【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
光辐射|_早期核武器
解析
暂无解析
相关试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
推荐试题
【单选题】
关于滴虫阴道炎临床表现正确的是___
A. 外阴瘙痒,红肿
B. 悬滴法找到白细胞增多
C. 阴道pH4.5
D. 阴道黏膜上附着白带,擦后露出红肿黏膜面
E. 稀薄泡沫状白带增多
【单选题】
化疗前应准确测量体重,其目的是___
A. 精确计算化疗药物的剂量
B. 精确计算补液量
C. 精确计算患者饮食需要量
D. 了解化疗效果
E. 了解患者的营养状况
【单选题】
黄体酮试验提示有早孕的表现:停药后多长时间无阴道出血___
A. 超过2天
B. 超过5天
C. 超过2周
D. 超过3周
E. 超过7天
【单选题】
术前用药中能解除平滑肌、血管痉挛的药有___
A. 苯巴比妥
B. 地西泮
C. 芬太尼
D. 东莨菪碱
E. 异丙嗪
【单选题】
对妇科检查的描述,不正确的是___
A. 嘱受检者排空膀胱
B. 受检者取膀胱截石位
C. 检查垫应做到一人一垫
D. 对所有病人均做阴道检查
E. 男医务人员检查时要有女医务人员在场
【单选题】
下列不是结核病治疗原则的是___
A. 早期
B. 大量
C. 联合
D. 规律
E. 全程
【单选题】
葡萄胎确诊后的首选治疗方案是___
A. 全子宫切除术
B. 吸宫术
C. 诊断性刮宫
D. 物理治疗
E. 免疫疗法
【单选题】
创伤时,未确诊前应慎用___
A. 抗生素
B. 注射破伤风抗毒素
C. 夹板制动
D. 止痛剂
E. 肠外营养液
【单选题】
对直径<1cm的小肝癌的定位诊断,以下最好的检查方法是___
A. B超
B. 肝穿刺针吸细胞学检查
C. CT
D. X线
E. 选择性腹腔动脉和肝动脉造影
【单选题】
下列选项属于骨折早期并发症的是___
A. 愈合障碍
B. 关节僵硬
C. 骨化性肌炎
D. 骨筋膜室综合征
E. 缺血性骨坏死
【单选题】
严重的多根多处肋骨骨折的紧急处理是___
A. 气管插管辅助呼吸
B. 镇痛
C. 胸腔闭式引流
D. 加压包扎固定软化的胸壁
E. 气管切开
【单选题】
脑出血急性期的治疗原则不正确的是___
A. 保持安静,防止继续出血
B. 积极控制脑水肿,降低颅内压
C. 加强护理,防治并发症
D. 维持生命功能
E. 用抗生素,防止感染
【单选题】
有关急性支气管炎的治疗措施不当的是___
A. 止咳
B. 控制感染
C. 平喘
D. 镇咳
E. 化痰
【单选题】
化疗药物常见的严重副反应是___
A. 食欲不振
B. 消化道溃疡
C. 腹痛、腹泻
D. 造血功能障碍
E. 肝、肾功能损伤
【单选题】
诊断直肠癌最重要且简便易行的方法___
A. 大便潜血检查
B. 直肠镜检
C. 直肠指检
D. CT、检查
E. CA测定
【单选题】
尿中含有大量胆红素提示___
A. 单纯性胃炎
B. 十二指肠溃疡
C. 黄疸型肝炎
D. 胰腺癌
E. 溃疡性结肠炎
【单选题】
急性心肌梗死时,血清心肌酶中升高最早,同时恢复最快的是___
A. 肌酸磷酸激酶(CPK)
B. 碱性磷酸酶(AKP)
C. 乳酸脱氢酶(LDH)
D. 肌钙蛋白Ⅰ(cTnl)
E. 天冬氨酸氨基转移酶(AST)
【单选题】
患者,女性,18岁。月经周期紊乱,本次月经10余天未止,量多,测基础体温单相型,诊断为功能失调性子宫出血,首选治疗原则是___
A. 诊断性刮宫
B. 调整周期
C. 恢复黄体功能
D. 促进排卵
E. 中医调养
【单选题】
患者女性,20岁。全身重度水肿,尿蛋白6.4g/24小时,血浆白蛋白23g/L,血压80/60mmHg,肾功能BUN9.1mmol/L,Cr100μmol/L,应选择的主要治疗措施是___
A. 输新鲜血浆
B. 输白蛋白
C. 应用速尿
D. 使用环磷酰胺
E. 糖皮质激素
【单选题】
妊娠合并病毒性肝炎有传染性的指标是___
A. 检测出HCV
B. 尿胆红素阳性
C. HbeAg是活动性复制
D. HAV-IgM阳性
E. 抗Hb
【单选题】
胆道感染性休克时如何处理___
A. 抗休克,血压回升后随即手术
B. 抗休克同时,进行手术解除胆道梗阻
C. 抗休克后,非手术治疗
D. 择期手术
E. 限期手术
【单选题】
关于急性肾炎的治疗下列不正确的是___
A. 对症治疗
B. 急性期1~2周内应卧床休息
C. 必须马上使用青霉素治疗
D. 注意防治合并症
E. 禁止肾毒性药物的使用
【单选题】
葡萄球菌肺炎患儿使用抗生素的疗程是___
A. 体温正常后继续用药1周,总疗程3周
B. 体温正常后继续用药1周,总疗程4周
C. 体温正常后继续用药2周,总疗程4周
D. 体温正常后继续用药2周,总疗程5周
E. 体温正常后继续用药2周,总疗程6周
【单选题】
感染伤口的处理原则是___
A. 控制感染,加强换药
B. 控制感染,立即缝合
C. 彻底清创,择期植皮
D. 控制感染,立即植皮
E. 局部制动、理疗
【单选题】
男性,28岁。8h前因暴饮暴食后出现上腹部绞痛,向肩背部放射,送到医院急诊,怀疑为急性胰腺炎。此时最具诊断意义的实验室检查为___
A. 血清淀粉酶测定
B. 尿淀粉酶测定
C. 血钙测定
D. 血清脂肪酶测定
E. 血糖测定
【单选题】
基础体温测定,停经后体温升高多少天不见下降,早孕的可能性大___
A. 7天
B. 10天
C. 14天
D. 18天
E. 30天
【单选题】
肾结核患者术前一般抗结核治疗___
A. 1~2周
B. 2~4周
C. 4~6周
D. 1~2个月
E. 3~4个月
【单选题】
细菌性肺炎的血常规检查表现为___
A. 自细胞总数正常
B. 白细胞总数降低
C. 嗜酸性粒细胞增高
D. 中性粒细胞增高
E. 淋巴细胞增高
【单选题】
下列不是泌尿系结石保守治疗的方法的是___
A. 口服排石中药
B. 解痉
C. 利尿
D. 少运动
E. 针刺
【单选题】
人工流产负压吸引术适用于___
A. 孕6周以内
B. 孕7周以内
C. 孕9周以内
D. 孕10周以内
E. 孕11周以上
【单选题】
重症中暑常用的降温药物是___
A. 柴胡
B. 阿司匹林
C. 异丙嗪
D. 氯丙嗪
E. D氯丙嗪
【单选题】
镜下脓尿是指离心沉淀后的尿沉渣在每高倍镜视野中见到的白细胞为___
A. 1个以上
B. 3个以上
C. 5个以上
D. 7个以上
E. 10个以上
【单选题】
肾移植手术前,组织配型检查项目应除外___
A. mH血型
B. MHC抗原
C. 3P试验
D. 混合淋巴细胞培养
E. 淋巴细胞毒性试验
【单选题】
佝偻病激期血生化改变正确的是___
A. 血钙正常成偏高
B. 血磷明显升高
C. 血钙磷乘积小于30
D. 碱性磷酸酶明显降低
E. 25(OH)D升高
【单选题】
患者在上班途中发生车祸当即昏迷,持续时间约30分钟,醒后主诉有轻微头痛,四肢活动好,次日感到头痛加重,呕吐数次,嗜睡而就诊,最恰当的处理方式是___
A. 给予止呕处理,休息一周
B. 给予镇痛处理,休息一周
C. 给予脱水利尿治疗,同时进一步检查
D. 立即行脑室穿刺外引流术
E. 给予口服脱水、利尿药随诊
【单选题】
妊娠合并糖尿病需使用药物治疗时应选用___
A. 优降糖(格列本脲)
B. 消渴丸
C. 胰岛素
D. 降糖灵(苯乙双胍)
E. 二甲双胍
【单选题】
患者男性,65岁。患急性胰腺炎入院后48小时,治疗过程中出现急性呼吸窘迫综合征,对该病人纠正低氧血症的最佳方法是___
A. 持续高流量吸氧
B. 按时使用有效抗生素
C. 呼气终末正压通气
D. 避免输液过量过快
E. 鼓励深呼吸和排痰
【单选题】
关于开放性骨折治疗措施最重要的是___
A. 早期彻底清创
B. 及时使用TAT
C. 静脉补液
D. 应用止血药物
E. 及时复位固定
【单选题】
等渗性脱水治疗原则应该是___
A. 5%碳酸氢钠
B. 2%乳酸钠溶液
C. 等渗盐水与5%葡萄糖溶液各半
D. 低分子右旋糖酐
E. 10%葡萄糖溶液
【单选题】
猩红热患者取咽拭子可见___
A. 多核巨细胞
B. 乙型溶血性链球菌
C. 葡萄球菌
D. 白色念珠菌
E. 埃可病毒