刷题
导入试题
【单选题】
(单选)作为半个世纪以来中国十项重大考古发现之一,山西“___”的挖掘,也有厦大考古系师生的参与。
A. 侯鸟盟书
B. 侯马盟书
C. 候马盟书
D. 龙马盟书
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
(单选)下列校友中是物理学家的有___
A. 徐金声
B. 胡刚复
C. 黄开宗
D. 孙贵定
【单选题】
(判断)竹竿舞,投壶,踢毽子,舞龙舞狮……厦门大学把中国传统民俗活动,“搬”进校园里。这所正在争创“双一流”(世界一流大学、一流学科)的大学今年首次举办“我们的节日·春节”主题活动___
A. 对
B. 错
【单选题】
(判断)继高尔夫、爬树课后,厦门大学又开了一门特色体育课程皮划艇___
A. 对
B. 错
【单选题】
(判断)63岁的潘维廉在1988年来到厦门大学学汉语,随后任教厦大管理学院。他是第一个定居厦门的外国人、是福建省第一位外籍永久居民,还是中国高校最早引进的MBA课程的外籍教师之一___
A. 对
B. 错
【单选题】
(判断)厦大演武场改造新工程包括将厦大演武运动场转个90度,使之从南北走向变为东西走向___
A. 对
B. 错
【单选题】
(判断)厦大演武场改造新工程包括在大学路旁建设厦大真正的西校门___
A. 对
B. 错
【单选题】
(判断)厦大演武场改造新工程包括建设访客中心和停车场。这项工程是在演武操场下挖17.5米,建设一个下沉式接待游客的访客中心和停车场。其中的访客中心有两个功能,一个 是外人进入厦大的等待区——今后,要进入厦大的游人不必像现在这样“风餐露宿”地在校门口排队;二,访客中心还有符合校园风格的咖啡厅、茶室、书店,24 小时营业___
A. 对
B. 错
【单选题】
(判断)在山东海洋强省的建设征程中,南强学子贡献着厦大智慧。21世纪90年代,厦大海洋学系首届学子、海洋学家尤芳湖,提出的“海上山东”建议,被山东省采纳,列为跨世纪工程之一___
A. 对
B. 错
【单选题】
(判断)由厦门大学夏宁邵教授团队和养生堂万泰联合研制的我国首个国产HPV疫苗获批上市。我国成为继美国、英国之后世界上第三个可实现宫颈癌疫苗自主供应的国家___
A. 对
B. 错
【单选题】
(判断)2020年3月25日,细胞应激生物学国家重点实验室,厦门大学生命科学学院莫玮课题组和韩家淮课题组合作在Nature 杂志上发表题为“Gut stem cell necroptosis by genomeinstability triggers bowel inflammation” 的研究文章,报道了肠道干细胞中基因组不稳定激活ZBP1-RIP3-MLKL轴引发干细胞坏死,导致自发性的肠道炎症___
A. 对
B. 错
【单选题】
(判断)张玉麟在厦大建立起了辅导员制度,有力地加强了大学生的思想政治工作___
A. 对
B. 错
【单选题】
(判断)如今90多岁高龄,被称为“厦大援藏第一人”的叶国庆是厦大1950级生物学系校友,入校第一年,她就在父亲、厦大首届毕业生叶雪音的影响下,满腔热血、义无反顾地步行随军进藏___
A. 对
B. 错
【单选题】
(判断)1920年10月的上海,厦门大学筹备委员会在福州开会,拟订《厦门大学组织大纲》,推举福州人邓萃英为厦门大学首任校长……从此拉开了南方之强的厦门大学和享有“海滨邹鲁”美誉的有福之州之间历经百年之久的校地情缘。___
A. 对
B. 错
【单选题】
(判断)我校牵头申报国家自然科学基金委员会“新型冠状病毒(2019-nCoV)溯源、致病及防治的基础研究”专项,独立申报项目3项,参与合作1项。___
A. 对
B. 错
【单选题】
(判断)2月5日福建省政府新闻办新闻发布会上发布消息厦门大学分子诊断教育部工程研究中心研发的应用于新型冠状病毒的核酸提取试剂备案注册成功目前已加紧投入生产每周可向市场供应4.2万人___
A. 对
B. 错
【单选题】
(判断)2013年10月4日,我方与马来西亚签署了厦门大学马来西亚分校建设的相关协议,这是第一所在马来西亚设立的中国大学分校。___
A. 对
B. 错
【单选题】
(判断)学校已明确了创建世界一流大学的“三步走”战略,即到建校百年(2021年),全面建成世界知名高水平研究型大学;到2035年左右,跻身世界一流大学行列;到新中国成立百年之际,跃居世界一流大学前列。___
A. 对
B. 错
【单选题】
(判断)2008年,毕业于海外函授中医专业的澳门学子秉持“自强不息,止于至善”的厦大校训,成立澳门厦门大学医学院医学会,意在团结校友和同仁,配合澳门特区政府及卫生当局的各项医疗政策,提高医疗水平,为澳门市民服务,为母校争光。___
A. 对
B. 错
【单选题】
(判断)厦大生命科学学院教授厦大分子诊断教育部工程研究中心主任李庆阁团队研制出的新型冠状病毒现场检测一体机,已完成内部测试,开展临床评估___
A. 对
B. 错
【单选题】
(判断)近期,由武汉大学和厦门大学等单位合作完成的“大数据环境下高精度道路地图众包测绘与动态更新技术”获得教育部2019年度高校科技进步一等奖。___
A. 对
B. 错
【单选题】
(判断)在水下声通信和仿生声探测方向,厦大研究团队研发的自主知识产权水声通信设备已批量应用于国防安全、海洋工程领域。___
A. 对
B. 错
【多选题】
(多选)在长期的办学历程中,厦门大学形成了独具特色的精神___
A. 陈嘉庚先生的爱国精神
B. 罗扬才烈士的革命精神
C. 萨本栋校长为代表的艰苦办学的自强精神
D. 王亚南校长和陈景润教授为代表的科学精神
【多选题】
(多选)厦门大学的知名校友有___
A. 陈景润
B. 谢希德
C. 张高丽
D. 卢嘉锡
【多选题】
(多选)厦门大学成立之初设有___部,这是我国第一所由华侨创办的大学,也是全国唯一独资创办的大学。
A. 文
B. 理
C. 法
D. 商
E. 教育
F. 师范
【多选题】
(多选)1924年,《厦门大学组织大纲》进一步明确学校办学的任务是___
A. 研究高深学术
B. 养成专门人才
C. 阐扬世界文化
D. 厦大走向世界
【多选题】
(多选)1945年9月至1989年9月,担任过厦大校长的有___
A. 萨本栋
B. 王亚南
C. 曾鸣
D. 田昭武
【多选题】
(多选)在1926年费城世博会上,厦门大学与当时国内最著名的大学___,一起代表我国高等教育参展,并一起获得世博会最高荣誉奖章——甲等大奖。
A. 北京大学
B. 清华大学
C. 南京大学
D. 北京师范大学
【多选题】
(多选)1923年,厦门大学便开始聘请___国际知名学者来校任教。
A. 化学家刘树杞
B. 人类学家史禄国
C. 生物学家赖特
D. 中科院院士田昭武
【多选题】
(多选)群贤群楼群五幢一字排列,东边为集美楼、映雪楼,西边为同安楼、囊萤楼。囊萤楼、映雪楼很长时间作为学生宿舍,后来调整与同安楼、集美楼一样做教学、科研用房。该楼群最大特色:___
A. 古今、中西合璧式。
B. 以中式风格为主,花格屋脊、石结构墙体,筑造典雅独特
C. 清水雕砌特大的张灯结彩、垂珠彩帘吉祥图案式。
D. 楼梯石板悬挑式。
【多选题】
(多选)关于厦门大学海洋与地球学院的说法,以下错误的有___
A. 1947年成立中国第一个海洋学系
B. 1997年成立厦门大学海洋与地球学院
C. 90余年的学科发展历程中,涌现出伍献文、曾呈奎等杰出科学家
D. 改革开放后,学科点即成为首批博士学位授权单位
【多选题】
(多选)下列___是校内建筑的名称。
A. 凌峰
B. 映雪
C. 演武
D. 囊萤
【多选题】
(多选)厦门大学“一校三区”共同构成“校在海上,海在校中”的独特风景。此外,厦门大学还在马来西亚设立了海外分校。厦大总占地面积超9000亩。其中占地面积超过理2000亩的校区为___
A. 马来西亚分校
B. 思明校区
C. 翔安校区
D. 漳州校区
【多选题】
(多选)李光前先生捐助兴建了___
A. 芙蓉楼群
B. 群贤楼群
C. 建南大礼堂
D. 囊萤楼
【多选题】
(多选)厦大学生党员在白色恐怖时期创办哪些刊物宣传抗日救亡运动___
A. 《现代文化》
B. 《野火》
C. 《鹭涛旬刊》
D. 《鹭花》
E. 《灯塔》
【多选题】
(多选)在1921年6月到1945年8月期间,曾担任厦大校长的有___
A. 陈嘉庚
B. 林文庆
C. 萨本栋
D. 邓萃英
【多选题】
(多选)下列关于厦大图书馆总馆设置说法正确的是___
A. 馆内提供无线网络,热点名为xmulib
B. 馆内提供自助复印服务,刷卡使用
C. 总馆进馆门即是二楼
D. 信息咨询与推广服务部在三楼
【多选题】
(多选)1935年重新组建校委会的时候,担任校董事的有___
A. 黄廷元
B. 宋子文
C. 林文庆
D. 李俊承
【多选题】
(多选)1951年,原私立福建大学的哪些系并入厦门大学,进一步扩大了厦门大学学科项目___
A. 政治系
B. 法律系
C. 管理系
D. 经济系
【多选题】
(多选)厦门大学与___等省及地市签署战略合作协议、人才合作协议等,还与复旦大学和《人民日报》社签订合作协议。
A. 河南
B. 汕头
C. 赣州
D. 新疆
E. 广东
【多选题】
(多选)下列是厦门大学一级学科博士学位授权点的是___
A. 哲学
B. 理论经济学
C. 生态学
D. 考古学
推荐试题
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用