【填空题】
36. 中国人民解放军六个兵种分别是___、___、___、___、___、___。
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
陆军|海军|空军|火箭军|战略支援部队|联勤保障部队
解析
暂无解析
相关试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
推荐试题
【多选题】
危险化学品是指___感染、放射性等危险性质,在运输、储存、生产、经营、使用和处置中,容易造成人身伤亡、财产损毁或环境污染而需要特别防护的物品。
A. 有爆炸
B. 易燃
C. 毒害
D. 腐蚀
【多选题】
化学品安全技术说明书中的“消防措施”主要表示___。
A. 化学品的物理和化学特殊危险性
B. 适合的灭火介质、不适合的灭火介质
C. 消防人员个体防护
D. 包括危险特性、灭火介质和方法、灭火注意事项
【多选题】
消防车登高操作场地与厂房、仓库、民用建筑之间不应设置___等障碍物和车库出入口。
A. 妨碍消防车操作的树木
B. 架空管线
C. 场地坡度不宜大于3%
D. 直通室外的楼梯
【多选题】
火灾自动报警系统的作用___
A. 是人们为了早期发现和通报火灾,并及时联动各种消防设施
B. 及时引导人员疏散
C. 接收设备的反馈信号而设置在建(构)筑物中或其他场所的一种自动消防设施
D. 是建筑消防安全系统的核心组成部分
【多选题】
各级指挥员在灭火作战指挥中要实现科学施救,必须增强___意识。
A. 增强科学的进攻、及时的转移或撤退的指挥意识
B. 增强优化作战成果的效益意识
C. 增强科学决策的防范风险意识
D. 增强主动防护的安全意识
【多选题】
调集增援力量应遵循___。
A. 火场指挥员在出动途中或到达火场后,根据火灾情况,认为灭火力量不足时。
B. 火场上出现爆炸或建筑物倒塌等情况,灭火力量不足时。
C. 消防通信指挥中心根据报警了解到的情况,确认有必要调集增援力量时。
D. 火场基本被控制,但有复燃的可能。
【多选题】
灭火战斗中,指挥员必须迅速确定火场的主要方面,应把握___。
A. 当火场上有人受到火势严重威胁时,抢救人命是火场的主要方面。
B. 当火场上有贵重的仪器设备、技术资料、图书档案等受到火势威胁,有可能造成重大经济损失和严重政治影响时,保护和疏散贵重物资和重要资料是火场的主要方面。
C. 当火场内的压力容器、爆炸性、毒性、腐蚀性和放射性等危险化学品受到火势严重威胁,有可能发生爆炸,造成人员伤亡、建筑倒塌、设备损坏等险情时,消除这些险情是火场的主要方面
D. 当已经发生爆炸,且连续不断,控制爆炸是火场的主要方面
【多选题】
突破是火场上为完成比较艰巨的灭火、救人和排险任务,组织灭火力量进行强攻的战法。适用于突破战术的是___。
A. 开辟救人通道抢救人命时的突破
B. 消除爆炸危险时的突破
C. 抢救重要的物资或资料时的突破
D. 堵漏或采取关阀断流等工艺措施时的突破
【多选题】
围歼是对燃烧区形成围攻态势,完成战术包围,发起总攻,消灭火灾的战法,下列适用于围歼战术的是___
A. 大面积燃烧区域被分割后
B. 多层建筑或高大生产装置火灾被分割后
C. 易燃建筑密集区被分割后
D. 大面积易燃液体流淌火