相关试题
【单选题】
刀具对工件的同一表面每一次切削称为___。
A. 工步
B. 工序
C. 加工次数
D. 走刀
【单选题】
工序基准、定位基准和测量基准都属于机械加工的___。
A. 粗基准
B. 工艺基准
C. 精基准
D. 设计基准
【单选题】
零件加工时一般要经过粗加工、半精加工和精加工三个过程,习惯上把它们称为___
A. 加工方法的选择
B. 加工过程的划分
C. 加工工序的划分
D. 加工工序的安排
【单选题】
从零件表面上切去多余的材料,这一层材料的厚度称为___。
A. 毛坯
B. 加工余量
C. 工序尺寸
D. 切削用量
【单选题】
中国共产党是中国 的先锋队,同时是中国人民和中华民族的先锋队,是中国特色社会主义事业的领导核心。___
A. 工人阶级
B. 知识分子阶层
C. 先进分子
【单选题】
党的最高理想和最终目标是实现 。___
【单选题】
中国共产党以马克思列宁主义、毛泽东思想、邓小平理论、“三个代表”重要思想、科学发展观、习近平 中国特色社会主义思想作为自己的行动指南。___
【单选题】
十一届三中全会以来,以 同志为主要代表的中国共产党人,总结新中国成立以来正反两方面的经验,解放思想,实事求是,实现全党工作中心向经济建设的转移。___
【单选题】
十三届四中全会以来,以 同志为主要代表的中国共产党人,在建设中国特色社会主义的实践中,加深了对什么是社会主义、怎样建设社会主义和建设什么样的党、怎样建设党的认识,积累了治党治国新的宝贵经验,形成了“三个代表”重要思想。___
【单选题】
十六大以来,以 同志为主要代表的中国共产党人,坚持以邓小平理论和“三个代表”重要思想为指导,根据新的发展要求,深刻认识和回答了新形势下实现什么样的发展、怎样发展等重大问题,形成了以人为本、全面协调可持续发展的科学发展观。___
【单选题】
我国正处于并将长期处于社会主义 阶段。___
【单选题】
在现阶段,我国社会的主要矛盾是人民日益增长的美好生活需要和 的发展之间的矛盾。___
A. 不平衡不充分
B. 落后的社会生产
C. 薄弱的经济基础
【单选题】
发展是我们党执政兴国的第一要务。必须坚持 的发展思想,坚持创新、协调、绿色、开放、共享的发展理念。___
A. 经济高速增长
B. 以人民为中心
C. 以人为本
【单选题】
中国特色社会主义事业“五位一体”总体布局指的是统筹推进经济建设、政治建设、文化建设、社会建设、 建设。___
【单选题】
中国特色社会主义事业“四个全面”战略布局指的是协调推进全面建成小康社会、全面深化改革、全面依法治国、全面 。___
A. 从严管理党员
B. 从严治党
C. 从严管理干部
【单选题】
在新世纪新时代,经济和社会发展的战略目标是,到建党一百年时,全面建成 ;到新中国成立一百年时,全面建成社会主义现代化强国。___
【单选题】
中国共产党在社会主义初级阶段的基本路线是:领导和团结全国各族人民,以经济建设为中心,坚持四项基本原则,坚持改革开放,自力更生,艰苦创业,为把我国建设成为富强民主文明和谐 的社会主义现代化强国而奋斗。___
【单选题】
坚持 、坚持人民民主专政、坚持中国共产党的领导、坚持马克思列宁主义毛泽东思想这四项基本原则,是我们的立国之本。___
A. 社会主义道路
B. 以经济建设为中心
C. 以人为本
【单选题】
坚持 ,是我们的强国之路。只有改革开放,才能发展中国、发展社会主义、发展马克思主义。___
【单选题】
中国共产党领导人民发展社会主义 。毫不动摇地巩固和发展公有制经济,毫不动摇地鼓励、支持、引导非公有制经济发展。___
【单选题】
是民主基础上的集中和集中指导下的民主相结合。它既是党的根本组织原则,也是群众路线在党的生活中的运用。___
【单选题】
年满 岁的中国工人、农民、军人、知识分子和其他社会阶层的先进分子,承认党的纲领和章程,愿意参加党的一个组织并在其中积极工作、执行党的决议和按期交纳党费的,可以申请加入中国共产党。___
【单选题】
中国共产党党员必须 ,不惜牺牲个人的一切,为实现共产主义奋斗终身。___
A. 全心全意为人民服务
B. 为人民服务
C. 从事志愿服务
【单选题】
发展党员,必须把 放在首位,经过党的支部,坚持个别吸收的原则。___
【单选题】
预备党员的义务同正式党员一样。预备党员的权利,除了没有表决权、选举权和 以外,也同正式党员一样。___
【单选题】
党员如果没有正当理由,连续 不参加党的组织生活,或不交纳党费,或不做党所分配的工作,就被认为是自行脱党。___
【单选题】
党的民主集中制的基本原则之一是: ,少数服从多数,下级组织服从上级组织,全党各个组织和全体党员服从党的全国代表大会和中央委员会。___
A. 党员个人服从党的组织
B. 个人服从集体
C. 普通党员服从领导干部
【单选题】
党的最高领导机关,是党的全国代表大会和它所产生的 。___
【单选题】
凡是成立党的新组织,或是撤销党的原有组织,必须由 决定。___
A. 上级党组织
B. 乡镇党委
C. 县(市、区)委组织部
【单选题】
党组织讨论决定问题,必须执行 的原则。决定重要问题,要进行表决。___
A. 委员服从书记
B. 少数服从多数
C. 个人服从组织
【单选题】
党的全国代表大会每 年举行一次,由中央委员会召集。___
【单选题】
党的省、自治区、直辖市的代表大会,设区的市和自治州的代表大会,县(旗)、自治县、不设区的市和市辖区的代表大会,每 年举行一次。___
【单选题】
企业、农村、机关、学校、科研院所、街道社区、社会组织、人民解放军连队和其他基层单位,凡是有 以上的,都应当成立党的基层组织。___
A. 党员三人
B. 正式党员三人
C. 正式党员十人
【单选题】
党支部是党的基础组织,担负直接 、管理党员、监督党员和组织群众、宣传群众、凝聚群众、服务群众的职责。___
【单选题】
对党员的纪律处分有五种:警告、严重警告、撤销党内职务、 、开除党籍。___
【单选题】
党员在留党察看期间没有表决权、 和被选举权。___
【单选题】
对经过 以上培养教育和考察、基本具备党员条件的入党积极分子,在听取党小组、培养联系人、党员和群众意见的基础上,支部委员会讨论同意并报上级党委备案后,可列为发展对象。___
【单选题】
支部大会讨论接收预备党员时,要采取 进行表决。赞成人数超过应到会有表决权的正式党员的半数,才能通过接收预备党员的决议。___
A. 无记名投票方式
B. 举手方式
C. 实名投票方式
【单选题】
预备党员的预备期为 。预备期从支部大会通过其为预备党员之日算起。___
【单选题】
预备党员预备期满时,党支部认为需要继续考察和教育的,可以延长一次预备期,延长时间不能少于 ,最长不超过一年。___
推荐试题
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces