【单选题】
中国梦的最大特点,就是___。P198
A. 把中国和世界作为一个命运共同体
B. 把国家、民族和个人作为一个命运共同体
C. 把中华民族的昨天、今天和明天作为一个命运共同体
D. 把中国的目标和实现途径作为一个命运共同体
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
党的十九大报告明确指出,从2020年到本世纪中叶可以分两个阶段来安排。第一个阶段的奋斗目标是__。P203
A. 实现共同富裕
B. 全面实现社会主义现代化
C. 基本实现社会主义现代化
D. 实现国家治理体系和治理能力现代化
【单选题】
党在新时代的强军目标中,对人民军队的建设要求,不包括___。P269
A. 军备先进
B. 听党指挥
C. 能打胜仗
D. 作风优良
【单选题】
___是人民军队建军之本、强军之魂。P269
A. 作风优良
B. 战斗力
C. 党对军队绝对领导
D. 军民融合
【单选题】
中国外交政策的宗旨是___。P286
A. 独立自主
B. 维护世界和平,促进共同发展
C. 反对霸权主义和强权政治
D. 加强和巩固同广大发展中国家的团结与合作
【单选题】
中国政府倡议,共建“一带一路”恪守联合国宪章的宗旨和原则。“一带一路”秉持的原则是___。P294
A. 和平合作、开放包容
B. 共商、共建、共享
C. 共建 、共享、共治
D. 互学互鉴、互利共赢
【单选题】
中国政府倡议,共建“一带一路”恪守联合国宪章的宗旨和原则。“一带一路”秉持的理念是___。P294
A. 共商、共建、共享
B. 不冲突、不对抗、合作共赢
C. 共建 、共享、共治
D. 和平合作、开放包容、互学互鉴、互利共赢
【单选题】
___思想继承和发展了新中国不同时期重大外交思想和主张,反映了全人类共同的价值追求,多次写入联合国文件,对中国、世界的繁荣和进步都具有重大的意义和深远的影响。P292
A. 一带一路
B. 新型全球化方案
C. 人类命运共同体
D. 世界经济复苏方案
【单选题】
要实现中华民族伟大复兴的中国梦,必须深入推进___新的伟大工程。P302
A. 建成小康社会
B. 依法治国
C. 党的建设
D. 深化改革
【单选题】
__是改革开放以来党的全部理论和实践的主题,是党和人民历尽千辛万苦、付出巨大代价取得的根本成就。P302
A. 实事求是
B. 马克思列宁主义
C. 中国特色社会主义
D. 党的建设
【单选题】
以下关于坚持党的领导的论述中,错误的是___。P303-305
A. 党是最高政治领导力量,是推进伟大事业的根本保证
B. 坚持党的领导,并不是说要坚持党对一切工作的领导,但需保证党在关键领域、关键问题上把握好方向
C. 坚持党的领导,是对党领导革命、建设和改革历史经验的深刻总结
D. 坚持党的领导,必须着力加强党的建设
【判断题】
力的三要素中任何一个因素发生了改变,力的作用效果都会随之改变。
【判断题】
刚体平衡的必要与充分条件是作用于刚体上两个力大小相等,方向相反。
【判断题】
力可以在物体上任意移动而作用效果不变。
【判断题】
材料相同,截面不同的杆件,在相同的外力作用下,截面大的应力大。
【判断题】
材料不同,截面相同的杆件,在相同的外力作用下,变形相同。
【判断题】
抗拉压刚度越大,杆的抵抗拉压变形的能力越小。
【判断题】
材料的弹性模量越大,压杆的稳定性越大。
【判断题】
压杆的杆端约束程度越强,其稳定性越差.
【判断题】
为提高压杆的稳定性,应采用高强度材料。
【判断题】
为提高压杆的稳定性,压杆的截面形状采用实心圆比空心圆环好。
【判断题】
面积相同的空心轴和实心轴相比,空心轴的抗扭能力大。
【判断题】
当梁发生平面弯曲变形时,梁的轴线仍然在纵向对称平面内。
【判断题】
弯矩图叠加就是把几个简单的弯矩图形拼合起来。
【判断题】
梁的正应力在横截面上是中性轴上正应力为最大值。
【判断题】
抗弯截面模量越大,则梁的抗弯曲能为越小。
【判断题】
当其它条件和截面面积相等时,矩形梁比正方形梁的承载能力高。
【判断题】
惯性矩只可能大于或等于零,不可能出现负值。
【判断题】
在任意力系中加上一个平衡力系,不影响原力系对刚体的作用效果。
推荐试题
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa