【单选题】
下列属于自由王国社会状态的是 ___
A. 奴隶社会
B. 封建社会
C. 资本主义社会
D. 共产主义社会
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
D
解析
暂无解析
相关试题
【单选题】
自由王国是指人们 ___
A. 处于绝对自由的原始社会状态
B. 不再受自然规律和社会规律支配的状态
C. 允许自由竞争的资本主义状态
D. 摆脱了自然和社会关系的奴役,成为自己社会关系主人的状态
【单选题】
江泽民说:“忘记远大理想而只顾眼前,就会失去前进方向,离开现实工作而空谈远大理想,就会脱离实际。” 江泽民所说的“远大理想”是指 ___
A. 共产主义远大理想
B. 建设中国特色社会主义共同理想
C. 个人对美好生活的向往与追求
D. 个人对将来职业的向往与追求
【单选题】
科学共产主义之所以是科学,主要在于其 ___
A. 揭示了资本主义社会的基本矛盾
B. 揭示了资本主义剥削的秘密
C. 揭示了资本主义制度的腐朽性
D. 揭示了社会发展的客观规律
【单选题】
在马克思经典作家看来,社会主义是 ___
A. 资本主义社会的一个阶段
B. 资本主义社会向共产主义社会过渡过程中的一个独立的社会形态
C. 资本主义社会向共产主义社会过渡过程中可以跨越的阶段
D. 共产主义社会的一个低级阶段
【单选题】
共产主义社会的物质基础是 ___
A. 比资本主义社会高的社会生产力
B. 与发达资本主义国家相同的社会生产力
C. 远远高于以往一切社会的高度发达的社会生产力
D. 高新技术发达的生产力
【单选题】
在展望未来社会的问题上,马克思主义与空想社会主义的根本区别是 ___
A. 展望的内容是否正确
B. 展望的目的和动机是否正确
C. 有没有预见性
D. 立场、观点和方法是否科学
【单选题】
马克思主义展望未来社会的科学方法之一是 ___
A. 在科学预测的基础上指明社会发展的方向
B. 在科学预见的基础上指明社会发展的方向
C. 以科学类比的基础上指明社会发展的方向
D. 在揭示人类社会发展一般规律的基础上指明社会发展的方向
【单选题】
资本主义生产过程的二重性是指 ___
A. 生产使用价值的劳动过程和生产剩余价值的价值增殖过程
B. 转移价值的过程和创造价值的过程
C. 生产使用价值的劳动过程和生产价值的价值形成过程
D. 价值形成过程和价值增殖过程
【单选题】
分析资本主义生产过程是劳动过程和价值增殖过程的统一,关键是运用 ___
A. 商品二因素原理
B. 资本区分为不变资本和可变资本的原理
C. 资本区分为固定资本和流动资本的原理
D. 劳动二重性原理
【单选题】
价值增殖过程是超过一定点而延长了的价值形成过程,这里的“一定点”是指 ___
A. 工人补偿劳动力价值所需要的时间
B. 资本主义生产过程的起点
C. 剩余劳动时间的起点
D. 必要劳动时间的终点
【单选题】
在资本主义价值增殖过程中 ___
A. 具体劳动创造出新价值,抽象劳动转移生产资料价值
B. 抽象劳动创造出新的使用价值,具体劳动创造出新的价值
C. 具体劳动转移生产资料的价值,抽象劳动创造出大于劳动力价值的新价值
D. 具体劳动转移生产资料的价值,抽象劳动创造出相当于劳动力价值的新价值
【单选题】
某资本家的全部预付资本为100万元,其中不变资本90万元,可变资本10万元,获得剩余价值10万元,其剩余价值率为 ___
A. 100%
B. 10%
C. 12.5%
D. 11.1%
【单选题】
加快资本周转可以增加年剩余价值量,提高年剩余价值率,是因为 ___
A. 预付的资本量增加了
B. 实际发挥作用的可变资本增加了
C. 流通对生产的反作用
D. 剩余价值率提高了
【单选题】
下列提法正确的是 ___
A. 只有空想社会主义思想家预见了未来社会
B. 只有马克思主义经典作家预见了未来社会
C. 只有唯心主义思想家预见了未来社会
D. 许多思想家都预见了未来社会
【单选题】
树立和追求共产主义远大理想,要体现在积极投入建设中国特色社会主义事业的实际行动中,这应该是 ___
A. 大家都来做,大家一起做
B. 从我做起,从现在做起
C. 鼓励大家都来做
D. 号召大家一起做
【单选题】
某资本家经营的企业通过改进技术、提高劳动生产率,使其生产商品花费的劳动时间比社会必要劳动时间减少20%,由此,形成商品个别价值低于社会价值的部分是 ___
A. 超额剩余价值
B. 绝对剩余价值
C. 相对剩余价值
D. 剩余价值
【单选题】
在现代,各国一般是由政党领导国家政权的,放弃执政党在国家中的领导地位,国家性质就要改变,这是因为 ___
A. 国家性质决定政党的性质
B. 执政党的性质决定国家性质
C. 一个国家的性质通常是与其执政党的阶级属性相一致的
D. 国家和政党在本质上是一回事
【单选题】
资本是一种运动,资本循环是从 ___
A. 资本运动的实现条件方面来研究资本的运动
B. 资本运动的矛盾性方面来研究资本的运动
C. 资本运动的连续性方面来研究资本的运动
D. 资本运动的速度方面来研究资本的运动
【单选题】
产业资本循环顺次采取的三种职能形式是 ___
A. 货币资本、生产资本、商品资本
B. 货币资本、商品资本、生产资本
C. 生产资本、货币资本、商品资本
D. 商品资本、生产资本、货币资本
【单选题】
资本的周转速度 ___
A. 同周转时间成正比,与周转次数成反比
B. 同周转时间成正比,与周转次数成正比
C. 同周转时间成反比,与周转次数成反比
D. 同周转时间成反比,与周转次数成正比
【单选题】
资本主义经济危机的实质是 ___
A. 生产对于人们的需求绝对过剩
B. 生产对于人们的需求相对不足
C. 生产对于人们有支付能力的需求相对过剩
D. 生产对于人们的有支付能力的需求相对不足
推荐试题
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level