刷题
导入试题
【单选题】
___是市场营销组合因素中十分敏感而又难以控制的因素。
A. 产品
B. 价格
C. 渠道
D. 促销
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
成本导向定价法是一种主要以___为依据的定价方法。
A. 产品
B. 服务
C. 成本
D. 竞争
【单选题】
对质量不易鉴别的商品的定价最适宜采用___。
A. 声望定价
B. 尾数定价
C. 招徕定价
D. 差别定价
【单选题】
撇脂定价策略一般是用于___。
A. 有专利保护的产品
B. 无专利保护的产品
C. 处于成熟期的老产品
D. 替代品较多的老产品
【单选题】
分销渠道不包括___。
A. 商人中间商
B. 代理中间商
C. 消费者或用户
D. 供应商、辅助商
【单选题】
消费品中的便利品和产业用品中的供应品,通常采取___。
A. 密集分销
B. 选择分销
C. 多家分销
D. 直销
【单选题】
批发商最主要的类型是___。
A. 商人批发商
B. 经纪人
C. 代理商
D. 制造商销售办事处
【单选题】
促销工作的核心是___。
A. 沟通信息
B. 刺激欲望
C. 引发行为
D. 促成交易
【单选题】
对于需求比较集中,技术含量较高、销售批量较大的产品宜于采用___的策略。
A. 推式
B. 拉式
C. 销售促进
D. 公共关系
【单选题】
被称为“第五媒体”的是___。
A. 报刊
B. 电台
C. 电视台
D. 网络广告
【单选题】
需求,这样企业才能在竞争中制胜”。这句话体现的市场营销哲学是___
A. 产品观念
B. 社会营销观念
C. 推销观念
D. 市场营销观念
【单选题】
空调夏季热销、冬季滞销。这种需求属于___
A. 潜伏需求
B. 充分需求
C. 不规则需求
D. 过量需求
【单选题】
“奇智”汽车公司通过在俄罗斯成立全资子公司进军该国汽车市场。这种增长战略属于___
A. 市场渗透
B. 产品开发
C. 市场开发
D. 多元化发展
【单选题】
某面粉企业为了控制和拥有其分销系统,兼并了面粉经销商店。该种增长战略属于___
A. 业务一体化
B. 后向一体化
C. 前向一体化
D. 水平一体化
【单选题】
沂蒙公司的主营业务是家电生产,近年来公司将触角伸向餐饮、房地产、旅游等领域。这种多元化增长方式属于___
A. 集团多元化
B. 同心多元化
C. 水平多元化
D. 关联多元化
【单选题】
在现代市场经济条件下,市场营销管理的首要步骤是___
A. 寻找和评价市场机会
B. 细分市场和选择目标市场
C. 发展市场营销组合和决定市场营销预算
D. 执行和控制市场营销计划
【单选题】
某商场欲考察某种商品的两种价格水平和三种促销方式的促销效果,应采用的实验设计类型是___
A. 前后控制组分析法
B. 简单时间序列实验法
C. 阶乘设计法
D. 重复时间序列实验法
【单选题】
衡量消费者对汽车购买力最有效的收入指标是___
A. GDP
B. 可随意支配个人收入
C. 可支配个人收入
D. 个人收入
【单选题】
牌的所有产品都有不好的评价。这种心理因素是___
A. 动机
B. 态度
C. 知觉
D. 学习
【单选题】
为属于___
A. 习惯型购买行为
B. 变化型购买行为
C. 协调型购买行为
D. 复杂型购买行为
【单选题】
工商局为满足办公需要购买了一批沙发。从市场构成来说,这种需求属于___
A. 消费者市场
B. 中间商市场
C. 生产者市场
D. 政府市场
【单选题】
某技术人员协助决策者确定采购设备的规格、型号等。该技术人员在此购买决策中所扮演的角色是___
A. 采购者
B. 信息控制者
C. 使用者
D. 影响者
