【填空题】
67.机密、秘密级涉密载体应当存放在 ___ 中,绝密级涉密载体应当存放在___ 中。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
密码文件柜|密码保险柜
解析
暂无解析
相关试题
【填空题】
68.涉密信息系统应当按照国家保密规定和标准制定分级保护方案,采取 ___ , ___, ___ , ___ ,信息流转控制等安全保密防护措施。
【填空题】
69.涉密人员是指在 ___ 工作的人员。
【填空题】
70.变更密级或解密,应由 ___ 决定,也可由 ___ 决定。
【填空题】
71.销毁秘密文件、资料要履行 ___ 手续,并由两名以上工作人员到指定场所监销。
【填空题】
72.违反《中华人民共和国保守国家秘密法》规定, ___ 泄露国家秘密,情节严重的,依照刑法有关规定追究刑事责任。
【填空题】
73.核心涉密人员的脱密期为 ___ 。
【填空题】
74.涉密人员离岗、离职前,应当将所保管和使用的涉密载体全部清退,并 ___ 。
【填空题】
75.国家秘密的保密期限,除有特殊规定外,绝密级事项不超过 ___ 年,机密级事项不超过 ___ 年,秘密级事项不超过 ___ 年。
【填空题】
76.资质单位应当定期对___、___等进行检查,及时发现和消除隐患。
【填空题】
77.国家秘密载体以及属于国家秘密的设备、产品的明显部位应当 ___ 。
【填空题】
78.机关、单位对符合保密法的规定,但保密范围没有规定的不明确事项,应当先行拟定 ___ 、 ___ 和___,采取相应的保密措施,并自拟定之日起 ___日内报有关部门确定。
【填空题】
79.经保密审查合格的企业事业单位违反保密规定的,由保密行政管理部门 ___ ,逾期不改或整改后仍不符合要求的, ___ ;情节严重的, ___ 。
【填空题】
80.涉密信息系统未按照规定进行检测评估审查而投入使用的,由保密行政管理部门 ___ ,并建议有关机关、单位对 ___ 和 ___ 依法给予处分。
【填空题】
81.未经保密审查的单位从事涉密业务的,由保密行政管理部门责令 ___ ;有违法所得的,由 ___ 没收违法所得。
【简答题】
请详细叙述《中华共和国保守国家秘密法》第四十八条列举的十二种违法行为。
【简答题】
请叙述涉密信息系统集成资质申请单位保密管理制度应涉及的主要方面。
【简答题】
保密行政管理部门依法对机关、单位执行保密法律法规的哪些情况进行检查?
【简答题】
在岗人员保密承诺书主要包括哪些内容。
【简答题】
请列举资质单位与涉密人员签订的劳动合同或者补充协议应当包含的内容。
【简答题】
涉密人员的保密工作责任主要有哪些?
【简答题】
涉密人员脱密期管理主要有哪些要求?
【单选题】
下列哪一项不是主题教育的总要求?___
A. 守初心
B. 担使命
C. 找差距
D. 抓落实
E. 严整改
【单选题】
党的十九大报告提出:“要在本世纪中叶建成___的社会主义现代化强国”。
A. 富强、民主、文明、幸福、绿色
B. 富强、民主、文明、幸福、美丽
C. 富强、民主、文明、和谐、绿色
D. 富强、民主、文明、和谐、美丽
【单选题】
党在十九大报告指出,经过长期努力,中国特色社会主义进入了___,这是我国发展新的历史方位。
A. 新时代
B. 新纪元
C. 新阶段
D. 新时期
【单选题】
党章指出,哪一项不是推进“一带一路”建设要遵循的原则___
A. 共商
B. 共建
C. 共享
D. 共推
【单选题】
下列哪一项不是“三大攻坚战”的内容___
A. 防范化解重大风险
B. 精准脱贫
C. 污染防治
D. 扫黑除恶专项斗争
【单选题】
发展党员,必须把___放在首位,经过党的支部,坚持个别吸收的原则。
A. 政治信仰
B. 道德修养
C. 政治立场
D. 政治标准
【单选题】
党的___是党的根本性建设,决定党的建设方向和效果。
A. 思想建设
B. 组织建设
C. 作风建设
D. 政治建设
【单选题】
党的十九大报告指出,___是引领发展的第一动力,是建设现代化经济体制的战略支撑。
A. 改革
B. 创新
C. 开放
D. 科技
【单选题】
党的十九大报告指出,世界正处于大发展大变革大调整时期,___仍然是时代主题。
A. 和平与共赢
B. 和平与发展
C. 合作与共赢
D. 合作与发展
【单选题】
中国共产党的最大政治优势是___。
A. 密切联系群众
B. 善于自我革新
C. 理论联系实际
D. 批评与自我批评
【单选题】
坚持党的领导、人民当家作主、依法治国有机统一。___是社会主义民主政治的本质特征。
A. 党的领导
B. 人民当家作主
C. 依法治国
D. 政治体制改革
【单选题】
要把大数据作为推动公安工作创新发展的大引擎、培育战斗力生成新的增长点,全面助推公安工作质量变革、效率变革、___。
A. 技术变革 
B. 动力变革
C. 方法变革 
D. 创新变革
【单选题】
___是实现社会主义现代化、创造人民美好生活的必由之路。
A. 中国特色社会主义道路 
B. 中国特色社会主义理论体系
C. 中国特色社会主义制度 
D. 中国特色社会主义文化
【单选题】
___是决定当代中国命运的关键一招,也是实现“两个一百年”奋斗目标、实现改革开放中华民族伟大复兴的关键一招。
A. 市场经济
B. 改革开放
C. 党的领导
D. 依法治国
【单选题】
(  )是党的基础性建设,坚定理想信念是(  )的首要任务。___
A. 政治建设  政治建设
B. 思想建设  思想建设
C. 文化建设  文化建设
D. 组织建设  组织建设
【单选题】
开展“不忘初心、牢记使命”主题教育就是要引导全党同志勇担(),焕发()的精气神。___
A. 责任使命 干事创业
B. 责任使命 忠诚履职
C. 职责使命 干事创业
D. 职责使命 忠诚履职   
【单选题】
党内最高处分是___
A. 开除公职
B. 留党察看
C. 开除党籍
【单选题】
党组织讨论决定问题执行的原则是___
A. 少数服从多数
B. 多数服从少数
C. 需全体同意
【单选题】
党的“六大纪律”:政治纪律、组织纪律、___纪律、群众纪律、工作纪律、生活纪律。
A. 廉洁
B. 清廉
C. 廉政
推荐试题
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface