【单选题】
要解决好工业文明带来的矛盾,以人与自然和谐相处为______,实现世界的可持续发展和人的全面发展。___
A. 核心
B. 方向
C. 目标
D. 宗旨
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
C
解析
暂无解析
相关试题
【单选题】
构建______思想顺应了历史潮流,凝聚了各国共识,为人类社会实现共同发展、持续繁荣、长治久安绘制了蓝图。___
A. 共同发展
B. 人类命运共同体
C. 共同进步
D. 和平共处
【单选题】
______,习近平在出访中亚和东南亚国家期间,先后提出共建“丝绸之路经济带”和“21世纪海上丝绸之路”的重大倡议。___
A. 2012年8月和9月
B. 2012年9月和10月
C. 2013年8月和9月
D. 2013年9月和10月
【单选题】
共建“一带一路”符合国际社会的______,彰显人类社会共同理想和美好追求,是国际合作以及全球治理新模式的积极探索。___
A. 基本利益
B. 根本利益
C. 基本目标
D. 根本目标
【单选题】
2017年5月第______届“一带一路”国际合作高峰论坛成功举办,共76大项、270多项具体成果,成为新时期推动全球发展合作的机制化平台。___
A. 一
B. 二
C. 三
D. 四
【单选题】
充分尊重______,深度对接有关国家和区域发展战略,实现优势互补,协同并进;不断增强各参与方的获得感,充分调动各方面积极性。___
A. 文化区别
B. 各国差异
C. 各国传统
D. 宗教信仰
【单选题】
中国恪守维护世界和平、促进共同发展的外交政策宗旨,坚定不移在______原则基础上发展同各国的友好合作。___
A. 和平共处五项
B. 共商共建共享
C. 互不干涉内政
D. 尊重主权领土
【单选题】
世界正处于大发展大变革大调整时期,和平、发展、合作、共赢成为不可阻挡的时代潮流,______仍然是当今时代的主题。___
A. 合作
B. 竞争
C. 共建人类命运共同体
D. 和平与发展
【单选题】
推动构建______,就是要各国人民同心协力,建设持久和平、普遍安全、共同繁荣、 开放包容、清洁美丽的世界。___
A. 共同发展
B. 人类命运共同体
C. 共同进步
D. 和平共处
【单选题】
构建人类命运共同体思想继承和发展了新中国不同时期重大外交思想和主张,反映了中外优秀文化和全人类共同______。___
A. 奋斗目标
B. 价值追求
C. 理想信念
D. 利益所在
【多选题】
随着______,经济全球化的进程受阻,但经济全球化的总趋势尚未改变。___
A. 科学技术的进步
B. 英国脱欧进程的加快
C. 各国经济的高速发展
D. 国际范围内贸易保护主义的抬头
【多选题】
经济全球化是一把“双刃也带剑”,也带来一些负面影响,增多了全球共同面临的社会经济问题,______,并对国家主权和发展中国家的民族工业造成了一定冲击。___
A. 加强了国际合作
B. 加剧了国际竞争
C. 增加了国际风险
D. 降低了国际风险
【多选题】
______所带来的商品流、信息流、技术流、人才流、文化流,汹涌而来,势不可挡,世界正在进人以信息产业为主导的新备济发展时期。___
A. 社会信息化
B. 文化全球化
C. 经济全球化
D. 科技进步化
【多选题】
新一轮科技革命和产业变革正在孕育兴起,______广泛渗透,带动几乎所有领域发生了以绿色、智能、泛在为特征的群体性技术革命。___
A. 信息技术
B. 生物技术
C. 新材料技术
D. 新能源技术
【多选题】
只有______,中国才能实现自己的目标,才能为世界作出更大贡献。___
A. 坚持依法治国基本方针
B. 坚持走和平发展道路
C. 同世界各国一道维护世界和平
D. 同世界一起发展国际贸易
【多选题】
中国走和平发展道路的自信和自觉,来源于______。___
A. 对中国自身国情做出的抉择
B. 中华文明的深厚渊源
C. 对实现中国发展目标条件的认知
D. 对世界发展大势的把握
【多选题】
积极倡导和践行多边主义,积极参与多边事务,高度重视联合国的作用,支持______等发挥积极作用。___
A. 二十国集团
B. 亚太经合组织
C. 上海合作组织
D. 金砖国家
推荐试题
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image