多重大成果,这一切对马克思主义哲学的影响是( )?
A. 深化和拓展了马克思主义哲学宇宙观
B. 使马克思主义哲学越来越不适应时代的要求
C. 证明马克思主义哲学是绝对真理
D. 对马克思主义哲学基本原理作出了否证
【单选题】
下列各项中,正确表述客体含义的是( )?
A. 客体是主体创造出来的对象
B. 客体是外部自然界
C. 客体是主体实践和认识的对象
D. 客体就是客观存在的事物
【单选题】
“认识是主体对客体的能动反映”。这是一种( )?
A. 辩证唯物主义认识论观点
B. 机械唯物主义认识论观点
C. 主观唯心主义认识论观点
D. 客观唯心主义认识论观点
【单选题】
辩证法与形而上学在真理观上的对立在于是否承认( )?
A. 真理具有相对性
B. 真理具有客观性
C. 真理具有主观性
D. 真理具有绝对性
【单选题】
要正确实现理性认识到实践的飞跃,必须使理论为群众所掌握,化为群众的自觉行动。这是因为( )
A. 群众是人口中的大多数
B. 群众是社会实践的主体
C. 群众的意见都是正确的
D. 群众的行动都是合理的
【单选题】
下列选项中,属于理性认识不同于感性认识特点的是( )?
A. 直接性
B. 主观性
C. 摹写性
D. 抽象性
【单选题】
“对客观事物的反映即是真理”,这是( )?
A. 混淆了真理性认识与一般认识的错误观点
B. 辩证唯物主义的真理观
C. 一切唯物主义的真理观
D. 混淆了真理的相对性与绝对性的错误观点
【单选题】
真理的绝对性含义是指它的( )
A. 永恒性
B. 无条件性.无限性
C. 不变性
D. 终极性
【单选题】
一种理论是不是真理,根本之处在于看它( )
A. 是否与已有的理论相一致
B. 是否与客观实际相一致
C. 是否说得清楚明白
D. 是否被大多数人承认
【单选题】
十六世纪末,伽利略通过在比萨斜塔所做的自由落体实验,推翻了亚里士多德关于物体的降落速度与物体的重量成正比的说法。这件事说明( )?
A. 真理是对事物及其规律的正确反映
B. 真理是由相对真理走向绝对真理的过程
C. 实践是认识发展的动力
D. 实践是检验认识是否正确的唯一标准
【单选题】
“实践.认识.再实践.再认识,这种形式,循环往复以至无穷”体现的是( )?
A. 唯心主义辩证法
B. 唯物主义辩证法
C. 朴素唯物主义观点
D. 机械唯物主义观点
【单选题】
下列各项正确说明真理问题的是( )?
A. 真理是有价值的
B. 有用即真理
C. 真理是永恒的
D. 真理是万能的
【单选题】
真理与谬误之间的相互关系是( )?
A. 在任何情况下都是绝对对立的
B. 没有相互转化的可能性
C. 在一定条件下可以互相转化
D. 两者之间没有原则区别
【单选题】
实践的主体是( )?
A. 绝对精神
B. 具有思维能力.从事社会实践和认识活动的人
C. 所有人
D. 人的意识
【单选题】
下列活动中,属于最基本的实践活动的是 ( )?
A. 科学家进行化学实验
B. 医生给病人做手术
C. 法官审理案件
D. 农民播种小麦
【单选题】
真象与假象的区别在于( )?
A. 真象是客观的,假象是主观的
B. 真象是内在的,假象是外在的
C. 真象表现本质,假象不表现本质
D. 真象从正面直接地表现本质,假象从反面歪曲地表现本质
【单选题】
对于同一棵古树,植物学家考察的是它的生长习性,把古树顽强的生命力看作是美;木材商考虑的是它的木质和树围,把古树的实用价值看作是美;而画家则惊叹它奇特的外形,把古树的形态看作是美。上述对古树审美感受的差异表明( )?
A. 人的认识具有主观随意性
B. 认识对象是由主观意识创造的
C. 理性认识是感性认识的基础
D. 人的认识受主体因素的制约和影响
【单选题】
反映论是( )?
A. 唯心主义认识论的基本原则
B. 除庸俗唯物主义外一切唯物主义认识论的基本原则
C. 唯物主义和唯心主义认识论的共同原则
D. 辩证唯物主义认识论的特有原则
【单选题】
认识的最终目的和归宿是( )?
A. 获取真理性的认识
B. 为实践服务
C. 增长知识才干
D. 提高人的素质
【单选题】
据介绍,改革开放以来,大约有上千条的新词汇产生。比如外资企业.知识经济.电子邮件.信用卡.再就业.QQ等等。从哲学上看,这一事实说明( )?
A. 科学理论对实践具有指导作用
B. 意识是客观存在的反映
C. 意识是人脑的机能
D. 理性认识依赖于感性认识
【单选题】
整个认识过程的起点是实践基础上首先获得( )?
【单选题】
实践是检验真理的标准,“这个标准也是这样的‘不确定’,以便不至于使人的知识变成‘绝对’,同时它又是这样的确定,以便同唯心主义和不可知论的一切变种进行无情的斗争”这句话表明( )?
A. 实践标准是不确定的
B. 实践标准是绝对性与相对性的统一
C. 实践标准也不可靠
D. 实践不是检验真理的唯一标准
【单选题】
传统的植物学理论认为:水稻.小麦等自花授粉作物没有杂交优势。而我国科学院袁隆平等科学家在实践中观察的现象与此不符,于是大胆创新,反复试验,成功培育出三系杂交稻,使水稻的产量大幅提高。这表明( )?
A. 正确的理论对实践有重大指导意义
B. 理论必须在实践中得到检验和发展
C. 原来正确的理论随着时间的发展会逐渐丧失其合理性
D. 通过实践,总会发现以往认识中的错误
【单选题】
坚持真理的客观性,就是( )?
A. 在真理观上坚持了唯心主义
B. 在真理观上坚持了唯物主义
C. 在真理观上坚持了辩证法
D. 在真理观上陷入了形而上学
【单选题】
下列活动中,属于最基本的实践活动的是 ( )
A. 处理人际关系的伦理活动
B. 处理社会关系的实践活动
C. 物质生产实践活动
D. 科学实验活动
【单选题】
人们所从事的政治活动.社会改革.社会革命都属于( )?
A. 改造物质世界的生产实践
B. 处理社会关系的实践
C. 变革上层建筑的意识性活动
D. 科学实验
【单选题】
主体和客体的关系中最基本的是( )?
A. 实践关系
B. 认识关系
C. 价值关系
D. 审美关系
【单选题】
辩证唯物主义认识论的首要的.基本的观点是( )?
A. 矛盾的观点
B. 物质的观点
C. 实践的观点
D. 发展的观点
【单选题】
真理向谬误的转化,具体表现为( )?
A. 人类并不能检验认识的真理性
B. 真理与谬误这两个对立的方面都是以对方作为自己存在的前提
C. 真理和谬误是对立统一的,二者之间既贯穿着斗争性又具有统一性
D. 任何真理都有自己的适用范围,如果超出这个范围,真理就会变成谬误
【单选题】
社会存在是指( )?
A. 生产力各要素的总和
B. 生产关系各方面的总和
C. 生产力和生产关系的总和
D. 社会物质生活条件的总和
【单选题】
在社会发展中起决定作用的因素是( )?
A. 地理环境的优劣
B. 物质资料的生产方式
C. 社会风气的好坏
D. 人口增长的快慢
推荐试题
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default