【单选题】
“和平统一,一国两制”构想创造性地把和平共处原则用于解决一个国家的统一问题。___
A. 错误。“和平统一,一国两制”构想创造性地把独立自主原则用于解决一个国家的统一问题。
B. 正确。和平共处原则是处理国际关系必须遵循的普遍准则,“和平统一,一国两制”构想将这一准则的精神应用于解决一个国家内部不同社会制度的地区之间的关系,以解决国家的和平统一问题。
C. 错误。古往今来的国家统一,都是以武力统一。和平共处原则不可能应用于解决一个国家的和平统一问题。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
恐怖主义是威胁当今世界与稳定的主要根源。 ___
A. 正确。恐怖主义严重威胁着世界的和平与稳定,是国际社会的一大公害。
B. 错误。恐怖主义不是冷战时期威胁世界和平与稳定的主要根源,冷战结束后恐怖主义才是威胁世界和平与稳定的主要根源。
C. 错误。恐怖主义严重威胁着世界的和平与稳定,但恐怖主义并不是威胁世界和平与稳定的主要根源,霸权主义和强权政治是当今威胁世界和平与稳定的主要根源。
【单选题】
多极化是世界和平与发展的重要基础___
A. 正确。多极化格局使世界各种力量形成既相互借重又相互制衡的关系,有利于遏制霸权主义和强权政治,有利于推动建立公正合理的国际政治经济新秩序。
B. 错误。多极化格局使世界各种政治力量间关系更为复杂,利益格局更加多样化,容易导致地区冲突的产生,因此多极化不利于世界和平。
C. 错误。 多极化格局不利于建立公正合理的国际政治经济新秩序,不利于广大发展中国家发展自己。因此,多极化格局是和平与发展的大碍。
【单选题】
搞好与世界大国的国际关系是我国外交工作的立足点。___
A. 正确。世界大国在世界舞台上发挥重要作用,因此我国应着重处理好与世界大国的外交关系。
B. 错误。加强与广大发展中国家的团结与合作是我国外交工作的立足点。
C. 错误。不管是发达国家,还是发展中国家,都是我国外交工作的立足点。
【单选题】
香港和澳门被外国势力侵占后实行殖民统治,沦为外国的殖民地。___
A. 正确。因为香港、澳门分别是被英国和葡萄牙侵占后沦为殖民地的。
B. 正确。因为香港是被英国殖民主义者强迫清政府签订不平等条约而强占的,沦为英国的殖民地;澳门是被葡萄牙殖民主义者通过胁迫清政府签订不平等条约逐步强占的,沦为葡萄牙的殖民地。
C. 错误。因为香港、澳门自古以来就是中国领土的一部分,它们作为中国领土的固有地位是确定无疑的。英国和葡萄牙通过战争手段取得他国领土是非法的。1972年联合国大会承认香港和澳门都不是殖民地。所以,尽管香港和澳门在历史上被外国侵略势力侵占后实行的是殖民统治,但两者都不是通常意义上的殖民地。
【单选题】
哲学的基本问题是___
A. 社会和自然的关系问题
B. 思维与存在的关系问题
C. 政治和经济的关系问题
D. 实践和理论的关系问题
【单选题】
下列观点属于主观唯心主义的是___
A. 心外无物,心外无理
B. 理在气中,理随事变
C. 富贵在天,死生由命
D. 理在事先,事随理变
【单选题】
时间和空间___
A. 同物质运动无关
B. 是一种先验的形式
C. 是运动着的物质本身
D. 是运动着的物质的存在方式
【单选题】
清政府正式废除科举考试是在___年
A. 1898
B. 1900
C. 1906
D. 1908
【单选题】
广义上理解,情报可以认为是经过特定传递、具有特定效用的___。
【单选题】
___是情报最主要的本质属性。
A. 效用性
B. 知识性
C. 传递性
D. 保密性
【单选题】
经过搜集、分析、整理、储存、检索、传递、研究、利用等诸多过程后,最根本的目的就是实现情报的___。
A. 知识性
B. 传递性
C. 效用性
D. 实践性
【单选题】
___是指对解决全局或某一特定领域中一些带有方向性、政策性、总体性的问题所需要的情报。
A. 战争性情报
B. 战略性情报
C. 战役性情报
D. 战术性情报
【单选题】
公安情报工作的根本目的是___。
A. 保卫国家安全和社会稳定
B. 促进社会经济发展
C. 深化改革开放
D. 促进对外关系
【单选题】
以下哪个选项不属于公安情报的特征?___
A. 运动性
B. 准确性
C. 开放性
D. 保密性
【单选题】
公安情报工作中的___,是指对有关的情况进行量和质的考察和分析的活动。
A. 搜集整理
B. 调查研究
C. 分析研判
D. 评估反馈
【单选题】
___是指那些在一定范围内公开予以共享的情报来源,主要来自公安机关内部和政府其他部门的灰色文件。
A. 公开情报源
B. 半公开情报源
C. 秘密情报源
D. 非公开情报源
【单选题】
下列不属于情报收集策略中特殊方法的是:___。
A. 秘密力量
B. 技术侦查
C. 情报检索
D. 技术取证
【单选题】
下列不属于情报识别基本方法的是___。
A. 比较法则
B. 推理法则
C. 认识法则
D. 实验识别
【单选题】
下列不属于情报编写要求的是:___。
A. 完整性
B. 准确性
C. 及时性
D. 简洁性
【单选题】
___主要包含战役秘密力量情况、重要专案、重要专项任务等。
【单选题】
( )方法比较灵活、直接,特别是采取秘密方法获取情报时,往往运用此方法来传递。
A. 人力传递
B. 通信传递
C. 计算机网络传递
D. 信号传递
【单选题】
下列不属于情报存储功能的是:___。
A. 便于查找使用
B. 便于资料积累
C. 便于重复利用
D. 便于及时获得
【单选题】
___是情报部门在敌易于藏身落脚和进行活动的地方建立起来的,用于发现敌对分子和敌对势力及其破坏活动的秘密力量。
A. 境内秘密力量
B. 专案秘密力量
C. 阵地控制秘密力量
D. 调查秘密力量
【单选题】
___主要用于我国沿边沿海地区的敌社情动态调查和重点对象的控制调查。
A. 国内调查秘密力量
B. 专案秘密力量
C. 阵地控制秘密力量
D. 境外调查秘密力量
【单选题】
小世界原理中所表述的两个互不相识的人之间的间隔最多不超过___个人?
【单选题】
下列___是决定重大行动所必需的公安刑事情报,是制定刑事案件战略和战术决策的依据。
A. 资料型情报
B. 线索型情报
C. 预测型情报
D. 样品类情报
【单选题】
___是指侦查人员以查明案件事实、搜集证据、揭露和证实犯罪为目的,运用公开和秘密的方法,就与案件有关的人、事、物向有关人员和知情群众进行询问的一项专门活动。
A. 巡查巡视法
B. 公开查缉法
C. 调查询问法
D. 刑事讯问法
【多选题】
情报的基本属性有___。
A. 知识性
B. 传递性
C. 效用性
D. 实践性
【多选题】
情报按不同的专业可划分为___。
A. 科学技术情报
B. 政治军事情报
C. 社会科学情报
D. 经济情报
【多选题】
按情报工作人员对情报的不同加工程度可以将情报划分为___。
A. 一次情报
B. 二次情报
C. 三次情报
D. 四次情报
【多选题】
按情报侦获手段不同可将情报划分为___。
A. 公开情报
B. 人力侦查情报
C. 秘密情报
D. 技术侦查情报
【多选题】
公安情报的特征包括:___。
A. 准确性
B. 开放性
C. 随机性
D. 关联性
【多选题】
当前公安情报工作概念的内涵主要表现在以下几个方面___。
A. 公安情报工作内容的社会化、综合化
B. 公安情报搜集手段的多样化
C. 公安情报管理的系统化
D. 公安情报工作功能的多元化
【多选题】
按公安情报的内容以及所起的作用,可以分为___。
A. 线索型情报
B. 公开情报
C. 战略型情报
D. 战术型情报
【多选题】
下列属于公开情报源的有___。
A. 互联网
B. 公共媒体
C. 出版物
D. 新闻发布会
【多选题】
下列属于公安情报工作重点“四团”的是___。
A. 国际恐怖集团
B. 贩枪集团
C. 偷渡集团
D. 民族分裂集团
【多选题】
下列属于公安情报工作重点“四组织”的是___。
A. 国际恐怖组织
B. 贩毒组织
C. 黑社会组织
D. 民族分裂组织
【多选题】
下列选项中哪些属于八大方言___。
A. 官话方言
B. 客语
C. 湘语
D. 川语
【多选题】
下列哪些选项属于北京官话的特点___。
A. 多带儿化音
B. 叠词词尾变轻音,如:哥哥、姐姐
C. 多使用象声词,如:叮咣、咔嚓
D. 有九个音调
推荐试题
【单选题】
A VM folder contains VM1 and VM2. Group A has permission to power on virtual machines, defined on the VM folder and its children. Group B has permission to power off virtual machines, defined on the VM folder and its children. If a user is a member of Groups A and B, what will be the user’s effective permission on VM1 and VM2?___
A. Power on
B. Power off.
C. Power on and Power off.
D. Reset.
【单选题】
Group 1 is granted console interaction on a VM folder. User 1 is granted no console interaction on the same VM folder. What will be the outcome if User 1 tries to access the console of a virtual machine?___
A. User 1 will not be able to access the virtual machines in the VM folder.
B. User 1 will not have access to the virtual machine console.
C. User 1 will have access to the virtual machine console.
D. User 1 will have console access only via the vSphere Web Client.
【单选题】
Which statement is true regarding the use of VMFS3 datastores with vSphere 6.5?___
A. VMFS3 datastores can be used but not created.
B. VMFS3 datastores can be neither used nor created.
C. VMFS3 datastores will be present but unmounted.
D. VMFS3 datastores can be created and used.
【单选题】
In the Exhibit, each VM has a 1GHz non-expandable reservation. If all VMs are powered on in sequence, what would be the outcome?___
A. VM4 cannot be powered on.
B. VM5 cannot be powered on.
C. VM6 cannot be powered on.
D. VM3 cannot be powered on.
【单选题】
vSphere 6.5 introduced MAClearning capabilities for VMware’s virtual switches. What three benefits will it provide? (Choose three.)___
A. Reduced memory consumption.
B. Reduced consumption of extra CPU cycles.
C. Increased network throughput.
D. Prevent packet flooding inside the vSwitch.
【单选题】
What is the default pathing policy for most active-active arrays?___
A. Fixed
B. Most Recently Used
C. Dynamic
D. isk Morroring
【单选题】
Which command will show the iSCSI sessions on a ESXi 6.5 host?___
A. esxcli storage iscsi session get
B. esxcli iscsi session get
C. esxcli storage iscsi session
D. esxcli iscsi session list
【单选题】
Which of the following is not a parameter for traffic filtering or marking?___
A. virtual port ID
B. Protocol
C. Traffic Direction
D. DSCP value
E. Traffic redirection
【单选题】
A vSphere administrator wants to enable a virtual machine with Secure Boot, but in VM setting, Secure Boot option was not found under Boot Options. What could be the cause?___
A. The virtual hardware is not compatible.
B. The virtual machine has missing drivers.
C. The virtual machine OS does not support secure boot.
D. VMware Tools is not upgraded.
【单选题】
A virtual machine is connected on a distributed port group where the average bandwidth configured in the traffic shaping policy is 100 Mbps. The VM network adapter is configured with a reservation of 200 Mbps. What is the VM’s effective bandwidth?___
A. 200 Mbps
B. 100 Mbps
C. 150 Mbps
D. 400 Mbps
【多选题】
What are two reasons why a datastore in a Storage DRS cluster cannot enter maintenance mode?(Choose two.)___
A. Storage latency is too high to allow Storage DRS initiate Storage vMotion.
B. Storage DRS is configured for a VMFS3 datastore.
C. Storage
D. RS is disabled on the virtual disk.
【多选题】
What two methods are used to configure VMware vSphere Storage I/O Control shares and limits? (Choose two.)___
A. Assign shares and limits to VM virtual disks.
B. Assign shares and limits to datastores.
C. Assign shares and limits to Storage (DRS) clusters.
D. Assign shares and limits using VM storage policies.
【多选题】
ESXi 6.5 introduces VMFS6, which supports both 512e and 512n devices. What three configurations are supported when using these devices? (Choose three.) ___
A. Hosts with both 512e and 512n devices.
B. Storage vMotion between both 512e and 512n devices.
C. Datastore Extents spanned between both 512e and 512n devices.
D. Storage DRS clusters containing only both 512e and 512n devices.
【多选题】
A vSphere Administrator observes that the Primary VM configured with Fault Tolerance is executing slowly. After further investigation, it is determined that the Secondary VM is on an overcommitted ESXi host. What two methods will correct the problem? (Choose two.)___
A. Use Storage vMotion to migrate the Secondary VM to another datastore.
B. Use vMotion to migrate the Secondary VM to a different ESXi host.
C. Configure a CPU limit on the Primary VM which will also apply to the Secondary VM.
D. Turn off and turn on FT in order to recreate the Secondary VM on a different datastore.
【多选题】
Which two features require the use of Host Profiles? (Choose two.)___
A. Host Customizations
B. shared storage
C. Auto
D. eploy
【多选题】
What three processes on the vCenter Server Appliance (VCSA) does“vmware-watchdog monitor? (Choose three.) ___
A. vmware-eam
B. vmcad
C. vmware-vpostgres
D. vpxd
E. vsan-health
【多选题】
What three processes on the vCenter Server Appliance (VCSA) does“vmware-watchdog monitor? (Choose three.) ___
A. vmware-eam
B. vmcad
C. vmware-vpostgres
D. vpxd
E. vsan-health
【多选题】
Which two statements correctly describe VM-Host affinity rules? (Choose two.) ___
A. When there is more than one VM-Host affinity rule in a vSphere DRS cluster, the rules are applied equally.
B. After creating a VM-Host affinity rule, its ability to function in relation to other rules is predetermined.
C. When there is more than one VM-Host affinity rule in a vSphere
D. RS cluster, the rules will be ranked.
【多选题】
An administrator wants to enable proactive HA by moving virtual machines automatically if a hardware alert is triggered. What are the three required settings? (Choose three.)___
A. Set vSphere DRS Automation to Partially Automated.
B. Turn on Proactive HA.
C. Set the Proactive HA Automation Level to Manual.
D. Set the Proactive HA Automation Level to Automated.
E. Turn on vSphere HA and vSphere DRS.
【多选题】
If vCenter Server 5.5 installation has one or more services deployed remotely, which three services are relocated to vCenter Server 6.5 on upgrade? (Choose three.)___
A. vCenter Inventory Services
B. vSphere Authentication Proxy
C. vSphere Web Client
D. vSphere
E. SXi Dump Collector
【多选题】
What two debugging levels can a virtual machine be configured to? (Choose two.)___
A. Verbose
B. Debugging
C. Statistics
D. Trivia
【多选题】
What are three benefits of using a few large-capacity LUNs instead of many small-capacity LUNs? (Choose three.) ___
A. Better performance because there is less contention for a single volume.
B. More flexibility for resizing virtual disks.
C. Less wasted storage space.
D. More flexibility to create virtual machines without adding new LUNs.
E. Fewer VMFS datastores to manage.
【多选题】
Which two configurable options are available in Boot Options for a virtual machine? (Choose two.)___
A. Tools Upgrades
B. Encryption
C. Firmware
D. Force BIOS setup
【多选题】
Which three VMware-recommended best practices should an administrator follow before upgrading to vSphere 6.5? (Choose three.)___
