刷题
导入试题
【多选题】
项目不确定性分析包括___
A. 盈亏平衡分析
B. 敏感性分析
C. 决策树概率分析
D. 风险规避和控制措施
E. 项目效益评价
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCDE
解析
暂无解析
相关试题
【多选题】
以下哪能些属于房地产营销推广策略___
A. 新闻抄作
B. 折扣价格
C. 公关活动
D. 导购
E. 售后服务
【多选题】
推广渠道选择的考虑前提的主要因素有哪些?___
A. 货量及后期推售节点
B. 产品类型
C. 目标市场(主力、辐射)
D. 开盘时间
E. 平均费率参考
F. 渠道成本
G. 产品定价
【多选题】
区外围挡常用规格有哪些:___
A. 3米高
B. 4米高
C. 5米高
D. 6米高
【多选题】
关于三面户外大牌验收标准表述正确的是___
A. 验收广告公司与合作下单不一致时,只需核对广告公司联系人
B. 提交至少2个面的验收照片
C. 需要以当天报纸为参照进行拍照
D. 需要核对投放地点、尺寸、数量、亮灯情况是否与合作下单一致
E. 添加投放效果数据分析
F. 验收费用与合作下单不一致时以验收为准
【多选题】
以下哪些属于推广类氛围包装?___
A. 导视系统包装
B. 看楼通道包装
C. 样板房包装
D. 展厅及展点包装
【多选题】
常规项目工地围挡设置要求:___
A. 地块重点人流
B. 车流路侧
C. 设置3-5米喷画围挡(镀锌板)
D. 设置射灯
【多选题】
关于出街广告主标提炼原则说法正确的是?___
A. 根据客户关注度卖点排序
B. 根据项目配套/交通等利好及时放大输出
C. 结合政策变化及时调整;
D. 根据竞争对手输出内容调整
【多选题】
制定推广计划需考虑的因素有哪些?___
A. 推售的货量、产品类型
B. 项目辐射的客户市场
C. 开盘的时间
D. 销售费率
【多选题】
一个好的房地产项目案名,应该具备以下哪些要素?___
A. 对产品定位的暗示
B. 社区规模的传达
C. 对物业功能属性的传达
D. 对目标客户价值观的迎合
E. 要通俗上口,音节搭配和谐
F. 需要体现高档
【判断题】
入伙前营销部一房一验,必须携带推广户型图、合同附图、交付标准,检查交付房屋是否存在合同约定与实际不符的情况;房屋交付前营销部应组织不少于两次的一房一验,且第二次一房一验不得晚于交付前30天完成
A. 对
B. 错
【判断题】
客服专员/助理须负责签约台账,客户资料录入、统计整理,按时上报签约类报表
A. 对
B. 错
【判断题】
工程抵楼时,对方就抵楼款开具的发票可小于用于抵楼的工程款金额
A. 对
B. 错
【判断题】
大客户/包销房合作必须约定违约条款,即合同销售额10%作为违约金
A. 对
B. 错
【判断题】
项目公司换房的套数不得超过年度签约套数的5%
A. 对
B. 错
【判断题】
项目公司超过3户以上的集团退房,项目公司应对合同条款重新审查,研究策略
A. 对
B. 错
【判断题】
项目公司客服部参与营销物料的管理,主要负责采购申请、验收、出入库、保管等
A. 对
B. 错
【判断题】
客户在提交书面申请并填写《销售换房审批表》/《销售退房审批表》到项目公司客服部,经审批通过后方可更换
A. 对
B. 错
【判断题】
在更名时,如是带特别折扣的房源,如需按折扣价更名,申请必须报原折扣审批人同意
A. 对
B. 错
【判断题】
特殊销售政策(如工抵、大客户、员工购房)的更名,需经过项目公司负责人审批通过后方可执行
A. 对
B. 错
【判断题】
一次性或分期付款的客户,如无特殊情况,客服需在签约后7日内完成合同备案(客户提前签定延迟备案申请的除外)
A. 对
B. 错
【判断题】
纯自售签约前业主转名,该流程只需经过项目公司责任人审批后即可执行
A. 对
B. 错
【判断题】
一般情况下,银行按揭贷款客户,客户需在银行资料审核通过后5日内完成合同备案,并将备案信息及时通知相关银行
A. 对
B. 错
【判断题】
纯自售签约后退房,该流程需经品牌营销中心审批后方可执行
A. 对
B. 错
【判断题】
项目公司开盘前,客服需在后台系统建立推售房源房间并且录入经商业集团财务中心审批后的付款方式
A. 对
B. 错
【判断题】
项目公司的物业费用不属于营销包干费,但属于35%人力资源类。
A. 对
B. 错
【判断题】
项目公司如需引入三级销售代理团队,必须开通并使用明源云客系统(或奥园集团全民经纪人系统)及盘客模块进行报备。
A. 对
B. 错
【判断题】
全民经纪人推介的佣金奖励的一般标准是:洋房税前千分之六;别墅、商铺、公寓是税前百分之一。
A. 对
B. 错
【判断题】
项目公司营销费用合同会审金额小于30万元的流程终审人是项目负责人。
A. 对
B. 错
【判断题】
在各下属公司的品牌舆情管理工作小组中,下属公司营销部负责人即舆情管理的第一责任人。
A. 对
B. 错
【判断题】
所有负面舆情都应根据其引起各界的关注程度以及其对企业造成的损失程度,分为一级、二级、三级、四级、五级5个级别。
A. 对
B. 错
【判断题】
劳资纠纷相关舆情属于施工及工程质量类舆情,所涉及的相关部门有集团运营计划中心以及各下属公司项目部/工程部。
A. 对
B. 错
【判断题】
商业地产集团总部事项,以及涉及全国性媒体事项,主要处理部门为下属公司品牌舆情管理组。
A. 对
B. 错
【判断题】
遇到媒体直接来项目现场进行拍摄,现场工作人员或接待人员均应先礼貌地请对方出示证件,告知来访单位、联系方式等。
A. 对
B. 错
【判断题】
出现舆情预警事项后,应“第一时间响应、第一时间处理”。
A. 对
B. 错
【判断题】
对于媒体的无预约采访,都应第一时间想尽办法阻挠。
A. 对
B. 错
【判断题】
下属公司交楼前,需提前安排相关人员潜入业主群,知悉业主动向以及实时跟进负面潜在舆情。
A. 对
B. 错
【判断题】
负面舆情处理完结后,各下属公司需对舆情处理全过程进行总结、效果评估并归档上报。
A. 对
B. 错
【判断题】
各下属公司须建立自己区域/项目的当地媒体资源库,并定期更新和维护,且有明细分类和联系人详细资料。
A. 对
B. 错
【判断题】
各下属公司应设立舆情监控的管理人员(兼职的或者专职),每日监测网络舆情,每月进行总结,并对有风险的进行评估与跟进。
A. 对
B. 错
【判断题】
各下属公司的媒体预约采访,都须提前报备品牌营销管理中心审批通过后方可进行。
A. 对
B. 错
推荐试题
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用