【多选题】
关于青藏高原环流影响下列说法正确的是___
A. 青藏高原在冬季是热源,在夏季是热汇
B. 青藏高原大大增强了海陆分布影响对500百帕副热带高压带的断裂作用
C. 冬季东亚大槽是海陆热力差异和青藏高原地形影响的产物
D. 冬季亚洲地面冷高压中心的位置与青藏高原影响无关
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
BC
解析
暂无解析
相关试题
【多选题】
多普勒雷达的局限性___使其探测能力下降或受限
A. 波束中心的高度随距离增加
B. 波束中心的宽度随距离增加
C. 距离折叠
D. 静锥区的存在
【多选题】
经典超级单体风暴反射率因子回波的主要特征___
A. 低层的钩状回波
B. 中气旋
C. 中高层的悬垂回波
D. 中层的弱回波区
【多选题】
有利于强雷暴发生的条件___
A. 近地面逆温层
B. 前倾槽
C. 低层辐合和高层辐散
D. 大的风垂直切变
【多选题】
多普勒雷达测量的基本量___
A. 回波强度
B. 径向速度
C. 风廓线
D. 速度谱宽
【多选题】
多普勒雷达由___子系统组成
A. 数据采集RDA
B. 产品生成RPG
C. 用户终端PUP
D. 通讯线路
【多选题】
我国业务运行多普勒雷达通常采用的体描模式___
A. VCP11
B. VCP21
C. VCP31
D. VCP32
【多选题】
多普勒雷达的局限性___使其探测能力下降或受限
A. 波束中心的高度随距离增加
B. 波束中心的宽度随距离增加
C. 距离折叠
D. 静锥区的存在
【多选题】
层状云降水反射率因子回波的特征是___
A. 具有密实结构
B. 具有均匀纹理结构
C. 具有均匀絮状结构
D. 零度层亮带
【多选题】
经典超级单体风暴反射率因子回波的主要特征___
A. 低层的钩状回波
B. 中气旋
C. 中高层的悬垂回波
D. 中层的弱回波区
【多选题】
超级单体风暴主要产生的灾害性天气包括___
A. 大风
B. 冰雹
C. 龙卷
D. 下击暴流
【多选题】
龙卷涡旋特征TVS定义包括___
A. 切变
B. 垂直方向伸展
C. 持续叶间
D. 水平尺度
【多选题】
降水回波反射率因子回波大致可以分为哪几种类型___。
A. 阵雨回波
B. 暴雨回波
C. 积云降水回波
D. 雷阵雨回波
E. 层状云降水回波
F. 积云层状云混合型降水回波
【多选题】
灾害性天气及其次生灾害预报制作和发布规定:灾害性天气及其次生灾害落区预报每天制作和分发两次,早晨制作和发布未来(12、24、48小时)预报,下午制作和发布未来(12、24、48、72小时)预报。___
A. 12、24小时
B. 12、24、48小时
C. 12、24、48、72小时
D. 12、24、48、72、96小时
【多选题】
中短期天气预报质量检验区域范围包括预报责任区内所有___和()。
A. 预报站点
B. 预报地点
C. 预报范围
D. 预报区域
【多选题】
预计未来( )责任区内最低气温下降( )以上,最低气温为≤4℃。陆上平均风力5-7级(海区平均风力7级以上)应发布寒潮警报。___
A. 48小时
B. 24小时
C. 10℃
D. 8℃
【多选题】
温度预报的检验包括( )、( )、( )的预报误差。___
A. 最高气温
B. 最低气温
C. 平均气温
D. 定时气温
【多选题】
冰雹预警信号有:___
A. 蓝色
B. 黄色
C. 橙色
D. 红色
【多选题】
精细化天气预报规定,24--48小时常规天气要素天气预报以___小时为时间间隔。
A. 3
B. 6
C. 12
D. 24
【多选题】
根据灾害性天气落区预报检验,预报大雪,实况为中雪,评定结果是___。
A. 评定小雪正确
B. 评定中雪正确
C. 评定大雪空报
D. 不评定
【判断题】
现代遥感探测信息的综合应用水平和数值天气预报业务技术水平是当今世界用来衡量天气业务现代化程度和先进性的最重要的标志。
A. 对
B. 错
【判断题】
预计编号热带气旋在未来48小时内将影响本责任区的沿海地区或登陆时发布紧急警报。
A. 对
B. 错
【判断题】
中气旋的水平尺度一般不超过30公里。
A. 对
B. 错
【判断题】
等位势面和等几何高度面不平行。
A. 对
B. 错
【判断题】
新一代雷达在夏季和地形平坦的情况下,有效测雨范围可扩展到230km。
A. 对
B. 错
【判断题】
后向散射截面是一个虚拟的面积,它可用来定量地表示粒子后向散射能力的强弱,实际粒子的后向散射截面等于它的几何截面。
A. 对
B. 错
【判断题】
降水(尤其是冰雹)可以对C波段雷达波的传播造成明显的衰减。
A. 对
B. 错
【判断题】
锋区内温度水平梯度远比两侧气团中大,锋区内温度垂直梯度特别小。
A. 对
B. 错
【判断题】
在变形场中,当等温线与膨胀轴的交角小于450时有利于锋生,当大于450时有利于锋消。
A. 对
B. 错
【判断题】
长波波速主要取决于西风带风速强度和波长,当波长短时,移动慢,波长长时,移动快
A. 对
B. 错
【判断题】
当山的坡度愈大,地面风速愈大,且风向与山的走向平行时,地面垂直运动愈强。
A. 对
B. 错
【判断题】
南亚高压是对流层上部的暖高压。
A. 对
B. 错
【判断题】
在槽前脊后沿气流方向相对涡度减少 ,为负涡度平流,等压面高度降低 ,在槽后脊前沿气流方向相对涡度增加,为正涡度平流,等压面高度升高。
A. 对
B. 错
【判断题】
在正压大气中,地转风随高度不发生变化,在斜压大气中,地转风随高度发生变化。
A. 对
B. 错
【判断题】
当地转风随高度逆转时有冷平流,地转风随高度顺转时有暖平流。
A. 对
B. 错
【判断题】
雷电是层积云中冰晶“温差起电”以及其他起电作用造成的。
A. 对
B. 错
【判断题】
低纬度地区的天气运动是非地转运动。
A. 对
B. 错
【判断题】
在对流层自由大气中,有暖平流时等压面将升高,反之则将降低。
A. 对
B. 错
【判断题】
冷锋和暖锋坡度较大,准静止锋坡度较小。
A. 对
B. 错
【判断题】
湿位涡中的垂直分量和水平分量量级相同。
A. 对
B. 错
【判断题】
雷达能够探测降水天气系统内部结构的原因在于降水粒子对于雷达发射的电磁波的散射。
A. 对
B. 错
推荐试题
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT