刷题
导入试题
【单选题】
呼吸链中可被CO抑制的是
A. FAD
B. FMN
C. Fe-S
D. 细胞色素aa3
E. 细胞色素
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
ATP生成的产要方式是
A. 肌酸磷酸化
B. 糖的磷酸化
C. 氧化磷酸化
D. 底物水平磷酸化
E. 有机酸脱羧
【单选题】
下列哪种不是高能化合物
A. 琥珀酰辅酶A
B. ATP
C. 磷酸肌酸
D. 3-磷酸甘油醛
【单选题】
下列那种物质不能自由通过线粒体内膜
A. 天冬氨酸
B. NADH
C. 谷氨酸
D. a-磷酸甘油
E. 苹果酸
【单选题】
含有16%相对恒定量,且属于蛋白质特征性元素的是
A. C
B. N
C. H
D. O
E. S
【单选题】
蛋白质的氨基酸之间分子结构的不同在于其
A. Ca
B. Ca-H
C. Ca-COOH
D. Ca-R
E. Ca-NH2
【单选题】
在蛋白质分子结构中起决定作用的是:
A. 一级结构
B. 二级结构
C. 三级结构
D. 超二级结构
E. 四级结构
【单选题】
酸性氨基酸有几种:
A. 2
B. 3
C. 5
D. 10
E. 20
【单选题】
测得某生物样品的氣含量是5%,此样品约含策白质
A. 8.8%
B. 12.5%
C. 16.0%
D. 38.0%
E. 31.25%
【单选题】
碱性氨基酸有几种
A. 2
B. 3
C. 5
D. 10
E. 20
【单选题】
精氨酸与赖氨酸属于哪一类氨基酸:
A. 酸性
B. 碱性
C. 中性极性
D. 中性非极性
E. 芳香族
【单选题】
蛋白质变性不包括
A. 氢键断裂
B. 盐键断裂
C. 肽键断裂
D. 疏水键断裂
E. 二硫键断裂
【单选题】
氨基酸排列顺序属于蛋白质的几级结构:
A. 一
B. 二
C. 三
D. 四
E. 五
【单选题】
一般蛋白质空间结构分成几个层次:
A. 1
B. 2
C. 3
D. 4
E. 5
【单选题】
胰岛素分子A链、B链间主要连接键是:
A. 肽键
B. 二硫键
C. 磷酸酯键
D. 磷酸二酯键
E. 盐键
【单选题】
角蛋白分子中出现频率最高的二级结构是:
A. a-螺旋
B. β-折叠
C. π-螺旋
D. β-转角
E. 无规卷曲
【单选题】
维持蛋白质a-螺旋的化学键主要是:
A. 肽键
B. 二硫键
C. 盐键
D. 氢键
E. 疏水键
【单选题】
稳定蛋白质三级结构的化学键是:
A. 氢键
B. 盐键
C. 疏水键
D. 肽键
E. 范德华力
【单选题】
“分子病”首先是蛋白质什么基础层次结构的改变
A. 一级
B. 二级
C. 超二级
D. 三级
E. 四级
【单选题】
临床用75%的酒精消毒是使细菌蛋白质:
A. 变性
B. 变构
C. 沉淀
D. 电离
E. 溶解
【单选题】
Pb2+可使蛋白质
A. 变构
B. 变性
C. 变异
D. 等电点该变
E. 紫外吸收峰改变
【单选题】
蛋白质变性时除生物活性丧失外重要改变是:
A. 溶解度↓
B. 溶解度↑
C. 紫外吸收值↑
D. 紫外吸收值↓
E. 两性解离↑
【单选题】
镰刀型红细胞性贫血是哪种蛋白质结构的改变与异常:
A. 乳酸脱氢酶
B. 淀粉酶
C. 胰岛素
D. 肌红蛋白
E. 血红蛋白
【单选题】
以下哪种蛋白质是单纯蛋白质:
A. 血浆白蛋白
B. 脂蛋白
C. 核蛋白
D. 糖蛋白
E. 色蛋白
【单选题】
以下哪种蛋白质是结合蛋白质:
A. 谷蛋白
B. 白蛋白
C. 硬蛋白
D. 糖蛋白
E. 组蛋白
【单选题】
蛋白质多肽链具有的方向性是:
A. C端→N端
B. 3‘端一5’端
C. N端一C端
D. 5'端一3'端
E. 还原端一非还原端
【单选题】
一个结点可以有多个双亲,结点之间可以有多种联系的模型是( )。(本题1分)
A. )网状模型
B. )关系模型
C. )层次模型
D. )以上都有
【单选题】
对于“关系”的描述,正确的是( )。(本题1分)
A. )同一个关系中允许有完全相同的元组
B. )同一个关系中元组必须按关键字升序存放
C. )在一个关系中必须将关键字作为该关系的第一个属性
D. )同一个关系中不能出现相同的属性名
【单选题】
在关系数据库中,表(table)是三级模式结构中的( )。(本题1分)
A. )外模式
B. )模式
C. )存储模式
D. )内模式
【单选题】
DBMS是( )。(本题1分)
A. )OS的一部分
B. )OS支持下的系统文件
C. )一种编译程序
D. )以上混合
【单选题】
数据库系统的核心是( )。(本题1分)
A. )数据模型
B. )数据库管理系统
C. )软件工具
D. )数据库
【单选题】
E-R图的三要素是( )。(本题1分)
A. )实体、属性、实体集
B. )实体、键、联系
C. )实体、属性、联系
D. )实体、域、候选键
【单选题】
反映现实世界中实体及实体间联系的信息模型是( )。(本题1分)
A. )关系模型
B. )层次模型
C. )网状模型
D. )E-R模型
【单选题】
数据库管理系统(DBMS)提供数据操作语言(DML)实现对数据库数据的操作,其中数据更新操作不包括( )。(本题1分)
A. )插入
B. )删除
C. )检索
D. )修改
【单选题】
以下不属于数据库系统组成的是( )。(本题1分)
A. )硬件系统
B. )数据库管理系统
C. )文件系统
D. )使用和管理数据库的各类人员
【单选题】
数据库管理系统(DBMS)是( )。(本题1分)
A. )数学软件
B. )应用软件
C. )计算机辅助设计
D. )系统软件
【单选题】
数据库三级模式体系结构的划分,有利于保持数据库的( )。(本题1分)
A. )数据独立性
B. )数据安全性
C. )结构规范化
D. )操作可行性
【单选题】
数据库系统三级模式结构中存在的映象关系正确的是( )。(本题1分)
A. )外模式/内模式
B. )外模式/模式
C. )外模式/外模式
D. )模式/模式
【单选题】
在关系数据库系统中,当关系的模式改变时,用户程序也可以不变。这是( )。(本题1分)
A. )数据的物理独立性
B. )数据的逻辑独立性
C. )数据的位置独立性
D. )数据的存储独立性
【单选题】
下列模式中,能够给出数据库物理存储结构与物理存取方法的是( )。(本题1分)
A. )内模式
B. )外模式
C. )概念模式
D. )逻辑模式
【单选题】
下列有关物理数据独立性的说法不正确的是( )。(本题1分)
A. )物理数据独立性由内模式与概念模式之间的映射实现。
B. )当数据库的内模式发生改变时,数据的逻辑结构改变。
C. )当数据库的内模式发生改变时,用户编写的应用程序可以不变。
D. )为保证应用程序能够正确执行,我们需要修改内模式与概念模式之间的映射。
推荐试题
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用