【单选题】
管理方格理论中,领导者既关心人又关心工作的领导方式是()
A. 团队型管理
B. 贫乏型管理
C. 乡村俱乐部型管理
D. 任务型管理
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
把组织变革分为渐进式变革和激进式变革的划分依据是()
A. 但工作的对象不同
B. 按变革的程度与速度不同
C. 但变革的侧重不同
D. 组织所处的经营环境不同
【单选题】
根据人的能力或素质不同,去安排不同要求的工作是遵循管理中的()
A. 因事择人原则
B. 用人所长原则
C. 人事动态平衡原则
D. 统一指挥原则
【单选题】
亚当斯密提出了()假设
A. 社会人
B. 经济人
C. 自我实现人
D. 复杂人
【单选题】
永久性,非自愿的终止合同属于解聘中的()
A. 临时解聘
B. 自然减员
C. 解雇
D. 调整岗位
【单选题】
组织文化特征中的(),是指每个组织中都有其组织文化是由不同的国家,和民族不同地域,不同的时代背景,及不同的行业特征所形成的
A. 超个体的独特性
B. 相对稳定性
C. 融合继承性
D. 发展性
【单选题】
(),道德观认为能给行为所及的大多数人带来最大利益的行为才是善的
A. 功利主义
B. 权力至上
C. 公平公正
D. 社会契约
【单选题】
把决策分为集体决策与个人决策的依据是决策的()
A. 重要性
B. 主体
C. 起点
D. 环境因素的可控程度
【单选题】
由外部或内部的审计人员对管理政策以及绩效进行评估的审计为()
A. 外部审计
B. 内部审计
C. 管理审计
D. 经营审计
【单选题】
后人认为管理过程学派的创始人是()
A. 泰罗
B. 法约尔
C. 梅奥
D. 巴纳德
【单选题】
管理者在对发现的机会进行投资时所扮演的角色是()
A. 企业家
B. 冲突管理者
C. 资源分配者
D. 谈判者
【单选题】
计划,组织,指挥,协调,控制均是管理的()
A. 管理的功能
B. 管理的职能
C. 管理的特性
D. 管理的基本手段
【单选题】
梅奥对其领导的霍桑实验进行总结,认为工人是()
A. 经济人
B. 社会人
C. 理性人
D. 复杂人
【单选题】
为了提高劳动生产率,泰罗实行了()
A. 平均奖金制
B. 差别计件工资制
C. 平均工资制
D. 计件工资制
【单选题】
道德的本质是()
A. 个人的价值观
B. 规则或原则
C. 社会契约
D. 不成文的法律
【单选题】
当全球一体化的压力高,当地化反应的压力低时,跨国企业将采取()竞争策略
A. 多国模式
B. 国际模式
C. 跨国模式
D. 全球模式
【单选题】
有关活动尚未进行,从而环境未受到影响的情况下作出的决策是()
A. 长期决策
B. 战术决策
C. 初始决策
D. 程序化决策
【单选题】
要使目标可以考核,一个途径是()
A. 控制目标数量
B. 目标量化
C. 加大目标的可接受性
D. 加强目标网络的建设
【单选题】
人力资源的需求量主要是根据()来确定
A. 来应聘人员的优秀程度
B. 上级人员的优秀程度
C. 职务的数量和类型
D. 工作的难易程度
【单选题】
领导的本质是()
A. 权力的运用
B. 被领导者和追随者的服从
C. 领导者的个人魅力
D. 领导者职位的高低
【单选题】
激励的对象主要是()
A. 组织目标
B. 组织范围内的员工或领导对象
C. 员工的需要
D. 组织范围内的员工的利益
【单选题】
日本企业发明的准时库存系统,其目标是()
A. 减少库存成本
B. 对库存进行定量控制
C. 转嫁库存风险
D. 实现零库存
【单选题】
当必须对重大事件或者紧急事件进行迅速处理时,可采用()策论
A. 回避
B. 迁就
C. 强制
D. 妥协
【单选题】
()是企业的流动资产与流动负债之比。
A. 速动比率
B. 流动比率
C. 负债比率
D. 盈利比率
【单选题】
某领导事必躬亲,但领导效果不佳,就说明他()
A. 需要提高自己的领导能力
B. 缺乏现代办公设施
C. 不了解过度集权的弊端
D. 不清楚锻炼身体的重要性
【单选题】
管理的首要职能是()
A. 组织
B. 计划
C. 控制
D. 领导
【单选题】
组织外部环境的类型是多样的,其中不确定性最高也是最为复杂的环境状态是()
A. 复杂稳定
B. 复杂动态
C. 简单稳定
D. 简单动态
【单选题】
法约尔提出的组织中平级间的横向沟通被称为()
A. 等级原则
B. 协商原则
C. 跳板原则
D. 秩序原则
【单选题】
要想避免多头领导和多头指挥,必须做好()工作
A. 计划
B. 组织
C. 领导
D. 控制
【单选题】
在决策政策指导矩阵方法中,对于区域1和区域4的活动方向选择()
A. 优先发展
B. 不断强化
C. 缓慢退出
D. 尽快放弃
【单选题】
为保证总体战略目标的实现作出的,指在解决局部重要问题的决策是
A. 战略决策
B. 管理决策
C. 业务决策
D. 程序化决策
【单选题】
管理的二重性是指()
A. 艺术性与科学性
B. 基础性与边缘性
C. 自然属性与社会属性
D. 普遍性与重要性
【单选题】
保证在组织中事事有人做属于管理的()职能
A. 计划
B. 组织
C. 领导
D. 控制
【单选题】
针对欧美国家对我国纺织品配额限制,某公司决定在北非投资设立子公司,这种决策属于()决策
A. 管理
B. 战略
C. 业务
D. 程序化
【单选题】
某公司一位年轻人工作非常突出,同时也取得了高于同行业平均水平的薪资,但他仍未感到满意,这种现象可用何种激励理论可以解释?
A. 期望理论
B. 公平理论
C. 需要层次理论
D. 强化理论
【单选题】
某商场决定进行工资改革,售货员的工资由原来的固定工资改为按其所完成的销售额的一定比例公工资,从而达到激励员工的效果,这项改革利用了()
A. 双因素理论
B. 期望理论
C. 公平理论
D. 强化理论
【单选题】
通常存在于参与的民主的组织环境中的沟通方式是()
A. 自上而下的信息沟通
B. 自下而上的信息沟通
C. 横向的信息沟通
D. 交叉的信息沟通
【单选题】
有效管理的关键是()
A. 决策正确
B. 职工参与
C. 公平公正
D. 分工合理
【单选题】
现代管理的核心是()
A. 使人性得到最完美的发展
B. 用户角度出发
C. 服务于人
D. 适度分权
【单选题】
管理原理要想在管理实践中发挥作用,必须通过()
A. 管理方法
B. 管理哲学
C. 管理价值
D. 管理文化
【单选题】
工作轮换包括()
A. 管理工作轮换与非管理工作轮换
B. 管理工作轮换与员工工作轮换
C. 业务工作轮换与技术工作轮换
D. 生产工作与管理工作轮换
推荐试题
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key