【单选题】
在由一个面试官小组进行面试时,经验不足的普通面试官容易受地位高和经验丰富的面试官的评价影响而放弃自己原有的看法与评价,做出与其他人相似的评价,由此造成的面试工作中的认知偏差属于___
A. 首因效应
B. 晕轮效应
C. 诱导效应
D. 定势效应
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
公文筐测验首先要根据需要招聘的岗位,有针对性地进行设计,这体现了公文筐设计的___
A. 针对性原则
B. 系统性原则
C. 关键性原则
D. 标准化原则
【单选题】
一般而言,评估招聘工作的标准为___
A. 主观性、重复性和可靠性
B. 主观性、有效性、重复性
C. 重复性、有效性和客观性
D. 有效性、可靠性、客观性
【单选题】
在招聘评估中,录用人数与计划招聘人数之比称为___
A. 录用比
B. 选择率
C. 应聘比
D. 招聘计划完成比
【单选题】
(30963)道德具有独特的___。
A. 多层次性
B. 不稳定性
C. 社会性
D. 不平衡性
【单选题】
(30964)___是用内心信念、传统习惯和社会舆论来维护的。
【单选题】
(30965)___是中华民族最重要的传统美德之一。
【单选题】
(30966)诚实守信的认识和判断是___。
A. 诚实守信与经济发展相矛盾
B. 诚实守信是市场经济应有的法则
C. 是否诚实守信要视具体对象而定
D. 诚实守信应以追求利益最大化为准则
【单选题】
(30967)《公民道德建设实施纲要》于___正式颁布。
A. 2001年5月20日
B. 2001年8月20日
C. 2001年9月20日
D. 2001年10月20日
【单选题】
(30968)《公民道德建设实施纲要》提出,要充分发挥社会主义市场经济机制的积极作用,人们必须增强___。
A. 个人意识、协作意识、效率意识、物质利益观念、改革开放意识
B. 个人意识、竞争意识、公平意识、民主法制意识、开拓创新精神
C. 自立意识、竞争意识、效率意识、民主法制意识、开拓创新精神
D. 自立意识、协作意识、公平意识、物质利益观念、改革开放意识
【单选题】
(30969)爱岗敬业是指___。
A. 市场经济鼓励人才流动,再提倡爱岗敬业已不合时宜
B. 即便在市场经济时代,也要提倡“干一行、爱一行、专一行”
C. 要做到爱岗敬业就应一辈子在岗位上无私奉献
D. 在现实中,我们不得不承认,“爱岗敬业”的观念阻碍了人们的择业自由
【单选题】
(30970)办事公道是指职业人员在进行职业活动时要做到___。
A. 原则至上,不徇私情,举贤任能,不避亲疏
B. 奉献社会,襟怀坦荡,待人热情,勤俭持家
C. 支持真理,公私分明,公平公正,光明磊落
D. 牺牲自我,助人为乐,邻里和睦,正大光明
【单选题】
(30971)社会舆论具有___。
A. 片面性
B. 广泛性
C. 不确定性
D. 独特性
【单选题】
(30972)“节俭”是指___。
A. 节俭是美德,但不利于拉动经济增长
B. 节俭是物质匮乏时代的需要,不适应现代社会
C. 生产的发展主要靠节俭来实现
D. 节俭不仅具有道德价值,也具有经济价值
【单选题】
(30973)___是人们对客观事物的意义、用处以及重要性的总评价和总看法。
A. 人生观
B. 价值观
C. 世界观
D. 道德观
【单选题】
(30974)职业选择的意义是___。
A. 职业选择意味着可以不断变换工作岗位
B. 提倡自由选择职业会导致无政府主义
C. 职业选择有利于个人自由的无限扩展
D. 职业选择有利于促进人的全面发展
【单选题】
(30975)从2003年起,我国把“公民道德宣传日”定为每年的___。
A. 3月15日
B. 9月20日
C. 9月10日
D. 6月5日
【单选题】
(30976)党的十六大报告指出,认真贯彻公民道德建设实施纲要,弘扬爱国主义精神,以为人民服务为核心,以集体主义为原则,以___为重点。
A. 无私奉献
B. 爱岗敬业
C. 诚实守信
D. 遵纪守法
【单选题】
(30977)要做到遵纪守法,对每个职工来说,必须做到___。
A. 有法可依
B. 反对“管“、“卡”、“压”
C. 反对自由主义
D. 努力学法,知法、守法、用法
【单选题】
(30978)同一发电车各柴油发电机组须均衡使用,各机组运转工时差最多不得超过___。
A. 80 h
B. 90 h
C. 100 h
D. 110 h
【单选题】
(30979)备用发电车每___必须起动机组,检查技术状态,并按规定保养。
A. 10天
B. 15天
C. 20天
D. 25天
【单选题】
(30980)发电车供电的空调客车,须在列车始发前___开启空调设备对车厢进行预冷、预热。
A. 1 h
B. 2 h
C. 3h
D. 4 h
【单选题】
(30981)发电车供电的空调客车,须在列车终到后___卸载停机。
A. 20 min
B. 30 min
C. 40 min
D. 50 min
【单选题】
(30982)跨局直通旅客列车每运行一个往返必须安排入库检修;单程运行距离在___及以上的旅客列车,在折返站原则上应安排入库检修。
A. 4 000 km
B. 3 000 km
C. 2 000 km
D. 1 000 km
【单选题】
(30983)《铁路客车运用维修规程》(铁运〔2006〕27号)自___起施行。
A. 2006年4月1日
B. 2006年5月1日
C. 2006年6月1日
D. 2006年7月1日
【单选题】
(30984)运用列车质量鉴定评分标准分为A、B、C、D四类,发现B类故障(问题),每处每件扣___。
A. 5分
B. 10分
C. 20分
D. 50分
【单选题】
(30985)检查柴油发电机组膨胀水箱,水位不得低于___。
A. 1/3
B. 2/3
C. 1/2
D. 3/4
【单选题】
(30986)康明斯柴油发电机组小修时,各电动机应清除转子上的碳粉,碳刷无缺损、接触面不少于___。
A. 30%
B. 50%
C. 70%
D. 90%
【单选题】
(30987)《铁路技术管理规程》(铁道部令第29号)于___开始实施。
A. 2006年10月1日
B. 2006年7月1日
C. 2007年4月1日
D. 2007年10月1日
【单选题】
(30988)旅客站台分为低站台、高站台,低站台高度为300 mm、500 mm,高站台高度为___。
A. 600 mm
B. 800 mm
C. 1100 mm
D. 1250 mm
【单选题】
(30989)铁路运输企业应严格控制进入铁路的产品质量,建立必要的___。
A. 监督制度
B. 抽验制度
C. 检验制度
D. 审查制度
【单选题】
(30990)较大事故的调查期限为___。
A. 10天
B. 20天
C. 30天
D. 60天
【单选题】
(30991)___为较大事故。
A. 繁忙干线客运列车脱轨18辆以上并中断铁路行车48 h以上
B. 客运列车脱轨2辆以上18辆以下并中断繁忙干线铁路行车24 h以上或者中断其他铁路行车48 h以上
C. 客运列车脱轨2辆以上18辆以下
D. 客运列车脱轨2辆以上
【单选题】
(30992)造成___为特别重大事故。
A. 30人以上死亡
B. 10人以上30人以下死亡
C. 3人以上10人以下死亡
D. 3人死亡
【单选题】
(30993)登高作业使用梯子,梯子与地面的倾斜角为___左右,并要有防滑装置。
A. 30°
B. 45°
C. 60°
D. 80°
【单选题】
(30994)氧气瓶与乙炔发生器的距离应在___以上。
A. 4 m
B. 5 m
C. 6 m
D. 7 m
【单选题】
(30995)露天工作场所遇有___以上大风时禁止高空作业。
【单选题】
(30996)CAD软件可用来绘制___。
A. 机械零件图
B. 建筑设计图
C. 服装设计图
D. 以上都对
【单选题】
(30997)在使用GAC调速装置的康明斯发电车中,当运行中需换机或并车供电时,可以使用___来实现自动并车。
A. ESD5520
B. LSM201
C. SYC6714
D. 501K
【单选题】
(30998)发电车两机并车所需满足的条件是___。
A. 两机电频率相同
B. 两机电压值相同
C. 两机初相位相同
D. 以上都是
【单选题】
(30999)实现发电机组并车同期方式分为准同期和自同期两种,以下在叙述中不正确的是___。
A. 准同期指发电机并网前已励磁
B. 自同期法是指发电机并网后励磁
C. 自同期法并网速度快
D. 准同期法并网速度比自同期法快
推荐试题
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting