【单选题】
在Excel 2010中,下列可以实现表格行列互换的操作是___。
A. 选择后使用“格式刷”
B. 复制后使用“选择性粘贴”
C. 复制后使用“条件格式”
D. 选择后使用“套用表格格式”
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
在Excel 2010中,一个新建的Excel工作簿中一般含有___个默认工作表。
A. 1
B. 3
C. 16
D. 256
【单选题】
在Excel 2010中,如果某单元格显示为“###.###”,这表示___。
A. 公式错误
B. 格式错误
C. 行高不够
D. 列宽不够
【单选题】
在Excel 2010中,输入数字字符的文本型数据(如身份证号码、邮政编码等)时,要在数字字符前加一个英文(西文)输入状态下的___。
A. 逗号
B. 分号
C. 单引号
D. 双引号
【单选题】
在Excel 2010中,单元格区域“A3:B4”代表的单元格为___。
A. A3
B. 4 B. B3 B4
C. A3 B3 A4 B4
D. A1 A2 A3 B4
【单选题】
在Excel 2010中,在单元格中输入文字时,缺省的对齐方式___。
A. 左对齐
B. 右对齐
C. 居中对齐
D. 两端对齐
【单选题】
在Excel 2010中,使用"重命名"命令后,则下面正确的是___命令。
A. 复制
B. 改写
C. 替换
D. 粘贴
【单选题】
在Excel 2010中,若在工作表中插入一列,则一般插入在当前列的___。
A. 左侧
B. 右侧
C. 上方
D. 下方
【单选题】
在Excel 2010中,编辑栏上的“对号”表示___。
A. 取消输入
B. 确认输入
C. 编辑公式
D. 编辑文字
【单选题】
关于Excel 的描述中,错误的是___。
A. 一个Excel文件就是一张工作表
B. 一个Excel文件就是一张工作簿
C. 一个工作簿可以有多个工作表
D. 双击某个工作表标签,可以对该工作表进行重新命名
【单选题】
在Excel 2010中,错误值“#DIV/0”代表什么意思___。
A. 无法识别的数字
B. 数字有问题
C. 分母为0值
D. 字符输入太长
【单选题】
在Excel 2010工作表的单元格中输入公式时,可先输入___号。
A. =
B. &
C. @
D. %
【单选题】
在Excel 2010的图表中,水平X轴通常用来作为___。B
A. 排序轴
B. 分类轴
C. 数据轴
D. 时间轴
【单选题】
在Excel 2010中,对单元格的引用有多种,以下属于绝对引用的是___。 C
A. B1
B. B$1
C. $B$1
D. $B1
【单选题】
在Excel 2010中,进行分类汇总操作时首先应按照要分类的关键字段进行___。C
A. 筛选
B. 查找
C. 排序
D. 计算
【单选题】
在Excel 2010中,如果我们只需要数据列表的一部分时,可以使用EXCEL提供的___功能。
A. 排序
B. 自动筛选
C. 分类汇总
D. 以上全部
【单选题】
在Excel 2010中,如果A1:A5单元格的值依次为100、200、300、400、500则MAX(A1,A5)=___。
A. 600
B. 1200
C. 500
D. 1500
【单选题】
在Excel 2010中,选定一个单元格后按DEL键,将删除的是___。
A. 单元格
B. 单元格的内容
C. 单元格的内容及格式等
D. 单元格所在的行
【单选题】
在Excel 2010的数据清单中,当以“姓名”字段作为关键字进行排序时,系统可以按“姓名的___为顺序重排数据。
A. 拼音字母
B. 偏旁部首
C. 区位码
D. 笔画
【单选题】
在Excel 操作中,将单元格指针移到AB220单元格的最简单的方法是___。
A. 拖到滚动条
B. 按Ctrl+AB220键
C. 在名称框输入AB220
D. 先用Ctrl+→键移到AB列,然后用Ctrl+↓键移到220行
【单选题】
Excel 图表是动态的,当在图表中修改了数据系列的值时,与图表相关的工作表中的数据___。
A. 出现错误值
B. 不变
C. 自动修改
D. 用特殊颜色显示
【单选题】
在Excel 2010中,为单元格添加批注可以使用___选项卡中批注组的“新建批注”按钮。 C
A. 开始
B. 插入
C. 审阅
D. 视图
【单选题】
在Excel 2010中,自动筛选状态下,所选数据表的每个列名旁都对应着一个下拉菜单按钮,按动各列的该按钮可以设定各自的筛选条件,这些条件之间的关系是___。 A
A. 与
B. 或
C. 非
D. 异或
【单选题】
在Excel 2010中,迷你图是创建在___中的微型图表。B
A. 工作簿
B. 单元格
C. 工作表
D. 矩形区域
【单选题】
在PowerPoint 2010中,通过___可以在对象之间复制动画效果。
A. 格式刷
B. 动画刷
C. 在“动画”选项卡的“动画”组中进行设置
D. 在“开始”选项卡“剪贴板”组的“粘贴选项”中进行设置
【单选题】
在PowerPoint 2010中,可以利用___来组织大型幻灯片,以简化其管理和导航。
A. 占位符
B. 节
C. 视图
D. 动画刷
【单选题】
数字信号传输时,波特率是指___。
A. 每秒传送的字节数
B. 每秒传送的波形个数
C. 每秒并行通过的字节数
D. 每秒串行通过的位数
【单选题】
OSI/RM的7层结构中,处于应用层与会话层之间的是___。
A. 物理层
B. 网络层
C. 表示层
D. 传输层
【单选题】
___不属于云计算的特点。
A. 虚拟化
B. 价格便宜
C. 越大规模
D. 预定服务
【单选题】
以下不属于网络安全技术的是___。
A. 安全立法
B. 病毒防治
C. 木马检测
D. 数字签名
【单选题】
OSI/RM的7层结构中,从下往上会话层是第___层。
A. 2
B. 3
C. 4
D. 5
【单选题】
TCP/IP体系结构中,FTP协议工作在___层。
A. 应用层
B. 传输层
C. 互联网层
D. 网络接口层
【单选题】
___属于因特网接入方式。
A. DTV
B. AP
C. MTA
D. URL
【单选题】
___不是微波线路通信的特点。
A. 易受环境条件影响
B. 可传输多路电视信号
C. 传输速率比较慢
D. 只能直线传播
【单选题】
IP工作在TCP/IP体系结构的___。
A. 应用层
B. 传输层
C. 互联网层
D. 网络接口层
【单选题】
采用___协议可以查找主机www.fudan.edu.cn所对应的IP地址。 D
A. ICMP
B. FTP
C. SMTP
D. DNS
【单选题】
在因特网域名中,国际组织通常用___表示。
A. net
B. org
C. gov
D. int
【单选题】
数字信道带宽的单位是___。
A. Hz
B. bps
C. baud
D. fps
【单选题】
随着智能手机和3G、4G移动通信网络的发展,互联网业在向着___方向发展。
A. 移动购物网
B. 移动社交网
C. 广域网
D. 移动互联网
【单选题】
___是城域网的英文缩写。 B
A. LAN
B. MAN
C. WAN
D. CYW
【单选题】
以太网(Ethernet)是专用于___的技术规范。 A
A. 局域网
B. 广域网
C. 城域网
D. 物联网
推荐试题
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones