【单选题】
良好的激励就是要去激发人的()
A. 意愿
B. 动机
C. 远景
D. 计划
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
下列不属于计量决策模型的事()
A. 回归分析法
B. 形态分析法
C. 盈亏临界分析法
D. 决策树分析法
【单选题】
最基本的组织沟通途径是()
A. 协调
B. 计划
C. 控制
D. 职权
【单选题】
计划职能最为关键的内容是()
A. 选择方案
B. 拟定方案
C. 目标的管理
D. 目标的选择
【单选题】
下列不应使用程序化决策方法是()
A. 企业纳税申报的安排
B. 组织结构的调整
C. 生产计划的安排
D. 采购工作的开展
【单选题】
短期预测一般是指()以内的预测?
A. 30个月
B. 6
C. 1
D. 3月
【单选题】
短期预测一般是指()以内的预测
A. 30个月
B. 6个月
C. 12个月
D. 三个月
【单选题】
衡量企业营业成本,各项费用获利水平的指标()
A. 营业收入利税率
B. 销售利润率
C. 成本费用利润率
D. 资产负债率
【单选题】
目前企业管理中应用最为广泛的企业绩效管理方法是()
A. 线性规划法
B. 盈亏平衡法
C. 边际分析法
D. 平衡计分法
【单选题】
确定所要完成的任务,如何来完成任务,以及如何管理和协调这些任务的过程主要是指()
A. 领导
B. 计划
C. 组织
D. 控制
【单选题】
委员会制相对于个人负责制来说其实质是()
A. 业务在同一管理层次上的分配
B. 责任在同一管理层次上分配
C. 职权在同一管理层次上的分配
D. 职权在不同层次上的分配
【单选题】
非主管工作的轮换主要是在组织的()进行的
A. 中级管理层
B. 基层
C. 高级管理层
D. 决策层
【单选题】
管理学是一门()
A. 社会科学
B. 自然科学
C. 边缘科学
D. 历史科学
【单选题】
()属于双因素理论激励因素
A. 工作安全
B. 工作条件
C. 监督
D. 受到重视
【单选题】
(),是指把系统的各部分各方面和各种因素联系起来,考察其中的共同性和规律性。
A. 环境适应性原理
B. 开放性原理
C. 综合性原理
D. 动态性原理
【单选题】
(),是指依靠行政组织的权威与用命令规定,只是条例等行政手段,按照行政系统和层次,以权威和服从为前提,直接指导下属工作的管理方法()
A. 经济方法
B. 法律方法
C. 教育方法
D. 行政方法
【单选题】
mrp是()的简称
A. 物料需求计划
B. 制造资源计划
C. 企业资源计划
D. 电子商务系统
【单选题】
组织设计的实质是对管理人员的管理劳动,进行横向和纵向的()
A. 授权
B. 领导
C. 命令
D. 分工
【单选题】
(),不属于组织中促进分权的因素
A. 组织规
B. 活动的分散性
C. 培训管理人员的需要
D. 政策的统一性
【单选题】
组织文化包括(),表层和显现层三个层次
A. 制度层
B. 潜层次
C. 物质层
D. 行为准则层
【单选题】
(),是指领导者发动下属讨论,共同商量,集思广益,然后决策要求上下融洽,合作一致的工作
A. 专权型领导
B. 民主型领导
C. 放任型领导
D. 权变型领导
【单选题】
(),不属于书面沟通的优点
A. 快速反馈
B. 持久
C. 有型
D. 可以核实
【单选题】
沟通障碍的技术因素包括语言非语言暗示媒介的有效性和()
A. 信息过量
B. 地位差别
C. 沟通双方的相互信任
D. 选择性接受
【单选题】
(),是在20世纪50年代初期,将计算机应用在经营管理工作中的数据处理,特别是会计和统计工作的数据,主要用于运作成本控制管理。
A. 管理信息系统。
B. 决策支持系统
C. 电子数据处理系统。
D. 经理信息系统
【单选题】
在平衡记分卡中,企业的战略处于核心位置,财务和内部经营过程,(),环与四周构成一个管理系统。
A. 教育培训
B. 售后服务
C. 学习和成长
D. 开发新产品
【单选题】
创新的过程包括寻找机会提出构思迅速行动(),4个阶段
A. 深入分析
B. 坚持不懈
C. 大胆预测
D. 组织协调
【单选题】
在决策工作中,基层管理者所做的更多的是()
A. 战略决策
B. 非程序化决策
C. 业务决策
D. 管理决策
【单选题】
下面哪个不是目标管理特点()
A. 是参与管理的一种形式
B. 强调自我管理
C. 以行业领先企业为学习目标
D. 促使下放权力
【单选题】
最早是由美国通用公司总裁斯隆于1943年提出了,于是有了斯隆模型,之称的是()
A. 直线职能型组织结构
B. 矩阵型组织结构
C. 事业部型组织结构
D. 直线型组织结构
【单选题】
高层管理者执行相对较多的是()
A. 程序性计划和作业计划
B. 战略性计划和程序计划
C. 非程序性计划和作业计划
D. 非程序性计划和战略计划
【单选题】
管理是通过其他人来完成工作的艺术,该概念强调的是()
A. 人的因素在管理中的重要性
B. 管理过程的严谨性
C. 管理活动的科学性
D. 管理职能的复杂性
【单选题】
管理的载体是()
A. 环境
B. 信息
C. 组织
D. 文化
【单选题】
管理的目的是()
A. 提高积极性
B. 获取利润
C. 实现组织目标
D. 完成上级交办的任务
【单选题】
组织设计的原则不包括()
A. 专业化分工原则
B. 统一指挥原则
C. 权责对等原则
D. 重要性原则
【单选题】
某公司在进行组织结构设计时,在其市场部下设零售批发商法人团队部,这是按()进行划分的
A. 职能部门化
B. 产品部门化
C. 顾客部门化
D. 矩阵型
【单选题】
在组织内部同层次成员之间的信息沟通属于()
A. 上行沟通
B. 下行沟通
C. 横向沟通
D. 单向沟通
【单选题】
关于非正式组织以下表述正确的是()
A. 非正式组织对正式组织会产生积极作用
B. 企业内部一般都会有非正式组织
C. 非正式组织是正式建立的职能部门
D. 非正式组织和正式组织一定会产生冲突
【单选题】
关于公平理论,下列说法正确的是()
A. 是由心理学家弗洛姆提出的
B. 横向比较是将自己的状况与过去的状况进行比较
C. 当员工对组织的激励措施感到不公平时,他会更加努力工作,以实际行动来扭转不公平
D. 该理论的不足之处是员工对公平的判断是极其主观的
【单选题】
管理哲学敬业精神属于组织文化的()
A. 表层
B. 潜层次
C. 物质层
D. 制度层
【单选题】
从基层提拔一批管理者到中层从事管理工作,培训的重点应放在()
A. 总结他们在基层工作的经验教训
B. 熟悉公司有关中层管理人员的奖惩制度
C. 促进他们重新认识管理职能的重点所在
D. 帮助他们完成管理角色的转变
【单选题】
肢体语言属于沟通方式中的()
A. 口头沟通
B. 书面沟通
C. 电子媒介沟通
D. 非语言沟通
推荐试题
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability