【单选题】
作为党的思想路线“实事求是”中的“是”是指___。
A. 客观存在着的一切事物
B. 主观对客观的能动反映
C. 客观事物的内部联系,即规律性
D. 客观事物的运动、变化和发展,即辩证法
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
实事求是的基本含义是___。
A. 从客观事物的现象出发
B. 找出事物的因果联系
C. 从客观存在的一切事物中,去研究事物的发展规律
D. 发现事物本质与现象的区别
【单选题】
建设中国特色的社会主义路线、方针、政策的检验标准是___。
A. 马克思主义的经典著作
B. 领导人的想法和意志
C. 实践
D. 决策机关的权力大小
【单选题】
20世纪30年代,中国共产党内最早提出反对教条主义任务的领导人是___。
A. 毛泽东
B. 刘少奇
C. 周恩来
D. 张闻天
【单选题】
实事求是的“实事”指的是___。
A. 研究
B. 从实际出发
C. 客观事物
D. 客观事物的内在规律性
【单选题】
贯穿于马克思主义中国化理论成果始终的是___。
A. 理论创新
B. 实事求是
C. 本本主义
D. 中体西用
【单选题】
坚持实事求是的思想路线,在中国革命、建设和改革问题上,最根本的要求就是要___。
A. 坚定不移地走自己的路
B. 以经济建设为中心
C. 坚持改革开放
D. 坚持四项基本原则
【单选题】
在关于社会主义发展阶段问题上,毛泽东提出,社会主义可以被分为两个阶段,其中第二个阶段是___。
A. 社会主义中级阶段
B. 社会主义初级阶段
C. 共产主义初级阶段
D. 比较发达的社会主义
【单选题】
毛泽东关于社会主义社会矛盾的学说与八大关于社会主要矛盾的论断是___。
A. 基本一致
B. 完全不同
C. 没有关系
D. 互为冲突
【单选题】
___提出了把我国由农业国变为工业国,实现国家现代化的构想。
A. 党的七届二中全会
B. 党的七届三中全会
C. 中共七大
D. 中共八大
【单选题】
建国初,党曾提出在20世纪内,分两步走把我国建设成为“四个___”的社会主义国家的构想。
A. 全面化
B. 科技化
C. 现代化
D. 知识化
【单选题】
中华人民共和国成立后,曾经认为公有制程度越高越好,对___采取了简单排斥的做法。
A. 公有制
B. 非公有制经济
C. 按劳分配
D. 社会主义分配制度
【单选题】
早在1953年,中华人民共和国开始第一个五年计划建设时,___就提出要学习先进的科学技术来建设我们的国家。
A. 邓小平
B. 周恩来
C. 毛泽东
D. 刘少奇
【单选题】
我国坚持在___基础上发展同所有国家的友好合作关系。
A. 和平共处五项原则
B. 独立自主
C. 合作共赢
D. 互惠互利
【单选题】
中共十一届三中全会后对毛泽东思想的历史地位作出科学评价的文献是___。
A. 《解放思想,实事求是,团结一致向前看》
B. 《关于建国以来党的若干历史问题的决议》
C. 《全面开创社会主义现代化建设的新局面》
D. 《关于社会主义精神文明建设的决议》
【单选题】
就毛泽东一生来看,对他的功过评价中肯的是___。
A. 功大于过
B. 过大于功
C. 功过参半
D. 有功无过
【单选题】
毛泽东和毛泽东思想的认识错误倾向主要有___。
A. 实事求是
B. “两个凡是”和全盘否定
C. 历史分析法
D. 区分过失与功绩
【单选题】
关于毛泽东晚年错误思想认识正确的是___。
A. 毛泽东晚年思想都属于毛泽东思想一部分
B. 毛泽东晚年错误思想不属于毛泽东思想
C. 毛泽东晚年思想都是错误的思想
D. 毛泽东晚年错误思想就是指“文化大革命”的思想
【单选题】
近代中国的最主要矛盾是___。
A. 封建主义与人民大众的矛盾
B. 帝国主义与中华民族的矛盾
C. 生产力与生产关系的矛盾
D. 经济基础与上层建筑的矛盾
【单选题】
中国资产阶级民主革命的时代背景发生根本转变的标志是___。
A. 五四运动
B. 新文化运动
C. 俄国十月革命的胜利
D. 戊戌变法
【单选题】
近代中国的社会性质是___。
A. 前资本主义社会
B. 半殖民地半封建社会
C. 政治、经济、文化发展平衡的社会
D. 资本主义社会
【单选题】
___的胜利,改变了整个世界历史的方向,划分了整个世界历史的时代,开辟了世界无产阶级社会主义革命的新纪元,标志着人类历史开始了由资本主义向社会主义转变的进程。
A. 俄国十月革命
B. 新文化运动
C. 五四运动
D. 辛亥革命
【单选题】
中国无产阶级开始以独立的政治力量登上历史舞台,由自在阶级转变为自为的阶级的历史事件是___。
A. 俄国十月革命
B. 五四运动
C. 辛亥革命
D. 新文化运动
【单选题】
新民主主义革命的领导阶级是___。
A. 资产阶级
B. 小资产阶级
C. 农民阶级
D. 无产阶级
【单选题】
系统化的适合中国国情的新民主主义革命理论形成于___时期。
A. 抗日战争
B. 辛亥革命
C. 解放战争
D. 鸦片战争
【单选题】
新民主主义革命理论是在总结___正反两方面实践经验的基础上形成的。
A. 罢工运动
B. 革命斗争
C. 统一战线
D. 党的建设
【单选题】
近代中国所遭受的最大的压迫是来自___的民族压迫。
A. 封建主义
B. 帝国主义
C. 官僚资本主义
D. 军阀
【单选题】
___是帝国主义统治中国和封建军阀实行专制统治的社会基础。
A. 城市小资产阶级
B. 工人阶级
C. 封建地主阶级
D. 资产阶级
【单选题】
工人阶级只有与___结成巩固的联盟,才能形成强大的力量,才能完成反帝反封建的革命任务。
A. 手工业者
B. 小资产阶级
C. 商人
D. 农民阶级
【单选题】
无产阶级及其政党实现对各革命阶级的领导,必须建立以___为基础的广泛的统一战线,这是实现领导权的关键。
A. 工商联盟
B. 工农联盟
C. 农商联盟
D. 工业与手工业联盟
【单选题】
无产阶级在同资产阶级建立统一战线时,必须坚持___原则,保持党在思想上、政治上和组织上的独立性,实行又联合又斗争的方针,这是坚持领导权的基本策略。
A. 独立自主
B. 以我为主
C. 为我所用
D. 独立自强
【单选题】
加强___政党的建设,实现无产阶级在民主革命中的领导权的根本保证。
A. 无产阶级
B. 农民阶级
C. 工人阶级
D. 资产阶级
【单选题】
社会主义革命是无产阶级性质的革命,它所要实现的目标是___和改造小生产者的私有制。
A. 消灭资本家的肉体
B. 消灭资本主义剥削制度
C. 根本解决资本主义的内在矛盾
D. 实现共产主义
【单选题】
第一次完整地提出新民主主义政治、经济、文化纲领的著作是___。
A. 《论联合政府》
B. 《在晋绥干部会议上的讲话》
C. 《新民主主义论》
D. 《<共产党人>发刊词》
【单选题】
新民主主义经济纲领中极具特色的一项内容是___。
A. 没收封建地主阶级的土地归农民所有
B. 没收官僚资本归国家所有
C. 消灭资本主义
D. 保护民族工商业
【单选题】
1945年,毛泽东在党的七大所作的___的政治报告中,进一步把新民主主义的政治、经济、文化与党的基本纲领结合起来,进行了具体的阐述。
A. 《论联合政府》
B. 《新民主主义论》
C. 《<共产党人>发刊词》
D. 《在晋绥干部会议上的讲话》
【单选题】
新民主主义革命的政治纲领是:推翻帝国主义和封建主义的统治,建立一个无产阶级领导的、___、各革命阶级联合专政的新民主主义的共和国。
A. 以民族资产阶级为基础的
B. 以工农联盟为基础的
C. 以工商联盟为基础的
D. 以工人阶级为基础的
【单选题】
与新民主主义国体相适应的政体是实行___的人民代表大会制度。
A. 无政府制
B. 民主集中制
C. 议会制
D. 共和制
【单选题】
新民主主义国家制度的核心内容和基本准则是___。
A. 各革命阶级联合专政
B. 工农联盟
C. 工商联盟
D. 人民当家作主
【单选题】
作为新民主主义革命的三大经济纲领之一,没收官僚资本具有___。
A. 社会主义性质
B. 民主革命性质
C. 新民主主义革命和社会主义革命的双重性质
D. 新民主主义革命性质
【单选题】
土地革命战争时期,革命的主要对象是___。
A. 北洋军阀
B. 国民党新军阀
C. 日本帝国主义
D. 民族资产阶级
推荐试题
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective