【单选题】
24.—You can use MSN to talk with Vivien on the Internet.
—I know. But can you tell me ________?
A. what I can use it B. when I can use it
C. why can I use it D. how can I use it
A. A
B. B
C. C
D. D
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
B
相关试题
【单选题】
25. _______ are you going to the School Uniform Exhibition, Amy ?
To learn about different styles of school uniform.
A. What B. Where C. Which D. Why
A. A
B. B
C. C
D. D
【单选题】
( ) 26. Where does the writer of "The little Prince" come from?
A.England. B.France. C.America. D.China.
A. A
B. B
C. C
D. D
【单选题】
( ) 27. What does the prince do after the fox tells him a secret?
A.He cares more about a flower and a sheep.
B.He meets many more strange adults on other planets.
C.He realizes his love for the rose and he goes back to his planet.
D.He discovers interesting things such as a snake, other roses and a fox
A. A
B. B
C. C
D. D
【单选题】
( ) 28. What does "The little Prince" mainly talk about? It' s about _________.
A.the adult world B.the planet B -612
C.a rose and a fox D.the adventure of a young prince
A. A
B. B
C. C
D. D
【单选题】
( ) 29. What is the writer's main purpose(目的)in writing this passage?
A.To tell the readers his life story.
B.To tell people what kind of person his father was.
C.To tell the readers what present he got from his father.
D. To let people know how poor he was.
A. A
B. B
C. C
D. D
【单选题】
( ) 30. Why did the father not ask his son not to do this and do that?
A.Because he felt quite confident of his son.
B.Because he was born from a poor family.
C.Because he was a man of few words.
D.Because he didn't want to be much too strict with his son.
A. A
B. B
C. C
D. D
【单选题】
( ) 31. What would someone learn from this passage?
A.How to live by oneself. B.How to stand on one's own feet.
C.What a good father should do. D.What the self-important is like.
A. A
B. B
C. C
D. D
【单选题】
( ) 32. What may be the proper Chinese for the underlined part in the passage?
A.闲暇时光 B.学费 C.精神空虚 D.经济不足
A. A
B. B
C. C
D. D
【单选题】
( ) 33. Why did Natalie Smith pay for the six cars behind her?
A. She had seven tickets.
B. She hoped to please others.
C. She knew the car drivers well.
D. She wanted to show kindness.
A. A
B. B
C. C
D. D
【单选题】
( ) 34. Judy Foreman copied down the phrase because she ___ .
A. thought it was beautifully written
B. wanted to know what it really meant
C. decided to write it on a warehouse wall
D. wanted her husband to put it up in the classroom
A. A
B. B
C. C
D. D
【单选题】
( ) 35. Who came up with the phrase according to the passage?
A. Judy Foreman. B. Natalie Smith. C. Anne Herbert D. Alice Johnson.
A. A
B. B
C. C
D. S
【单选题】
( ) 36. What can we infer from the last paragraph?
A. People should practice random kindness to those in need.
B. People who receive kindness are likely to offer it to others.
C. People should practice random kindness to strangers they meet.
D. People who receive kindness are likely to pay it back to the giver.
A. A
B. B
C. C
D. D
【单选题】
( ) 37.The greatest river for navigation is ___________.
A. the Nile B. the Amazon C. the Mekong D. the Mississippi
A. A
B. B
C. C
D. D
【单选题】
( ) 38. From a dam, people can use the water for ___________.
A. keeping the rivers clean B. only making electricity
C. irrigation and making electricity D. washing clothes
A. A
B. B
C. C
D. D
【单选题】
( ) 39. The water in the river is polluted because of _____________.
A. people's drinking water too much B. people's swimming in the river too much
C. chemicals and other materials D. people's building a dam across a river
A. A
B. B
C. C
D. D
【单选题】
( ) 40. The best title of the passage is ___________.
A. Rivers in Cities B. The importance of Rivers
C. Transportation D. Natural Resources
A. A
B. B
C. C
D. D
【单选题】
) 1. Even Tony’s six-year-old son asked him ______ smoking.
A. stops B. stopped C. to stop D. stopping
A. A
B. B
C. C
D. D
【单选题】
2.—What do you think of the lecture of Li Yang’s Crazy English?
— I think it’s _______ , but someone thinks it’s much too ________.