【单选题】
某公司产品目前市场占有率为25%,预计未来3年市场占有率将下降到23%,但仍比最大的竞争对手高5%。该公司应采取的市场竞争战略是___
A. 市场主导者战略
B. 市场挑战者战略
C. 市场跟随者战略
D. 市场补缺者战略
【单选题】
国内某手机制造商推出一款高度模仿某著名品牌热销机型手机,该企业所采取的跟随战略是___
A. 紧密跟随
B. 盲目跟随
C. 选择跟随
D. 距离跟随
【单选题】
某鞋厂专门生产学龄前儿童童鞋,该厂的市场细分依据是___
A. 地理细分
B. 人口细分
C. 心理细分
D. 行为细分
【单选题】
甲企业选择与乙企业相同的市场位置,利用差别不大的产品、价格等争夺同一个顾客群体。甲企业采用的定位策略属于___
A. 对峙定位
B. 避强定位
C. 重新定位
D. 混合定位
【单选题】
某公司洗发水品牌用“亮丝”、沐浴露品牌用“飘飘”,该公司采取的品牌统分策略是___
A. 统一品牌
B. 个别品牌
C. 主副品牌
D. 企业名称加个别品牌
【单选题】
能够节约设计和印刷成本,带动新产品销售的包装策略是___
A. 高档包装策略
B. 分等级包装策略
C. 附赠品包装策略
D. 相似包装策略
【单选题】
某新品牌洗衣粉采用“只选对的、不选贵的”广告语进行大规模高强度促销宣传。这种介绍期的营销策略是___
A. 快速撇脂策略
B. 快速渗透策略
C. 缓慢撇脂策略
D. 缓慢渗透策略
【单选题】
在新产品扩散过程中,告知他人有关新产品的信息,向购买者积极反馈信息的人被称为___
A. 建议者
B. 创新采用者
C. 意见领袖
D. 参照群体
【单选题】
购买某产品1000件以下,单价10元;购买1000件以上,单价9元。这种折扣属于___
A. 现金折扣
B. 数量折扣
C. 功能折扣
D. 季节折扣
【单选题】
某品牌方便面全国统一售价1.99元/包,这种定价策略是___
A. 整数定价策略
B. 招徕定价策略
C. 尾数定价策略
D. 声望定价策略
【单选题】
为使广大消费者可以随时随地购买到饮料,饮料公司通常采用的分销策略是___
A. 密集分销
B. 选择分销
C. 独家分销
D. 混合分销
【单选题】
促销的本质是___
A. 促进购买
B. 刺激购买欲望
C. 宣传
D. 信息沟通
【单选题】
H公司参照主要竞争对手G公司的广告费支出,确定本公司广告预算为1000万元,这种确定广告预算的方法是___
A. 量力而行法
B. 销售百分比法
C. 竞争对等法
D. 目标任务法
【单选题】
一般而言,下列各项中费用最高的广告媒体是___
A. 报纸
B. 电视
C. 广播
D. 杂志
【单选题】
企业对市场营销目标、战略、行动方案以及预计损益表的确定和控制过程是___
A. 市场营销管理
B. 市场营销计划
C. 市场营销组合
D. 市场营销战略
【单选题】
某食品公司营销组织由一名营销经理负责,下设华北、东北和华东三个区域经理具体负责产品销售。这种营销组织类型是___
A. 职能型组织
B. 产品型组织
C. 市场型组织
D. 地理型组织
【单选题】
某企业A产品市场占有率15%,主要竞争对手的市场占有率分别为20%、12%,请从与最大竞争者对比角度看,该企业相对市场占有率是___
A. 30%
B. 60%
C. 75%
D. 125%
【单选题】
以与顾客建立长期合作关系为核心理念的营销新概念是___
A. 关系营销
B. 绿色营销
C. 公共关系
D. 相互市场营销
【单选题】
市场营销活动的核心是___
A. 销售
B. 购买
C. 交易
D. 交换
推荐试题
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用