【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
光辐射|_早期核武器
解析
暂无解析
相关试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
推荐试题
【多选题】
团体辅导的功能主要有___
A. 教育功能;
B. 发展功能;
C. 预防功能;
D. 矫正功能
【多选题】
108,大学校园文化的激励功能是通过下列哪几个方面实现的?___
A. 心理满足与激励;
B. 物质奖励与激励;
C. 精神嘉奖与激励;
D. 行为强化与激励
【多选题】
大学生要学会品德修养的一些常用方法,如___
A. 启发诱导法;
B. 学思并重法;
C. 省察克治法;
D. 积善成德法
【多选题】
弗鲁姆提出的期望理论认为,激发力量是由以下因素构成的___
A. 认知因素;
B. 目标效价;
C. 期望值;
D. 情感因素
【多选题】
111,一般认为,大学生品德形成与发展的影响因素主要有下下几个方面:表现性因素、知识性因素、___
A. 生成性因素:
B. 组织性因素;
C. 专业性因素;
D. 大学生个体性因素
【多选题】
为改变重知识传授轻能力培养的大学课堂,教学方法可以采用___
A. 问题式教学;
B. 案例式教学;
C. 问答式教学;
D. 沙龙式教学
【多选题】
个别心理辅导的一般技术主要有哪些?___
A. 倾听技术;
B. 澄清技术;
C. 共情;
D. 具体化技术
【多选题】
114,司德菲提出的教师成长过程中包含了退缩阶段,退缩阶段包括___
A. 初期的退缩阶段;
B. 中期的退缩阶段;
C. 快速的退缩阶段;
D. 深度退缩阶段rnntm
【多选题】
印象管理是指我们有意地控制和管理别人对自己形成印象的过程,也叫做___
A. 印象整饰:
B. 印象形成;
C. 印象提升;
D. 印象控制
【多选题】
在采用认知领悟疗法矫正大学生的不良品的时,应注意___
A. 从学生世纪认知水平出发;
B. 坚持正面疏导:
C. 提出具体而合理的要求;
D. 进行榜样教育
【多选题】
教师良好的思维品质体现在___
A. 思维的广度和深度:
B. 思维的敏捷性:
C. 思维的逻辑性:
D. 思维的独立性
【多选题】
学习动机对学习行为的动力作用表现在哪几个方面___
A. 行为的激活;
B. 行为的定向;
C. 行为的维持;
D. 行为的强化
【判断题】
行为主义心理学的创始人是美国心理学家詹姆士。
A. 对
B. 错
【判断题】
目前较为公认的看法是:心理发展只是数量上的变化,即只有连续性,儿童只不过是成人的缩影。
A. 对
B. 错
【判断题】
人类某种行为和能力的发展错过关键期,这种行为和能力可能性就不会存在了。
A. 对
B. 错
【判断题】
大学生品德教育是大学辅导员的任务。
A. 对
B. 错
【判断题】
品德具有稳定性,所以,品德一旦形成,就不会在改变。
A. 对
B. 错
【判断题】
教师的威信主要是靠客观条件的改善,否则主观土再努力也无济于事
A. 对
B. 错
【判断题】
团体心理辅导
A. 对
B. 错
【判断题】
上位概念和下位概念都是绝对的。
A. 对
B. 错
【判断题】
自我观念和社会认同是印象管理过程中的两个重要因素。
A. 对
B. 错
【判断题】
大学生自我评价的片面性表现为过高评价自我。
A. 对
B. 错
【判断题】
“合群”是大学生人际吸引的较高层次。
A. 对
B. 错
【判断题】
成熟的道德判断是成熟的道德行为的充分条件。
A. 对
B. 错
【判断题】
气质类型是有好有坏的
A. 对
B. 错
【判断题】
37,自我强化指的是个人按照他,的标准评价自己的行为后,在心理上对自己所做的奖励或惩罚。
A. 对
B. 错
【判断题】
学习者
A. 对
B. 错
【判断题】
大学教师的劳动具有长效性的特点,但同时也具有短效性的特征
A. 对
B. 错
【判断题】
校园文化的主导文化是师生的价值观。
A. 对
B. 错
【判断题】
大学生形式逻辑已趋完善,辩证逻辑思维达到成熟水平。
A. 对
B. 错
【判断题】
从品德心理结构的视角看,品德形成发展一般要经过醒悟、转变与巩固和稳定三个阶段。
A. 对
B. 错
【判断题】
心理健康教育的发展性目标强调预防和矫正学生在学习与生活中产生的各种心理行为偏差或问题,促进学生的心理健康。
A. 对
B. 错
【判断题】
教师的教育能力中语言表达能力是占首位的
A. 对
B. 错
【判断题】
学习动机(motivationtolearn)是唤起学生的学习行为,并使该行为朝向教师预先设定的学习目标的过程。
A. 对
B. 错
【判断题】
在强化学习中,强化物来自外部环境,即只存在外部强化一种形式。
A. 对
B. 错
【判断题】
品德修养是品德养成的核心。
A. 对
B. 错
【判断题】
遗传素质是个体心理发展的决定因素。
A. 对
B. 错
【判断题】
大学教师的首要角色是学术研究者
A. 对
B. 错
【判断题】
大学生的思想与心理已基本定型,可塑性很少。
A. 对
B. 错
【判断题】
心理学研究对象的性质决定了心理学是社会科学。
A. 对
B. 错