【填空题】
25. ___ 是当今世界的时代主题, ___成为主要战争形态。
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
和平与发展|局部战争
解析
暂无解析
相关试题
【填空题】
27.20世纪80年代末、90年代初,随着东欧剧变和苏联解体,持续近半个世纪的冷战格局被打破。 “___ ” 是当前乃至今后相当长时期内世界主要战略力量对比的总体态势和总体特征。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
推荐试题
【单选题】
带电作业工具的有效绝缘长度是指___。
A. 工具的全长
B. 绝缘工具握手标志至带电体之间的距离
C. 绝缘工具握手标志至前端金属件之间的长度
D. 绝缘工具握手标志至前端金属件之间的距离并扣除中间金属接头长度
【单选题】
在对10kV梅子垭线54#杆绝缘子串进行绝缘包裹时,包裹的顺序是___。
A. 先导线再耐张线夹然后横担最后绝缘子串
B. 先导线再耐张线夹然后绝缘子串最后横担
C. 先横担再绝缘子串然后导线最后耐张线夹
D. 先横担再绝缘子串然后耐张线夹最后导线
【单选题】
进行带负荷更换柱上开关作业过程中,工作负责人张XX在监护过程中说法正确的是___。
A. 低头接打电话
B. 协助其他工作人员传递工器具
C. 多角度多方位全过程监护绝缘斗内人员行为
D. 可以临时离开现场
【单选题】
带电作业前,工作负责人张XX要求李XX应使用不小于16㎜²的软铜线对绝缘斗臂车车体进行接地,临时接地体的地下深度不小于___。
A. 0.3m
B. 0.4m
C. 0.6m
D. 0.8m
【单选题】
带负荷更换柱上开关作业,工作负责人张XX确认绝缘引流线安装到位需要斗内电工张XX测量绝缘引流线和柱上开关两部分___。
A. 电压相等
B. 电流基本相等
C. 电流差额较大
D. 电压差额较大
【单选题】
在10kV配电线路上,使用高架绝缘斗臂车采用绝缘手套作业法作业,通过人体的电流有两个回路,其中电阻回路为___。
A. 接地体→人体→绝缘体→带电体
B. 带电体→绝缘体→人体→绝缘体→接地体
C. 接地体→人体→带电体
D. 接地体→绝缘体→人体→带电体
【单选题】
1作业现场使用溶剂擦拭绝缘材料表面的脏污后,___。
A. 可直接投入使用
B. 预防性试验合格后投入使用
C. 在空气中暴露15min后使用
D. 在空气中暴露24h后使用
【多选题】
在进行10kV明清街线北门#4台区支线#0-#9杆更换导线工作时___对有触电危险、检修(施工)复杂容易发生事故的工作,应增设专责监护人,并确定其监护的人员和范围。
A. 蒋××
B. 宋××
C. 田××
D. 李××