A. Disconnect ESXi host from vCenter.
B. VMware Tools are installed in the virtual machine.
C. Ensure that the system hardware complies with ESXi requirements.
D. Back up the host.
E. Check the interoperability of any other software integrated with vSphere.
【多选题】
What are two requirements to enable EVC in vSphere DRS cluster? (Choose two.)___
A. CPUs must be from the same vendor.
B. EVC must use the lowest possible baseline supported by the hardware.
C. CPUs must be in the same family and of the same speed.
D. No VMs may be running in the cluster.
【多选题】
What three conditions could result in VMware Flash Read Cache being unable to claim a disk? (Choose three.)___
A. The disk is not listed in the VMware hardware compatibility guide.
B. The disk is not detected as an SSD.
C. The disk is not detected as local.
D. The disk is in use by VMFs.
【多选题】
Boot from SAN is supported on which three storage technologies? (Choose three.)___
A. VMware vSAN
B. FCoE
C. NFS 4.1
D. iSCSI
E. FC
【多选题】
Which two components are part of storage I/O multipathing on ESXi? (Choose two.)___
A. SATP
B. VASA
C. PSP
D. VAAI
【多选题】
Which two statements are true about Highly Available vSphere Auto Deploy infrastructure? (Choose two.)___
A. It helps prevent data loss.
B. It is a prerequisite for using vSphere Auto Deploy with stateful install.
C. It requires two or more Auto
D. eploy servers.
【多选题】
The virtual machine log rotation size can be changed for all VMs by which two interfaces? (Choose two.)___
A. PowerCLI
B. vSphere Web Client
C. ESXi host client
D. esxcli
【多选题】
Which two configuration options can exclude virtual disks from snapshot operations? (Choose two.)___
A. Use RDM in virtual mode for virtual disk.
B. Use virtual disks in Independent – Persistent mode.
C. Use a virtual disk larger than 2 TB in size.
D. Use RDM in physical mode for virtual disk.
【多选题】
Which two storage configurations on the source server are unsupported with VMware Converter? (Choose two.)___
A. Linux LVM
B. software RAID
C. GPT/MBR hybrid disks
D. Windows basic volumes
E. Windows dynamic volumes
【多选题】
Which two statements about vCenter HA are correct? (Choose two.)___
A. ESXi 5.5 or later is required.
B. vCenter HA network latency between nodes must be less than 50 ms.
C. NFS datastore is supported.
D. It must be deployed on a 3
E. SXi host cluster with DRS enabled.
【多选题】
An attempt to delete NFS datastore from a ESXi host returns the error: Sysinfo error on operation returned the following status:< Busy> Which two statements could explain this failure? (Choose two.)___
A. NFS datastore is a part of Storage DRS Cluster.
B. NFS.VolumeRemountFrequency value is set to 30.
C. Storage I/O Control is enabled on NFS datastore.
D. NFS datastore has running or registered virtual machines.
【多选题】
An administrator finds that the Microsoft Exchange virtual machines are exhibiting network latency. What two in-guest changes can help decrease latency? (Choose two.)___
A. LRO
B. TSO
C. SR-IOV
D. PVRDMA
【多选题】
Which two types of iSCSI adapters require VMkernel networking configuration? (Choose two.)___
A. dependent hardware
B. in-guest
C. software
D. independent hardware
【多选题】
Which two statements are true for NFS v4.1 firewall behavior? (Choose two.)___
A. It closes port 2049.
B. It sets allowed. All flag to TRUE.
C. It sets allowed. All flag to FALSE.
D. It opens port 2049.
【多选题】
A vSphere Administrator attempts to enable Fault Tolerance for a virtual machine but receives the following error: Secondary VM could not be powered on as there are no compatible hosts that can accommodate it. What two options could cause this error? (Choose two.)___
A. The other ESXi host(s) are in Maintenance Mode.
B. Hardware virtualization is not enabled on the other ESXi host(s).
C. The other ESXi host(s) are in Quarantine Mode.
D. Hardware MMU is enabled on the other
E. SXi host(s).
【多选题】
Storage capabilities be populated in what two ways? (Choose two.)___
A. The administrator can use tags to describe capabilities.
B. Default capabilities are provided by vCenter Server.
C. Datastores can advertise their capabilities through VAAI.
D. Datastores can advertise their capabilities through VASA.
【多选题】
In network troubleshooting it is important to know what upstream switch the ESXi host is connected to. Which two features does ESXi provide to help identify the upstream switch? (Choose two.)___
A. Promiscuous mode
B. DPM
C. LLDP
D. CDP