【多选题】
常用的音频接头有___
A. 卡农头
B. 大三芯
C. RJ45水晶头
D. 莲花接头
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
ABD
解析
暂无解析
相关试题
【多选题】
目前消防部队电视电话会议系统分为那几级网络___
A. 一级网为公安部消防局至消防总队的电视电话会议网,
B. 二级网为消防总队至消防支队的电视电话会议网,
C. 三级网为消防支队至消防大队的电视电话会议网
D. 四级网为消防支队至当地公安局电视电话会议网
【多选题】
视频会议系统会议中终端开启后没有声音输出,需要进行那些操作排除故障___
A. 请检查线音频线缆是否连接正确,音频外设是否工作正常;
B. 检查音频输入线路异常;
C. 检查音频输出线路异常;
D. 终端的音量是否太低或为静音状态
E. 通过“诊断”界面,进行声音测试,检查声音的输入输出是否正常。
【多选题】
灭火救援指挥系统在警情受理方面的“多个突破”有___
A. 手机报警定位,地图直观判断。
B. 支队大集中受理警情模式改革(与中队远程接警混合) 。
C. 接警软件与硬件系统接口标准化。
D. 跨区域、跨警种的警情转接和语音联合调度。
【多选题】
消防接处警系统出现中队与支队或支队与总队系统无法链接,在确保指挥网整体正常的情况下,应怎么处理___
A. 进行互ping操作
B. 排查链路故障
C. 排查交换机故障
D. 排查服务器故障
【多选题】
通过消防接处警系统选择调派车辆,点击【出车】后,系统将产生哪些动作___
A. 系统会向所有的车辆所属中队子系统发送派车命令和出车单,自动拨打主管中队电话。
B. 如果派车命令正常下发,并且中队确认,在“中队反馈信息栏”中将显示反馈信息。
C. 如果中队收到派车命令但未确认,将出现中队未确认的提示框。
D. 如果派车命令未正常下发,将出现中队未收到的提示框。
【多选题】
灭火救援指挥系统指挥决策管理子系统具有哪些功能___
A. 提供了丰富的数学应用计算公式模型,
B. 为指挥调度系统和预案管理系统提供了车辆调集接口功能
C. 实现了和预案、水源、执勤实力等的无缝集成
D. 提供了化学危险品查询功能,以及消防知识库建设管理功能。
【多选题】
安全管理是网络管理中心的重要职责,主要包括___。(易)(消防通信网络设备)
A. 安全政策的制定与实施
B. 用户及域名注册管理
C. 密钥管理
D. 安全监控
E. 入侵检测
【多选题】
常用的接入Internet的方式有哪些?___(中)(基础知识)
A. 以专线接入
B. 使用电话调制解调器拨号上网
C. 通过主干局域网接入
D. 通过ISDN接入
E. 通过宽带ADSL接入
F. 正在发展的其他宽带接入。
【多选题】
应急通信的组织实施中,下面哪两项是关于前期组织的内容。___(中)(应急通信)
A. 出动准备
B. 集成运输
C. 准备车辆;
D. 维修器材
E. 购买发电机
F. 临时确定人员。
【多选题】
下列哪些是常用的视频编码标准,请列出___(难)(音视频系统)
A. H.261、H.263;
B. H.264、MPEG-4;
C. G.711、G.722;G.729;
D. H265、MPEG-2。
【多选题】
中队级现场通信保障人员的职责和任务有哪些?___(中)(应急通信)
A. 负责本中队指挥员与大队的通信联络
B. 负责本中队指挥员与支队的通信联络
C. 负责本辖区内较大灭火与应急救援行动的初期保障
D. 负责上级通信人员到场时,通信保障工作
【多选题】
保障短波电台通信畅通的主要措施有哪些?___(中)(应急通信)
A. 科学选用频率
B. 正确选择电台开设位置
C. 合理选用电台和天线
D. 正确拟制和使用无线电台联络规定
E. 树立全局观念,搞好团结协作
【多选题】
应急通信的特点有哪些?___ (易)(应急通信)
A. 时间的突发性
B. 地点的不确定性
C. 地理环境的复杂性
D. 容量需求的不确定性
E. 通信保障的业务多样化
F. 现场应用的高度自主性
【多选题】
无线集群系统与常规系统有何不同?___ (易)(应急通信)
A. 集群系统信道利用率比常规系统高。
B. 集群通信系统的服务质量高,功能丰富。
C. 集群与常规相比具有通话私密性。
D. 集群系统具有交换功能,可联网。
E. 集群系统具有控制中心,具有控制管理功能。
【多选题】
无线集群通信系统的基站都应包含哪些设备?___ (难)(应急通信)
A. 基站控制器
B. 信道机,包括发射机、接收机和双工控制器。
C. 发射机合路器。
D. 接收机耦合器。
E. 天线,包括发射天线和接收天线,必要时可增配接收天线放大器。
F. 链路传输设备。
【多选题】
与地面微波中继、陆地移动通信相比,卫星通信的主要特点有哪些?___ (易)(应急通信)
A. 覆盖范围大。
B. 通信链路稳定。
C. 抗自然灾害能力强。
D. 通信费用与距离无关。
E. 能同时实现多个相距遥远的地球站之间的通信联接。
【多选题】
在某支队的火场无线通信三级组网中,中队指挥员在哪一级网上?___(中)(应急通信)
A. 一级网;
B. 二级网;
C. 三级网;
D. 四级网;
E. 管区覆盖网;
F. 火场指挥网。
【多选题】
在某支队的火场无线通信三级组网中,中队指挥员在无线通信网络中的任务是什么?___(中)(应急通信)
A. 接受上级指挥员的命令;
B. 负责指挥他的中队进行灭火工作;
C. 向总队指挥员报告情况;
D. 与自然水、天然气、电力等公司协同沟通;E
E. 与支队指挥中心联系;
【多选题】
在支队的火场无线通信组网中,火场指挥网是最容易混乱的一级网络,下列哪些是造成混乱的原因?___(中)(应急通信)
A. 是参与人数最多的一级网络;
B. 通信纪律差;
C. 呼叫不规范;
D. 电台数量少;
E. 通信员不够;
F. 大队、中队未配备通信指挥车。
【多选题】
支队火场无线通信三级组网中,因为第二级网是最混乱的一级网络,为了解决火场无线通信混乱的问题,下列哪些是主要的解决措施?___(难)(应急通信)
A. 购买新的通信指挥车;
B. 火场增加通信员;
C. 控制加入火场指挥网的人数;
D. 开设备用指挥网;
E. 规范火场通信呼号;
F. 加强火场通信纪律
推荐试题
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
【单选题】
以下关于数据处理的叙述中,不正确的足___。
A. :数据处理不仅能预测不久的未来,自时还能影响未
B. :数据处理和数据分析可以为决策提供真知灼见
C. :数据处理的重点应从技术角度去发现和解释数据蕴涵的意义
D. :数据处理足从现实世界到数据,冉从数据到现实世界的过程
【单选题】
“互联网十制造”是实施《中国制造2025》的重要措施。以下对“互联网十制造”主要特征的叙述中,不正确的是___。
A. :数字技术得到普遍应用,设计和研发实现协同与共享
B. :通过系统集成,打通整个制造系统的数据流、信息流
C. :企业生产将从以用户为中心向以产品为中心转型
D. :企业、产品和用户通过网络平台实现联接和交互
【单选题】
信息技术对传统教育方式带来了深刻的变化。以下叙述中,不正确的是___。
A. :学习者可以克服时空障碍,实现随时、随地、随愿学习
B. :给学习者提供宽松的、内容丰富的、个性化的学习环境
C. :通过信息技术与学科教学的整合,激发学生的学习兴趣
D. :教育信息化的发展使学校各学科全部转型为电子化教育