【多选题】
对于违纪行为所获得的经济利益,应当 。___
A. 收缴
B. 罚款
C. 责令退赔
D. 责令退回
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
AC
解析
暂无解析
相关试题
【多选题】
对属于上级纪检监察机关受理的检举控告, 。___
A. 不得瞒报、漏报、迟报
B. 不得扩大知情范围
C. 不得复制、摘抄反映上级纪检监察机关受理范围的内容
D. 不得将有关信息录入信访管理系统
【多选题】
根据《监察法》第十五条的规定,除了公务员和参照公务员法管理的人员,法律、法规授权或者受国家机关依法委托管理公共事务的组织中从事公务的人员以外,以下还有哪些人员属于监察对象___。
A. 国有企业管理人员
B. 公办的教育、科研、文化、医疗卫生、体育等单位中从事管理的人员
C. 基层群众性自治组织中从事管理的人员
D. 其他依法履行公职的人员
【多选题】
以下哪些不属于纪检监察信访举报部门的受理范围___。
A. 对党风廉政建设和反腐败工作的批评建议。
B. 依法已经、正在、应当通过诉讼、仲裁、行政裁决、行政复议等途径解决的
C. 依照有关规定,属于其他机关或者单位职责范围的
D. 仅列举违纪、职务违法犯罪行为名称,无实质内容的检举控告
【多选题】
《监察法》第六十条第一款规定:监察机关及其工作人员有下列行为之一的,被调查人及 有权向该机关申诉:___。
A. 留置法定期限届满,不予以解除的
B. 查封、扣押、冻结与案件无关的财物的
C. 应当解除查封、扣押、冻结措施而不解除的
D. 贪污、挪用、私分、调换以及违反规定使用查封、扣押、冻结的财物的以及其他违反法律法规、侵害被调查人合法权益的行为
【多选题】
以下哪几类人员从事、参与营利性活动谋取利益可以由监察机关依法调查?___
A. 公办学校的校长、副校长
B. 科研院所的院长、所长
C. 公立医院的院长、副院长
D. 事业单位普通职工(非中共党员)
【多选题】
纪检监察机关应当力戒 ,不断提高思想政治水平和把握政策能力,建设让党放心、人民信赖的纪检监察干部队伍。___
A. 形式主义
B. 官僚主义
C. 特权思想
D. 口大气粗
E. 颐指气使
【多选题】
纪检监察机关建立的党员领导干部廉政档案,主要包括哪些内容。___
A. 任免情况、人事档案情况、因不如实报告个人有关事项受到处理的情况等
B. 巡视巡察、信访、案件监督管理以及其他方面移交的问题线索和处置情况
C. 开展谈话函询、初步核实、审查调查以及其他工作形成的有关材料
D. 党风廉政意见回复材料
【多选题】
下面哪些涉嫌违纪或者职务违法、职务犯罪问题线索应及时移交纪检监察机关案件监督管理部门统一办理。___
A. 审计机关发现的相关问题线索
B. 监督检查部门、审查调查部门、干部监督部门发现的,不属于本部门受理范围的相关问题线索
C. 巡视巡察工作机构发现的相关问题线索
D. 司法机关发现的相关问题线索
【多选题】
国家监察委员会组织协调有关方面加强与有关国家、地区、国际组织在以下领域的合作。___
A. 反腐败执法
B. 引渡
C. 司法协助
D. 被判刑人的移管
E. 资产追回
F. 信息交流
【多选题】
纪检监察机关追逃人员范围包括。___
A. 监察对象
B. 在职务犯罪案件中,已立案调查的涉嫌行贿犯罪的涉案人员
C. 在职务犯罪案件中,已立案调查的涉嫌共同犯罪的涉案人员
D. 经济犯罪案件中的涉案人员
【多选题】
对属于下级纪检监察机关受理的检举控告,信访举报部门应当定期开展受理办理情况监督检查,对 的典型问题,可以交办、督办,推动下级纪检监察机关落实责任。___
A. 反映强烈
B. 内容具体
C. 实名举报
D. 扬言自杀
【多选题】
泄露、扩散或者打探、窃取党组织关于 等尚未公开事项或者其他应当保密的内容的,给予警告或者严重警告处分:情节较重的,给予撤销党内职务或者留党察看处分;情节严重的,给予开除党籍处分。___
A. 干部选拔任用
B. 纪律审查
C. 巡视巡察
【多选题】
有下列行为之一的,给予警告或者严重警告处分;情节较重的,给予撤销党内职务或者留党察看处分;情节严重的,给予开除党籍处分。___
A. 对批评、检举、控告进行阻挠、压制,或者将批评、检举、控告材料私自扣压、销毁,或者故意将其泄露给他人的
B. 对党员的申辩、辩护、作证等进行压制,造成不良后果的
C. 压制党员申诉,造成不良后果的,或者不按照有关规定处理党员申诉的
D. 有其他侵犯党员权利行为,造成不良后果的
【多选题】
对“实事求是”原则理解正确的是___。
A. 对党组织和党员违犯党纪的行为,应当以事实为依据
B. 以党章、其他党内法规和国家法律法规为准绳
C. 准确认定违纪性质,区别不同情况,恰当予以处理
D. 处理违犯党纪的党组织和党员,应当实行惩戒与教育相结合,做到宽严相济
【多选题】
监察机关及其工作人员有下列行为之一的,被调查人及其近亲属有权向该机关申诉:___
A. 留置法定期限届满,不予以解除的
B. 查封、扣押、冻结与案件无关的财物的
C. 应当解除查封、扣押、冻结措施而不解除的
D. 贪污、挪用、私分、调换以及违反规定使用查封、扣押、冻结的财物的
【多选题】
处分决定作出后,纪检监察机关应当通知受处分党员所在党委(党组),抄送同级党委组织部门,并依照规定在1个月内向 宣布。___
A. 其所在党的基层组织中的全体党员;
B. 本人;
C. 本人的家属;
D. 所在社区;
E. 社会;
【多选题】
下列关于技术调查措施的说法,哪些是对的?___
A. 设区的市级以下监察机关在初步核实中不得采取技术调查措施;
B. 省级和设区的市级监委对同级党委管理的副职领导干部采取技术调查措施,由同级监委主要负责人批准后,报党委政法委主要负责人审批;
C. 县级监委和直辖市所辖区(县)监委采取技术调查措施,应当报上一级监委主要负责人批准;
D. 对同级党委管理的正职领导干部采取技术调查措施,在履行纪委、监委和党委政法委批准手续的基础上,应当报同级党委主要负责人审批;
【多选题】
根据《规则》,在初步核实阶段,核查组可以 。___
A. 与相关人员谈话了解情况;
B. 讯问;
C. 调取个人事项有关报告;
D. 查阅复制文件、账目、档案材料;
E. 进行鉴定勘验;
F. 搜查;
【多选题】
以下哪些情形需要报同级党委主要负责人审批?___
A. 采取谈话方式处理反映同级党委管理的正职领导干部的问题线索;
B. 采取函询方式处理反映同级党委管理的正职领导干部的问题线索;
C. 询问同级党委管理的正职领导干部;
D. 对已批准采取留置措施的同级党委管理的干部采取通缉措施;
【多选题】
《中国共产党廉洁自律准则》要求党员 。___
A. 廉洁从政,自觉保持人民公仆本色
B. 廉洁用权,自觉维护人民根本利益
C. 廉洁修身,自觉提升思想道德境界
D. 廉洁齐家,自觉带头树立良好家风
【多选题】
有下列行为之一,造成严重不良影响,对直接责任者和领导责任者,情节较轻的,给予警告或者严重警告处分;情节较重的,给予撤销党内职务或者留党察看处分;情节严重的,给予开除党籍处分。___
A. 贯彻党中央决策部署只表态不落实的
B. 热衷于搞舆论造势、浮在表面的
C. 单纯以会议贯彻会议、以文件落实文件,在实际工作中不见诸行动的
D. 干预和插手经济纠纷的
【多选题】
建立健全党中央统一领导,党委(党组) ,纪律检查机关 ,党的工作部门职能监督,党的基层组织 ,党员民主监督的党内监督体系。___
A. 全面监督
B. 专责监督
C. 专门监督
D. 日常监督
【多选题】
下列哪些属于党员廉洁自律规范内容是___
A. 坚持公私分明,先公后私,克己奉公。
B. 坚持崇廉拒腐,清白做人,干净做事。
C. 坚持尚俭戒奢,艰苦朴素,勤俭节约。
D. 坚持吃苦在前,享受在后,甘于奉献。
【多选题】
坚持民主集中制,严肃党内政治生活,贯彻党员 原则情况。___
A. 个人服从党的组织
B. 少数服从多数
C. 下级组织服从上级组织
D. 全党各个组织和全体党员服从党的全国代表大会和中央委员会
【多选题】
监察委员会根据《中华人民共和国监察法》和有关法律法规可以履行以下哪些职责?___
A. 对违法的公职人员依法作出政务处分决定。
B. 对履行职责不力、失职失责的领导人员进行问责。
C. 对涉嫌职务犯罪的,将调查结果移送人民检察院依法审查、提起公诉。
D. 向监察对象所在单位提出监察建议。
推荐试题
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases