【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
光辐射|_早期核武器
解析
暂无解析
相关试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
推荐试题
【判断题】
环火是指牵引电动机正负电刷之间被强烈的大电弧所短路
A. 对
B. 错
【判断题】
牵引缓冲装置的用途是将机车与车辆连接或分离,在运行中传递牵引力,缓和及衰减牵引力与制动力的变化,具有连接、牵引和缓冲的作用
A. 对
B. 错
【判断题】
电机火花的大小程度可分为4个等级
A. 对
B. 错
【判断题】
在电机火化等级分类中的1级、1¼级 1½级均为持续运行中无害的火花
A. 对
B. 错
【判断题】
在电刷的整个边缘有强烈的火花,同时有大火花飞出。换向器上严重发黑,用汽油不能擦掉,而且电刷有烧焦和损坏的3级火花是不允许运行的
A. 对
B. 错
【判断题】
机车检查前必须遵守“先联系,后检查”的制度,并通知有关作业人员,在操纵手柄开关处挂好禁动标志
A. 对
B. 错
【判断题】
对加封的零部件(如铅封、漆封)严禁随意破封,各种保护装置不得随意变动其动作参数。各部件检查完后,必须恢复定(原)位
A. 对
B. 错
【判断题】
电力机车升弓做高压试验前,必须确认各高压室和地沟内无人后方可进行。高压试验升、降弓,必须按规定鸣笛和呼唤应答后方可进行,以保证人身安全
A. 对
B. 错
【判断题】
机车牵引电动机的悬挂形式分为架悬挂和体悬挂
A. 对
B. 错
【判断题】
牵引电动机半悬挂时,约有一半的质量支在车轴上,属于簧下质量;另一半支在构架上,属于簧上质量,所以称为半悬挂,也叫轴悬式
A. 对
B. 错
【判断题】
动力制动:依靠机车的动力机械产生的制动力,包括电阻制动、再生制动、液力制动
A. 对
B. 错
【判断题】
列车操纵示意图是以《机车操作规则》和列车运行图为依据
A. 对
B. 错
【判断题】
制动压力通过制动传动装置的传递,并增大后传给闸瓦,其增大的倍数称为制动倍率
A. 对
B. 错
【判断题】
闸瓦压力大,制动力也大。但闸瓦压力不能过大,否则使机车、车辆易产生滑行
A. 对
B. 错
【判断题】
滑行不易造成车轮踏面擦伤
A. 对
B. 错
【判断题】
防止空转和发生空转时处理办法之一是正在空转时,应立即降低牵引力,禁止撒砂
A. 对
B. 错
【判断题】
挂车前适当撒砂,列车起动前适当压缩车钩可以防止空转
A. 对
B. 错
【判断题】
机车运行中,由于弹簧的振动,动轴载荷产生不均和变化以及线路状态与线路坡道的大小等原因,均会致使机车粘着重量发生变化
A. 对
B. 错
【判断题】
制动空走距离则与制动空走时间有关和列车制动初速无关
A. 对
B. 错
【判断题】
车轮与钢轨间的冲击、振动造成的动能损失属于附加阻力
A. 对
B. 错
【判断题】
附加阻力是机车、车辆运行在某些特定条件下才能遇到的阻力
A. 对
B. 错
【判断题】
列车在曲线上运行时的阻力大于相同条件下直线上的运行阻力
A. 对
B. 错
【判断题】
列车在曲线上运行时,机车、车辆在离心力的作用下,轮缘与轨头内侧的摩擦增加
A. 对
B. 错
【判断题】
加装了切控阀的客运机车,其制动缸压力与制动管减压量的关系为:制动缸压力=1×制动管减压量
A. 对
B. 错
【判断题】
货物列车起动前压缩一部分车辆的车钩,发车时使列车中的车辆逐辆起动,再加上各车钩缓冲弹簧的伸张力,就会使列车起动变得顺利、轻便
A. 对
B. 错
【判断题】
货物列车压缩车钩后,在机车加载前,可缓解机车制动
A. 对
B. 错
【判断题】
凡是不压缩车钩能够起动的,不一定要强调压缩车钩
A. 对
B. 错
【判断题】
列车施行常用制动时,单阀缓解机车制动,每次不得超过10kPa
A. 对
B. 错
【判断题】
列车施行常用制动时,自阀减压排风未停止,不应追加减压或缓解列车制动
A. 对
B. 错
【判断题】
禁止在自阀制动保压后,将自阀手柄从制动区或保压位移向运转位(或缓解位、保持位)后,又移回制动区或保压位(牵引带有阶段缓解装置的列车除外)
A. 对
B. 错
【判断题】
使用机车动力制动,在需要缓解时,应先解除动力制动,再缓解空气制动
A. 对
B. 错
【判断题】
双机(或多机)牵引使用动力制动时,前部机车使用后,再通知后部机车依次使用;解除动力制动时,根据前部机车的通知,后部机车先解除,前部机车后解除动力制动
A. 对
B. 错
【判断题】
在正常情况下,非操纵端控制电路的各开关均应置于断开位,锁闭琴键开关,取出自阀、单阀手柄
A. 对
B. 错
【判断题】
设有双端司机室的机车,司机必须在运行方向前方司机室操纵
A. 对
B. 错
【判断题】
施行紧急制动时,要及时解除机车牵引力
A. 对
B. 错
【判断题】
列车在长大下坡道运行时,应遵循动力制动为主,空气制动为辅的原则
A. 对
B. 错
【判断题】
列车在隧道区段运行时,运行条件差,瞭望困难,内燃机车柴油机燃烧状态不良,功率不能正常发挥,油耗增加
A. 对
B. 错
【判断题】
为防止列车断钩,运行途中制动调速,严禁未排完风施行缓解,列车未完全缓解就加速
A. 对
B. 错
【判断题】
为防止列车断钩,运行途中货物列车惰力运行后,再加速不得过快,避免车钩拉伸过猛
A. 对
B. 错
【判断题】
为防止列车断钩,进站停车时货物列车要防止低速缓解、二次制动
A. 对
B. 错