A. wonderful enough; bored B. enough wonderful; boring
C. enough wonderful; bored D. wonderful enough; boring
A. A
B. B
C. C
D. D
【单选题】
3.—He didn’t go to the lecture this morning, did he?
— _____ .Though he was not feeling very well.
A. No, he didnt B. Yes; he did C. No, he did D. Yes, he didnt
A. A
B. B
C. C
D. D
【单选题】
4. If you read a lot, your life ______ full of pleasure.
A. will be B. is C. be D. was
A. A
B. B
C. C
D. D
【单选题】
5. The black bag _________ be Annas. She has a blue one.
A. should B. cant C. wouldnt D. could
A. A
B. B
C. C
D. D
【单选题】
6. Susan, why are you still here? They are all ready to start.
Im sorry, but I _________ when to start.
A. dont tell B. wasnt told C. didnt tell D. havent told
A. A
B. B
C. C
D. D
【单选题】
7.—Why dont you choose the red tie?
—For me, it doesn’t _____ my shirt very well.
A. fix B. accept C. compare D. match
A. A
B. B
C. C
D. D
【单选题】
8. — Could you tell me ______? I must find him.
— Sorry.I don’t know.But he was here just now.
A. where Tom was B. where Tom is
C. where has Tom gone D. where can I find Tom
A. A
B. B
C. C
D. D
【单选题】
9. —What did Mr Green say to you?
— What a heavy rain! How did you come here? He asked________.
A. at all B. in fact C. in surprise D. as a result
A. A
B. B
C. C
D. D
【单选题】
10. I often see Tom on the playground.When I passed the playground yesterday, I saw him .
A. play; playing B. to play; play C. playing; to play D. playing; play
A. A
B. B
C. C
D. D
【单选题】
11. — Mum, could I have ____________ to drink?
— Oh, dear.You can only drink some water.There is _________ in the kitchen.
A. anything; else something B. anything; something else
C. something; else nothing D. something; nothing else
A. A
B. B
C. C
D. D
【单选题】
12. We all know that learning a foreign language _______ time and effort.
A. requires B. reduces C. removes D. repeats
A. A
B. B
C. C
D. D
【单选题】
13. Her son __________ Coke, but now he __________ milk.
A. is used to drinking; used to drink B. used to drink; uses to drink
C. used to drink; is used to drinking D. is used to drink; is drinking
A. A
B. B
C. C
D. D
【单选题】
14. I don’t know the teacher is talking with Miss Wang.
A. what B. whom C. who D. which
A. A
B. B
C. C
D. D
【单选题】
15.Millie does __________ that many people are thankful to her.
A. such an important and helpful job B. so important and helpful work
C. a very important and helpful job D. such an important and helpful work
A. A
B. B
C. C
D. D
【单选题】
16. I think eating more vegetables is good _______ our health.
—Yes, I agree _______ you.
A. at, to B. for, with C. to, to D. for, to
A. A
B. B
C. C
D. D
【单选题】
17. I often go on holiday with my parents _____ summer.
A. in B. at C. on D. of
A. A
B. B
C. C
D. D
【单选题】
18. I called you at 4:00 yesterday afternoon, but nobody answered.
Sorry, I ______ with my friends at that time.
A. had swum B. swam C. would swim D. was swimming
A. A
B. B
C. C
D. D
【单选题】
19.––Who is on the playground? ---__________.
A. Never B. None C. No one D. A lot
A. A
B. B
C. C
D. D
【单选题】
20. The schoolboy ______ a blind man cross the street yesterday.
A. helps B. helped C. will help D. has helped
A. A
B. B
C. C
D. D
【单选题】
21. —The 2010 World Expo which will last 184 days will be held in Shanghai on May 1st.
—________exciting news! We shall try our best to support it.
A. How B. How an C. What D. What an
A. A
B. B
C. C
D. D
【单选题】
22. They preferred ______ in bed rather than _____ horses.
A. to lie; to ride B. lying; riding C. lying; ride D. to lie; ride
A. A
B. B
C. C
D. D
【单选题】
23. —What was Jim wearing at the party?
— Nothing _______. He was in his usual shirt and jeans.
A. special B. simple C. important D. interesting
A. A
B. B
C. C
D. D
【单选题】
24. The 2016 Olympic Games ________ in Brazil. Would you like to go there?
Maybe, if possible.
A. are held B. will be held C. were held D. have been held
A. A
B. B
C. C
D. D
推荐试题
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance