【单选题】
《中国人民解放军内务条令(试行)》已经2018年3月22日中央军委常务会议通过,现予发布,自2018年___起施行。
A. 5月1日
B. 7月7日
C. 8月1日
D. 10月1日
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
部属对命令必须___执行,并将执行情况及时报告首长。
A. 立即
B. 迅速
C. 坚决
【单选题】
军人临时离开原建制到其他单位工作时,应当接受所到单位首长的领导和管理,并___向原单位报告情况。
A. 每个月
B. 定期
C. 每周
【单选题】
士兵休息日和节假日外出通常___人以上同行,并指定负责人。
A. 一
B. 二
C. 三
D. 四
【单选题】
军人在下列时机和场合的礼节不正确的是___:
A. 每日第一次遇见首长或者上级或者军衔比自己高的同志时,应当敬礼,对方应当还礼
B. 军人进见首长时,在进入首长室内前,应当喊“报告”或者敲门,允许后方可以进入并向首长敬礼
C. 同级因事接触时,通常互相敬礼
D. 参加集体活动被介绍时,应当敬礼
【单选题】
下面不属于基层单位一日生活内容的是___
A. 起床
B. 早操
C. 整理内务和洗漱
D. 看新闻
【单选题】
军人不得接受对工作有影响的___和礼品馈赠,不得参加地方非政府组织的剪彩、庆典等活动。
A. 馈赠
B. 宴请
C. 请吃
D. 聚会
【单选题】
军人不得___,不得从事本职以外的其他职业和网络营销、传销、有偿中介活动。
A. 经商
B. 做生意
C. 开饭店
D. 做经营
【单选题】
军人在___、邮寄物品、使用共享交通工具等需要填写单位、身份等信息时,不得涉及部队番号和其他军事秘密。
A. 网络购物
B. 买东西
C. 订购
D. 采购
【单选题】
连队(队、站、室、所、库)集中驻防时,应当指派___。
A. 值班员
B. 领班员
C. 值日员
D. 指挥员
【单选题】
班务会,每周召开___次,由班长主持,星期日晚饭后进行,一般不超过1小时,主要是检查小结一周的工作。
A. 4
B. 3
C. 2
D. 1
【单选题】
军人大会,___或者一个工作阶段召开1次,由连队(队、站、室、所、库)首长主持,全体军人参加。
A. 每周
B. 每月
C. 每季度
D. 每半年
【单选题】
“三分”是区分携行、运行、___
A. 前行
B. 留守
C. 留用
D. 后留
【单选题】
严格按照比例控制请假外出人数。休息日和节假日连队(队、站、室、所、库)外出人员占现有人数的比例:内地驻防部队一般不超过___。
A. 10%
B. 15%
C. 20%
D. 23%
【单选题】
军人直系亲属来队通常在部队招待所或者家属临时来队住房留住,留住时间:配偶一般不超过45日,其他直系亲属一般不超过___日。
A. 3
B. 5
C. 8
D. 10
【单选题】
享受伙食灶别的军官和士官,除探亲(休假)和家属来队自行起伙可以分别退伙不超过___外,不得退伙。
A. 2个月
B. 1个月
C. 半个月
D. 20天
【单选题】
参与赌博,为赌博活动提供场所或者其他便利条件,给予___处分。
A. 严重警告
B. 警告或严重警告
C. 严重警告或记过
D. 记过或记大过
【单选题】
队列指挥通常用___。
A. 口令
B. 呼令
C. 号令
D. 通令
【单选题】
对拒不履行职责、不起骨干作用,经批评教育不改的士官,可以实施___。
A. 纪律处分
B. 留用察看
C. 教育批评
D. 专人帮带
【单选题】
士官留用察看时间,一般不超过___个月。
A. 3
B. 4
C. 5
D. 6
【单选题】
被实施留用察看的士官,留用察看___仍不改正错误的,给予相应纪律处分。
A. 期间
B. 期中
C. 期满
D. 期后
【单选题】
军人外出,必须___,履行审批手续,按时归队销假;未经领导批准不得外出。
A. 请示报告
B. 申请
C. 说明原因
D. 按级请假
【单选题】
中国人民解放军军人,不论职位高低,在政治上一律平等,相互间是___关系。
A. 同志
B. 同事
C. 朋友
D. 战友
【单选题】
人应当配套穿着军服,佩带___、级别资历章(勋表)等标志服饰,做到着装整洁庄重、军容严整、规范统一。
A. 军衔
B. 标志
C. 臂章
D. 正装服饰
【单选题】
交接班和换班时,如果发生意外情况,以___为主进行处置,待处置完毕再交接班或者换班。
A. 值班人员
B. 交班人员
C. 接班人员
D. 领班员
【单选题】
节日战备前,各级应当组织___和战备检查,制定战备方案,修订完善应急行动方案,落实各项战备保障措施。
A. 战备教育
B. 战备工作
C. 战备演习
D. 战备计划
【单选题】
值班人员因事离开值班岗位时,必须有___,并将自己所去的地点和时间,报告上级值班员或者首长。
A. 代理人
B. 代班人
C. 代班员
D. 值班员
【单选题】
营门卫兵,应当检查出入营门人员的和军容风纪;指引外来人员到传达室办理登记手续;维护营门秩序,调整指挥机动车辆出入营门;根据需要检查人员携带___和车辆运载的物品;发现重要情况及时报告。
A. 证件
B. 身份证件
C. 身份证
D. 士兵证
【单选题】
卫兵每日执勤时间累计不得超过___小时。
A. 5
B. 7
C. 8
D. 10
【单选题】
点验是对部队编制、实力、战备和安全状况的全面清点和检验。旅<团>级单位每年应当进行___次点验。
A. 1至2
B. 2至3
C. 3至4
D. 4至5
【多选题】
军人敬礼分为___。
A. 举手礼
B. 注目礼
C. 举枪礼
D. 鞠躬礼
【多选题】
军人之间通常称___。
A. 军衔加职务
B. 职务
C. 姓加职务
D. 职务加同志
【多选题】
以下哪些时机和场合军人应当敬礼?___
A. 卫兵交接班时
B. 进见首长时
C. 同级因事接触时
D. 参加集体活动被介绍时
【多选题】
下列违反条令的行为有___。
A. 购买标志服饰
B. 仿制标志服饰
C. 拆改军服
D. 将军服出借给地方单位和人员
【多选题】
符合夏作训服着装的要求有___。
A. 扣紧上衣第一粒钮扣
B. 通常不扣上衣第一粒钮扣
C. 可以将衣袖上卷
D. 不可以将衣袖上卷
【多选题】
以下不符合条令规定的行为是___。
A. 着印有不文明图案、文字的便服
B. 将摘下标志服饰的军服作便服穿着
C. 女军人怀孕期间着便服
D. 非因公外出着便服
【多选题】
下列哪些不符合内务条令对军人举止的要求___。
A. 袖手、背手和将手插入衣袋
B. 精神振作
C. 边走边吸烟、吃东西、扇扇子
D. 搭肩挽臂
【多选题】
操课结束后,要组织___。
A. 检查装备
B. 清理现场
C. 集合整队
D. 进行讲评
【多选题】
连队值班员通常由___轮流担任。
A. 军官
B. 士官
C. 战士
D. 非现役文职人员
【多选题】
值班部(分)队换班时间,由___级以上单位首长规定。
A. 连
B. 旅
C. 团
D. 营
【多选题】
根据___周密部署警卫任务。
A. 上级指示
B. 警卫目标的性质
C. 驻地情况
D. 警卫目标的数量
推荐试题
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive