【判断题】
对反映本机关主要负责人的检举控告,直接将原件附函报送上级信访举报部门。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
对属于上级纪检监察机关受理的检举控告,必须录入信访管理系统后再将原件附函报送上级信访举报部门。
A. 对
B. 错
【判断题】
对业务范围外事项,通过来信反映的,可以不转有关部门处理。
A. 对
B. 错
【判断题】
对所辖地区、部门信访举报情况,信访举报部门应当定期分析并编写分析报告。
A. 对
B. 错
【判断题】
根据党风廉政建设和反腐败工作重点以及信访举报反映的热点问题,信访举报部门适时开展专题分析,服务重点工作的开展。
A. 对
B. 错
【判断题】
对属于下级纪检监察机关受理的检举控告,信访举报部门应当定期开展受理办理情况监督检查。
A. 对
B. 错
【判断题】
案件监督管理部门应当组织开展经常性检查和不定期抽查,发现问题及时报告并督促整改。
A. 对
B. 错
【判断题】
审查调查组成员工作期间,应当使用专用手机、电脑、电子设备和存储介质,实行编号管理。
A. 对
B. 错
【判断题】
谈话后要按程序与相关单位或者人员交接被谈话人,并做好跟踪回访工作。
A. 对
B. 错
【判断题】
纪检监察机关案件监督管理部门负责对监督执纪工作全过程进行监督管理。
A. 对
B. 错
【判断题】
上级监察机关可以办理下一级监察机关管辖范围内的监察事项,必要时也可以办理所辖各级监察机关管辖范围内的监察事项。
A. 对
B. 错
【判断题】
监察机关认为所管辖的监察事项重大、复杂,需要由上级监察机关管辖的,应当报请上级监察机关管辖。
A. 对
B. 错
【判断题】
被调查人既涉嫌严重职务违法或者职务犯罪,又涉嫌其他违法犯罪的,一般应当由监察机关为主调查,其他机关予以协助。
A. 对
B. 错
【判断题】
纪检监察机关追逃追赃和防逃工作对象是行使公权力的公职人员。
A. 对
B. 错
【判断题】
纪检监察机关新发现监察对象外逃或其他重大外逃情况,应立即核实情况并在48小时内层报至中央纪委国家监委国际合作局。
A. 对
B. 错
【判断题】
省级及以下纪检监察机关需要派人赴境外开展劝返、调查取证等工作的,报经本级纪检监察机关主要负责人同意即可。
A. 对
B. 错
【判断题】
加强党对高校的领导,加强和改进高校党的建设,是办好中国特色社会主义大学的根本保证。
A. 对
B. 错
【判断题】
《中国共产党纪律处分条例》规定,接受可能影响公正执行公务的宴请,情节较重的,给予警告或者严重警告处分;情节严重的,给予撤销党内职务或者留党察看处分。
A. 对
B. 错
【判断题】
《中国共产党问责条例》规定,对履行职责不力的党的领导干部,应当严肃批评,依规整改,并在一定范围内通报。
A. 对
B. 错
【判断题】
如有学校反复出现师德失范问题,分管校领导应向学校做出检讨,学校自行整改。
A. 对
B. 错
【判断题】
马克思主义是我们立党立国的根本指导思想,是指引我们不断夺取革命胜利、建设、改革胜利的强大思想武器。
A. 对
B. 错
【判断题】
党员如果对中央的政策有不同看法,应在坚决执行的前提下,通过党章规定的组织渠道反映,不能擅自对外发表不同意见。
A. 对
B. 错
【判断题】
党员受留党察看处分期间,没有表决权、选举权,有被选举权。
A. 对
B. 错
【判断题】
党员在国外公开发表反对党和政府的言论的,给予开除党籍处分。
A. 对
B. 错
【判断题】
纪检监察机关在维护监督执纪工作纪律方面失职失责,予以终身问责。
A. 对
B. 错
【判断题】
依法应当留置的被调查人如果在逃,监察机关在全国范围内通缉。
A. 对
B. 错
【判断题】
对被审查调查人违规违纪违法所得财物,应当依规依纪依法予以没收、责令退赔或者登记上交。
A. 对
B. 错
【判断题】
纪委监委派驻纪检监察组、纪检监察工委除执行监督执纪工作规则外,还应当执行党中央以及中央纪委相关规定。
A. 对
B. 错
【判断题】
留置时间不得超过三个月。在特殊情况下,可以延长两次,每次延长时间不得超过三个月。
A. 对
B. 错
【判断题】
携带挪用的公款潜逃的,不属于挪用公款行为,而属于贪污行为。
A. 对
B. 错
【判断题】
纪检监察干部涉嫌严重违纪或者职务违法、职务犯罪的,只追究直接责任,不追究有关领导责任。
A. 对
B. 错
【判断题】
谈话函询材料应当存入干部档案。
A. 对
B. 错
【判断题】
上级党组织对违犯党纪的党组织和党员作出的处理决定,下级党组织认为有错误的,可以暂缓执行。
A. 对
B. 错
【判断题】
立案调查决定应当向被调查人宣布,并通报相关组织。涉嫌严重职务违法或者职务犯罪的,出于调查需要,可以不通知被调查人家属。
A. 对
B. 错
【判断题】
凡报请批准立案的,应当已经掌握大部分违纪或者职务违法、职务犯罪事实和证据,具备进行审查调查的条件。
A. 对
B. 错
【判断题】
对涉嫌职务违法的被调查人立案后,应当依法进行讯问。
A. 对
B. 错
【判断题】
纪检监察机关对于线索处置、谈话函询、初步核实、立案审查调查、案件审理、处置执行中的重要问题,经集体研究后,报纪检监察机关主要负责人审批。
A. 对
B. 错
【判断题】
采取冻结、查封、扣押措施,经查明与案件无关的,应当在查明后十日内解除或者退还。
A. 对
B. 错
【判断题】
谈话函询材料必要时存入廉政档案。
A. 对
B. 错
【判断题】
纪检监察机关之间对管辖事项有争议的,由其共同的上级纪检监察机关确定;认为所管辖的事项重大、复杂,需要由上级纪检监察机关管辖的,应当报请上级纪检监察机关管辖。
A. 对
B. 错
【判断题】
初核阶段,对被核查人及相关人员主动上交的财物,核查组应当予以暂扣。
A. 对
B. 错
推荐试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity