【多选题】
垄断资本主义条件下经济迅速发展和停滞两种趋势的根源在于___
A. 垄断统治
B. 资本输出
C. 国家垄断资本主义的产生
D. 对技术进步的阻碍
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
A
解析
暂无解析
相关试题
【多选题】
资本主义国家的福利制度___
A. 提高了劳动者的实际工资
B. 表明资产阶级同劳动人民的利益是一致的
C. 减轻了对雇佣劳动者的剥削
D. 没有减轻对雇佣劳动者的剥削,是羊毛出在羊身上
【多选题】
国家垄断资本主义使生产、资本、管理社会化程度空前提高这表明___
A. 为由资本主义向社会主义过渡准备了最充分的物质基础
B. 经济危机彻底得以消除
C. 资本主义基本矛盾得到解决
D. 资本主义制度具有生命力
【多选题】
资本主义经济政治发展不平衡决定了社会主义革命只能___
A. 在发达资本主义国家首先取得胜利
B. 在所有资本主义国家同时取得胜利
C. 在一国或几国首先取得胜利
D. 在所有不发达资本主义国家同时取得胜利
【多选题】
资本主义积累过程发展的历史趋势是___
A. 缓和并最终解决资本主义的基本矛盾
B. 社会主义取代资本主义
C. 全世界同时建立生产资料公有制;
D. 全世界都进入资本主义制度
【多选题】
解决资本主义基本矛盾的唯一途径是___
A. 用垄断代替自由竞争
B. 用国家垄断资本主义代替私人垄断资本主义
C. 用国际垄断代替国家垄断资本主义
D. 用社会主义制度代替资本主义制度
【多选题】
经济全球化带给发展中国家的消极影响有许多,但不包括___
A. 经济发展受到一定程度的损失
B. 在国际贸易关系中剩余价值大量流失
C. 金融风险加大
D. 经济发展机会大大减少
【多选题】
国家垄断资本主义对经济的干预___
A. 从根本上改变了垄断资本主义国家的阶级矛盾
B. 改变了资本主义私有制的性质
C. 使资产阶级和工人阶级形成了利益一致
D. 没有改变劳动者被剥削的地位
【多选题】
国家垄断资本主义的局限性在于___
A. 使垄断资本主义存在着时而迅速发展时而停滞的趋势
B. 使垄断资本主义经济长期处于停滞状态
C. 使垄断资本主义经济长期处于滞胀状态
D. 它只能暂时使某些矛盾缓和,但却使这些矛盾加深和复杂化
【多选题】
垄断是___
A. 在自由竞争和生产集中基础上发展起来的
B. 帝国主义的经济实质
C. 资本主义大企业或企业联合控制一个或几个部门的生产和市场
D. 帝国主义最基本的经济特征
E. 造成帝国主义寄生性或腐朽性的根本原因
【多选题】
垄断价格是___
A. 资本家可以获得超额利润的价格
B. 垄断组织凭其垄断地位规定的一种市场价格
C. 由垄断高价和垄断低价构成的
D. 保证垄断利润的主要手段
E. 遵循“价格领头制”原则制定的
【多选题】
垄断高价和垄断低价并不否定价值规律,因为___
A. 垄断价格只是使价值规律改变了表现形式
B. 按垄断低价买卖的行为,仍然是等价交换
C. 从整个社会看,商品的价格总额和价值总额是一致的
D. 垄断高价是把其他商品生产者的一部分利润转移到垄断高价的商品上
E. 垄断高价和垄断低价不能完全离开商品的价值
【多选题】
垄断时期竞争的特点主要是___
A. 目的是获得垄断高额利润
B. 手段更加多样化
C. 范围涉及政治领域
D. 程度更加激烈
E. 后果造成社会劳动的浪费和引起帝国主义战争
【多选题】
垄断利润来自___
A. 垄断企业雇佣工人创造的剩余价值
B. 通过高价出售消费品,把消费者的一部分收入转化为垄断利润
C. 资产阶级国家对国民收入作有利于垄断资本家的再分配
D. 通过向非垄断企业低价购买生产资料,占有它们的一部分利润
E. 通过国际不等价交换,占有其他国家人民创造的一部分价值
【多选题】
当代资本主义国家的宏观调控___
A. 避免了经济危机
B. 在一定程度上削平经济高涨时的尖峰,垫起经济萧条时的低谷
C. 减弱了经济周期的震荡
D. 仅仅是治标的办法
E. 从根本上解决了资本主义经济周期中各种内的、深刻的矛盾
【多选题】
第二次世界大战后,随着科技进步和新产业革命的发展,国际分工出现的新特点有___
A. 部门间的国际分工发展为更多的部门内部的国际分工
B. 传统的以自然资源为基础的分工,发展为更多的以科技成果为基础的分工
C. 以“技术密集、资本密集、劳动密集”产业划分的分工格局日益突出
D. 参加国际分工的国家类型发生了变化
E. 垂直型的国际分工发展为水平型的国际分工
【多选题】
垄断条件下资本输出的必然性在于___
A. 资本输出是帝国主义的本质要求和特征
B. 资本输出使经济落后国家经济畸形化
C. 垄断统治在国内出现大量过剩资本
D. 经济落后国家是帝国主义国家的附庸
E. 许多经济落后国家卷入资本主义世界市场
【多选题】
资本输出的后果表现在___
A. 使经济落后国自然经济瓦解和资本主义经济发展
B. 使经济落后国经济畸形化和依赖性增强
C. 使经济落后国政治上从属于帝国主义国家
D. 引起资本输出国在一定程度上经济发展的停滞
E. 引起帝国主义国家之间矛盾加剧
【多选题】
对于输入国来说,资本输出___
A. 促进了输入国自然经济的瓦解和商品经济的发展
B. 带动输入国建设了一些经济发展所必需的基础设施
C. 对输入国民族经济的发展没有任何益处
D. 给输入国带来一系列社会经济问题
E. 有可能造成输入国经济片面畸形发展
【多选题】
对于输出国来说,资本输出___
A. 为过剩资本找到了出路,并带来巨额利润和利息
B. 是输出国控制输入国的重要手段
C. 是输出国扩大商品出口的主要手段
D. 强化了金融资本在世界上的统治地位
E. 使输出国成为食利国并导致输出国国内经济发展缓慢
【多选题】
跨国公司___
A. 是对外直接投资,在国外设立子公司或分支机构的大型垄断企业
B. 从事跨国生产、销售或金融等各种经营活动
C. 以获取高额垄断利润为目的
D. 是战后国际垄断组织的主要形式
E. 是经济全球化的必然要求
【多选题】
第二次世界大战后跨国公司的迅速发展___
A. 是产业资本国际化的必然要求
B. 是垄断大资本对外扩张和掠夺的工具
C. 成为国际垄断组织的主要形式
D. 是攫取高额垄断利润的需要
E. 是资本输出的需要
【多选题】
近二、三十年贸易全球化加快发展的原因是___
A. 世界资本市场和国际金融体系大发展
B. 各国间产业分工的深化使产品交流的必要性大大增加
C. 高效率、大批量生产要求扩大国际贸易规模
D. 人们生活水平提高增加了对各国产品的需求
E. 更便捷更灵活的国际贸易方式的发现
【多选题】
促进资本全球化的因素包括___
A. 经济结构变化引起资本的国际流动
B. 跨国公司的发展及其投资的增加
C. 国家垄断资本主义的发展及国家垄断资本的增加
D. 贸易保护主义政策的放宽
E. 发展中国家为了发展本国经济大量吸引外资
【多选题】
经济全球化___
A. 与民族经济利益是对立的
B. 会威胁到民族社会的凝聚力和认同
C. 要求世界各国进行密切的分工合作
D. 要求不要保护民族和国家的经济利益
E. 要求提高民族和国家自身的竞争力
【多选题】
资本主义经济政治发展不平衡导致社会主义革命___
A. 可能在一切资本主义国家同时取得胜利
B. 可能在资本主义最发达国家取得胜利
C. 肯定在发达资本主义国家同时取得胜利
D. 只能在垄断资本主义统治链条最薄弱环节取得胜利
E. 只能在一个或几个资本主义国家首先取得胜利
【多选题】
社会主义取代资本主义将是一个长期的历史过程,这是由于___
A. 资本主义基本矛盾的运动具有复杂性和曲折性
B. 资本主义生产关系的调整,在一定程度上还能容纳生产力继续发展
C. 资本主义已经积累了雄厚的经济实力和丰富的统治经验
D. 资本主义经济和政治发展不平衡规律的作用
E. 社会主义制度的巩固和完善需要一个历史过程
【多选题】
垄断价格的形成和垄断利润的产生表明___
A. 价值规律不再起作用了;
B. 价值规律的作用受到了限制;
C. 价值规律的作用形式发生了变化;
D. 价值规律的内容发生了变化
推荐试题
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management