【填空题】
47.中国人民解放军海军成立于___年。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
1949
解析
暂无解析
相关试题
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
推荐试题
【判断题】
金融机构现金清分中心解缴到人民银行的假币需要将伪造币和变造币分开封装。
A. 对
B. 错
【判断题】
损伤严重的外币残损券不能直接兑换,应首先进行真伪鉴定,经确定后为真币的,按残损外币收兑标准办理,在托收期内可根据客户要求代办托收,按规定收取托收费用。
A. 对
B. 错
【判断题】
金融机构收缴的外币纸币,经鉴定为真币的,由鉴定单位退还持有人:鉴定为假币的,由鉴定单位予以没收。
A. 对
B. 错
【判断题】
观察第五套人民币2005年版纸币隐形面额数字方法是将钞票置于与眼睛接近平行的位置,面对光源作上下倾斜晃动,可以看到面额数字。
A. 对
B. 错
【判断题】
观察第五套人民币1999年版纸币隐形面额数字方法是将钞票置于与眼睛接近平行的位置,面对光源作上下倾斜晃动,可以看到面额数字。
A. 对
B. 错
【判断题】
真假钞票的识别方法中的直观对比法可概括为:“眼观、手摸、耳听”三种方法。
A. 对
B. 错
【判断题】
真假钞票的识别时运用到的“眼观”,即观察票面的外观颜色、水印、安全线、胶印缩微文字、有色纤维、隐形面额数字、对印图案、号码等。
A. 对
B. 错
【判断题】
真假钞票的识别时运用到的“手摸”,即用手触摸凹印人像、行名、大面额数字、盲文面额标记等,真钞线纹光洁,凹凸感明显。
A. 对
B. 错
【判断题】
真假钞票的识别时运用到的“耳听”,是用手甩、弹、抖,使钞票纸发出声音,钞票专用纸张发出的声音清脆,与伪钞使用的民用纸张有明显不同。
A. 对
B. 错
【判断题】
办理货币存取款和外币兑换业务的金融机构可以有权没收假人民币。
A. 对
B. 错
【判断题】
办理货币存取款和外币兑换业务的金融机构可以有权收缴假人民币。
A. 对
B. 错
【判断题】
根据《中华人民共和国人民币管理条例》,中国人民银行以及由中国人民银行授权的工商银行、农业银行、中国银行、建设银行可以进行货币真伪鉴定。
A. 对
B. 错
【判断题】
所有的商业银行均可以进行货币真伪鉴定。
A. 对
B. 错
【单选题】
下列不属于消防人员基本防护装备的是___。(难)
A. 消防头盔
B. 灭火防护服
C. 封闭式防化服
D. 空气呼吸器
【单选题】
消防员可穿着___进入火焰区进行灭火救援。(中)
A. 灭火防护服
B. 封闭式防化服
C. 避火服
D. 防火防化服
【单选题】
灭火防护服使用年限一般为___年。(难)
A. 2~3
B. 15
C. 1
D. 8~11
【单选题】
下列不属于消防人员基本防护装备的是___。(难)
A. 消防头盔
B. 灭火防护服
C. 封闭式防化服
D. 空气呼吸器
【单选题】
正压式空气呼吸器气瓶的最高工作压力是___MPa。(易)
A. 20
B. 25
C. 30
D. 35
【单选题】
容积为6升,最高工作压力为30MPa的正压式空气呼吸器理论上最大使用时间是___分钟。(中)
A. 30
B. 40
C. 50
D. 60
【单选题】
通常情况下,当正压式空气呼吸器压力低于___Mpa时报警。(中)
A. 6
B. 8
C. 10
D. 12
【单选题】
正压式空气呼吸器警报器报警压力为___MPa。(易)
A. 1、4~1、6
B. 0、4~0、6
C. 8
D. 4~6
【单选题】
在狭小空间长时间作业,无法使用个人携带式空气呼吸器时,应使用___。(难)
A. 移动式供气源
B. 氧气呼吸器
C. 强式送风器
D. 过滤式防毒面具
【单选题】
空气呼吸器使用前气瓶压力不能低于___Mpa。(难)
A. 15
B. 20
C. 25
D. 30
【单选题】
在灭火战斗中,一切处置行动自始至终要严防引发爆炸,当遇有紧急情况危急参战人员的生命安全时,指挥员应果断下达___命令。(易)
A. 撤离
B. 避险
C. 掩护
D. 停止进攻
【单选题】
事故现场有易燃易爆气体或有毒有害物质扩散时,在扩散区___选择进攻路线接近扩散区。(中)
A. 上风、侧上风方向
B. 上风方向
C. 下风、侧上风方向
D. 下风方向
【单选题】
实施对高层建筑火灾扑救时,灭火进攻起点一般选择在___(易)
A. 着火层
B. 着火层下一层或下二层
C. 首层
D. 着火层上一层
【单选题】
在扑救高层建筑火灾时,战斗人员和器材集结处应位于___(易)
A. 着火层
B. 着火层下一层或下二层
C. 首层
D. 消防控制室
【单选题】
扑救高层建筑火灾从内部进攻时,水枪阵地要依托___设置。(中)
A. 防火、防烟分区
B. 承重墙
C. 疏散口
D. 窗口
【单选题】
扑救地下车库火灾时,由外部进入内部进攻,一般选择从___出入通道向内部进攻。(易)
A. 上风
B. 下风
C. 中部
D. 距火源最近
【单选题】
扑救原油罐火灾进攻有利时机是:___。(中)
A. 沸溢、喷溅之前
B. 沸溢、喷溅之时
C. 局部发生燃烧
D. 灭火剂准备充足
【单选题】
扑救有毒区域的火灾,水源的选用、水枪阵地的选择,在不影响火灾扑救效果的前提下,坚持从___方向进攻为主的原则。(易)
A. 上风
B. 下风
C. 侧上风
D. 侧下风
【单选题】
火灾中,导致玻璃幕墙爆裂的主要因素是___。(中)
A. 火焰,高温
B. 室内热气压
C. 建筑构件变形挤压
D. 玻璃自身耐热性能差
【单选题】
同一建筑物内应采用统一规格的消火栓、水枪和水带。每根水带的长度不应超过___m。(易)
A. 10
B. 15
C. 20
D. 25
【单选题】
室内消火栓、水枪、水带、消防卷盘等___。(易)
A. 应选择同一生产厂家的产品
B. 规格型号应统一
【单选题】
有一条水带干线,长度为4条Ф80mm胶里水带(每条Ф80mm胶里水带阻抗系数为0.015),当流量为10L/s时,水带串联系统的压力损失为多少104Pa。 ___( 难 )
A. 0.15
B. 0.6
C. 6
D. 15
【单选题】
有一条水带干线,长度为7条胶里水带,其中5条为Ф90mm水带,2条为Ф65mm水带(每条Ф90mm、Ф65mm胶里水带阻抗系数分别为0.008、0.035),当流量为10L/s时,水带串联系统的压力损失为多少104Pa。 ___( 难 )
A. 0.43
B. 4.3
C. 1.1
D. 11
【单选题】
某消防车利用双干线并联供带架水枪,每条干线的长度为5条Φ65mm胶里水带,带架水枪流量为10 L/s,该水带并联系统的压力损失为多少104Pa。(水带的阻抗系数为0.035) ___( 难 )
A. 3.5
B. 4.378
C. 8.5
D. 14.875
【单选题】
在消防车的最大供水高度计算时,沿楼梯铺设水带时,登高水带长度为实际供水高度的几倍。 ___( 中 )
A. 1.2
B. 1.5
C. 1.8
D. 2.0
【单选题】
楼层外部垂直铺设水带时可使用___加以固定。(中)
A. 水带挂钩
B. 水带护桥
C. 水带包布
D. 水带护套
【单选题】
在消防车的最大供水高度计算时,沿楼梯铺设水带时,登高水带长度为实际供水高度的几倍。___( 易 )
A. 1.2
B. 1.5
C. 1.8
D. 2.0