【填空题】
46.天基武器系统主要指攻击对方航天器用的卫星和卫星平台,包括 ___ 、 ___和___ 等。
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
反卫星卫星|动能器平台|定向能武器平台
解析
暂无解析
相关试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
推荐试题
【单选题】
患者男性,9岁,上呼吸道感染后不久发现臀部和下肢皮肤分批出现瘀点.瘀斑,大小不等,呈紫红色,高出皮面。1周后又出现血尿.蛋白尿.管型尿。医院检查血小板计数.出血时间和凝血时间均正常。患儿可能患了___
A. 血友病
B. 白血病
C. 过敏性紫癜
D. 弥漫性血管内凝血
E. 特发性血小板减少性紫癜
【单选题】
某男性青年突然发热,体检除显著贫血貌外,其余无特殊阳性体征发现。实验室检查示外周血象见全血细胞减少,网织红细胞明显减少;骨髓象提示骨髓增生低下。该患者最可能的诊断是___
A. 白血病
B. 缺铁性贫血
C. 再生障碍性贫血
D. 巨幼细胞贫血
E. 脾功能亢进
【单选题】
女性患者,头昏.乏力.面色苍白1年余,体检除贫血貌外,其余均无异常。血常规示:血红蛋白75g/L,红细胞2.5×10_TagUpStart_12_TagUpEnd_/L,白细胞4.0×10_TagUpStart_9_TagUpEnd_/L,网织红细胞0.06。肝.肾功能正常,血清铁降低,总铁结合力增高。追问病史,患者常有月经过多。该患者最可能的诊断是___
A. 再生障碍性贫血
B. 缺铁性贫血
C. 巨幼细胞贫血
D. 肾性贫血
E. 溶血性贫血
【单选题】
某急性白血病患者化疗期间,由于大量白血病细胞被杀灭,血液中尿酸浓度明显增高。一旦发生尿酸性结石梗阻尿路时,护理人员可直接观察到的征象是___
A. 大量蛋白尿
B. 大量混浊尿
C. 少尿或无尿
D. 酱油色尿
E. 金黄色尿
【单选题】
缺铁性贫血的特征性表现为___
A. 皮肤.粘膜苍白
B. 头晕.耳鸣.眼花.记忆力减退.注意力不集中.嗜睡
C. 体力活动后气短.心悸
D. 食欲不振.恶心.腹胀
E. 皮肤干燥.皱缩,毛发干枯.易脱落,反甲,指甲薄脆易裂
【单选题】
某女性青年患特发性血小板减少性紫癜,经常出血不止,经泼尼松治疗6个月,症状无好转,最近出血更为严重,应选用下列哪项治疗措施为妥___
A. 改用地塞米松治疗
B. 大量血浆置换术
C. 输血小板悬液
D. 应用免疫抑制剂
E. 做脾切除
【单选题】
白血病患者化疗期间护理,下列哪项不正确___
A. 药液必须新鲜配制
B. 注射时不可溢于血管外
C. 注射速度不宜过快
D. 应饭后1小时用药
E. 用药期间定时检查白细胞数
【单选题】
对一突然出现高热.衰竭和(或)出血症状的患者,伴有下列哪一项表现最有助于急性白血病的诊断___
A. 肝.脾肿大
B. 皮肤结节
C. 头痛.呕吐
D. 胸骨下段压痛
E. 齿龈肿胀
【单选题】
患者男性,37岁,近几个月来间歇性发热,几乎每个月1次,且高热。全身乏力,盗汗.体重有所减轻,左侧胸部疼痛。经医院检查:左侧颈部和锁骨上均有淋巴结肿大,胸部有带状疱疹。淋巴结活检证实为霍奇金病Ⅱ期。宜首选下列哪一项治疗 ___
A. 化学治疗
B. 放射治疗
C. 免疫治疗
D. 中药治疗
E. 手术治疗
【单选题】
关于骨髓穿刺术后护理的叙述,一般不需要___
A. 术后当天不要沐浴
B. 拔针后加压3~5分钟
C. 术后去枕平卧24小时
D. 保持局部干燥防止感染
E. 观察穿刺处有无出血
【单选题】
患者女性,48岁,农民,有慢性萎缩性胃炎病史,经常腹泻,长期偏食,基本只吃素食。近1年来疲乏无力.食欲不振.头晕.心悸.气短.腹胀,人渐趋消瘦,易怒和健忘。体检发现舌炎.舌质绛红呈牛肉舌,肝脾轻度肿大,全身轻度水肿。首先应拟 ___
A. 溶血性贫血
B. 缺铁性贫血
C. 珠蛋白生成障碍性贫血
D. 巨幼细胞性贫血
E. 再生障碍性贫血
【单选题】
女性患者,24岁,贫血1年。血常规示:血红蛋白80g/L,红细胞3×10_TagUpStart_12_TagUpEnd_/L,网织红细胞0.007,白细胞.血小板正常。经口服铁剂治疗7天后,血红蛋白不升,网织红细胞为0.043。该患者最可能的诊断是___
A. 溶血性贫血
B. 再生障碍性贫血
C. 巨幼细胞贫血
D. 缺铁性贫血
E. 脾功能亢进