【填空题】
26.国际战略格局演变的终极原因在于 ___ ,世界经济发展不平衡正在改变世界战
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
经济
解析
暂无解析
相关试题
【填空题】
27.20世纪80年代末、90年代初,随着东欧剧变和苏联解体,持续近半个世纪的冷战格局被打破。 “___ ” 是当前乃至今后相当长时期内世界主要战略力量对比的总体态势和总体特征。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
推荐试题
【单选题】
10:“助学贷”执行央行基准利率,贷款期限超过一年按年浮动。目前一年以内为( ),1至5年为___。
A. 4.3%、4.7%
B. 4.35%、4.75%
C. 4.75%、4.95%
D. 4.75%、4.85%
【单选题】
19: “金太阳”产品借款金额在( )万元(含)以下的,可按信用贷款方式办理;金额超过___万元的,应当提供本行认可的抵、质押或保证担保。
A. 5、10
B. 10、15
C. 5、5
D. 10、20
【单选题】
21:“二手车贷”贷款利率执行央行基准利率上浮( )%,贷款期限超过一年按年浮动。目前乘用车一年以内( )‰、一年以上___‰。
A. 30、4.713、5.15
B. 40、5.15、5.542
C. 40、5.075、5.542
D. 30、5.15、5.542
【单选题】
22:现在我行首套个人住房按揭贷款利率执行( ),非首套利率执行___。
A. 基准利率上浮30%、基准利率上浮35%
B. 基准利率上浮20%、基准利率上浮30%
C. 基准利率上浮25%、基准利率上浮35%
D. 基准利率上浮30%、基准利率上浮40%
【单选题】
7:对穿墙式ATM自助设备应___,以免受到碰伤、损坏,同时对用户办理业务起到保护密码和遮光的作用。
A. 加装监控设备
B. 对ATM交易凭条的卡号等部分号段进行屏蔽,保护卡号安全
C. 及时对ATM防伪、加密等技术进行升级或加载
D. 安装防护罩
【单选题】
11:自2016年1月29日起,我行新开立的金燕个人卡,默认开通的个人ATM转账(包括行内、跨行)单笔和日累计限额均为___。
A. 5000元
B. 2万元
C. 5万元
D. 20万元
【多选题】
6: 客户可以通过___等多种方式,得到银行提供的24小时多层次、多渠道的全天候服务,真正体会的银行服务的高效、方便和快捷。
A. 自助银行
B. 电话银行
C. 手机银行
D. 网上银行
【多选题】
7:中国银行业践行“公平对待消费者”理念,就是按照___的原则,充分履行和兑现对消费者的服务契约和书面承诺,为消费者提供文明规范服务,积极保障和维护消费者合法权益。
A. 依法合规
B. 诚实守信
C. 公开透明
D. 公平公正
E. 文明规范
【多选题】
8:个人贷款借款人的基本条件是___。
A. 具有完全民事行为能力的中国公民或符合条件的境外自然人
B. 贷款用途明确合法
C. 信用状况良好,无重大不良信用记录
D. 具备还款意愿和还款能力