【单选题】
___属于人工智能的应用。
A. :程序设计
B. :指纹识别
C. :社区聊天
D. :数据统计
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
),并了解他们考虑的一些问题。这些问题一般不包括___。
A. :他们对将要讨论的事项了解多少
B. :他们需要什么,又想要知道什么
C. :他们的艺术水平和欣赏能力如何
D. :他们将如何利用分析展示的信息
【单选题】
信息处理技术员资格考试的试卷包括信息处理基础知识、计算机基础知识、法律法规知识、专业英语、办公软件使用技能五个方面。某次考试后,对这五个方面分别统计了各考生的得分率以及全国的平均得分率。为了直观展现每个考生在各个方面的水平以及该考生的整体水平,并与全国平均水平进行比较,宜采用___。
A. :直方图
B. :圆饼图
C. :折线图
D. :雷达图
【单选题】
The___ is the primary device for entering information into the computer
A. :disk
B. :printer
C. :keyboard
D. :memory
【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
推荐试题
【填空题】
142、车站站内咽喉、股道等区段的临时限速通过___实施,由___输入。
【填空题】
143、轨道电路无码处理:在应答器预告地面___码,即载频不为0的情况下,如果地面轨道电路___码,含25.7、27.9Hz,则进行如下处理:1)若机车信号由绿5、绿4、绿3、绿2、绿灯、绿黄灯、黄2、黄2闪灯变为___灯时,在___前控制轨道车停车。机车信号由___、___、___灯变为白灯,在___架信号机前控制轨道车停车。当距离信号机___m内变为白灯,在___信号机前控制轨道车停车。在限速曲线闭口点前___m内,停车后提供___条件,司机按规定操作后,退出提速,进入正常监控___。当机车信号变为允许信号后,按正常监控模式控车。当机车信号转为___灯时,GYK继续按照___控车。
【填空题】
144、轨道电路无码处理:在应答器预告地面___码,即载频不为0的情况下,如果地面轨道电路___码,含25.7、27.9Hz,则进行如下处理:2)若机车信号由___灯变为红灯,___s语音报警“红灯停车,5、4、3、2、1”,7s内允许司机按【警惕】键解除语音报警,按已生成的停车曲线控制;7s内不按【警惕】键则输出___指令。
【填空题】
145、侧线接车时,当GYK收到的机车信号为___或___灯,此时GYK具有___范围——接收双黄或双黄闪灯开始点至前方最近一架出站信号机之间,在侧线保护范围内,如果有应答器信息丢失___,则GYK按___控制,速度降为___时,退出提速状态,转入正常监控模式。
【填空题】
146、收到“CTCS-3”信息包,并收到27.9Hz低频信息码,GYK按___进站信号机为目标点,计算速度限速曲线;进入接近区段后,按接收到的轨道电路连续信息动态控车。
【填空题】
147、在“CTCS-3”包描述的反向区段,以正常监控提速运行时,27.9Hz低频信息码变无码或其它信号,按___曲线控制轨道车停车。
【填空题】
149、默认报文的控制:2)轨道车在运行过程中若触发相位防溜报警后,GYK设备___接受应答器信息。
【填空题】
150、默认报文的控制:3)GYK判断如果不是从___的方向通过应答器组,GYK拒绝该应答器组的消息,并输出紧急制动,停车后退出正常监控提速,转入正常监控模式。
【填空题】
151、GYK在运行过程中当连续丢失___组链接应答器时,GYK按正常提速退出控制。
【填空题】
152、GYK在正常监控提速下能通过应答器获知地面的载频信息,优先根据应答器信息锁定___载频对或单载频,并在距___一定距离内告知进行___切换。
【填空题】
153、目视行车控制:___GYK按___km/h限速值控制轨道车运行。
【填空题】
154、目视行车控制:___周期报警:当运行___m或经过___s时,GYK发出语音报警,按___键,距离及时间计数清0,继续走行___m或经过___s后再次报警。
【填空题】
155、目视行车控制:___如果司机在轨道车运行___m或___s以内不按【警惕】键,限速变为___km/h,输出___,停车后按压___键,重新生成模式限速曲线。
【填空题】
156、目视行车控制:___目视行车模式下,机车信号变化GYK仅有语音提示,但___。
【填空题】
157、目视行车控制:______控制功能有效,___功能关闭。
【填空题】
158、目视行车控制:___在正常监控___状态,机车信号变为___信号,GYK退出目视状态,按照接收到的机车信号控车。
【填空题】
159、目视行车控制:___目视行车模式下,收到同向的___包GYK立即输出紧急制动指令,DMI下方文字提示“绝对停车,紧急制动”。
【填空题】
160、GYK以目视行车模式或目视状态运行时——进站信号机关闭,机车信号为___灯的正常监控目视运行状态除外,不受机车信号控制,按限速20km/h及200米距离进行控制,当运行150m或经过30s,GYK发出报警音,司机须在确认___条件允许的情况下进行警惕操作。
【填空题】
161、正常监控___进站,___灯,禁止进站,机车信号变为___灯/___灯,限速曲线闭口点距离前方进站信号机___m时,禁止解锁操作,按压【解锁】键提示“输入无效”
【填空题】
162、调车模式具有四种状态:“牵引”、“推进”、“连挂”、___状态。
【填空题】
163、调车状态下接收到允许信号,运行速度___km/h,允许司机按压___键,进入正常监控模式,在进入调车前没有___,接收到允许信号,按压【正常】键不能进入正常监控模式。
【填空题】
164、模式限速值按以下要求确定:牵引40km/h、推进30km/h、连挂5km/h、出入库限速默认___km/h___。
【填空题】
165、调车模式控制:1.GYK按模式限速曲线控制轨道车运行。2.___控制功能有效,___功能有效。3.机车信号变化时,GYK有语音提示,但不___。4.收到同向的“调车危险”和“绝对停车”信息包,GYK输出___指令。5.收到同向的“调车危险”信息包,未收到线路信息包,GYK输出___指令。
【填空题】
166、调车模式控制:6.收到同向的“调车危险”和线路信息包___,___s语音报警“确认调车进路,5、 4 、3 、2、 1”,若司机在7s内按压【警惕】键,则解除语音报警并不输出制动;7s内未按压【警惕】键,则输出紧急制动指令,DMI下方文字提示“调车危险,紧急制动”。
【填空题】
167、进入调车模式后,公里标运行趋势默认根据进入调车模式___的数据公里标趋势进行增或减,当停车后变换___,公里标运行趋势随之变换___。
【填空题】
168、进入调车模式前需将车辆工况切换到___的方向,当GYK检测到当前运行趋势与进入调车模式前趋势不一致时,DMI下方会提示___,司机确认行车正常可对此提示不作处理,待车辆调车模式运行完毕,重新调用数据即可消除该提示。
【填空题】
169、区间作业模式用于轨道车进入封锁区间进行区间作业的控车模式。具有五种状态:区间作业进入、区间作业返回、区间作业防碰、区间作业编组、___。区间作业状态选择界面如下图所示。
【填空题】
170、当输入的“作业起点公里标”、“作业终点公里标”不存在时,GYK将无法进入区间作业模式,在“区间作业状态参数输入”窗口提示___,只有输入正确的公里标才能正常进入。
【填空题】
171、当输入的“作业起点公里标”、“作业终点公里标”存在___时,需要进行长链标识设置,如:“作业起点公里标”存在长链,输入作业起点公里标后,当向下移动光标时,DMI会自动弹出“重复公里标选择”窗口,根据实际进行选择。
【填空题】
172、区间作业模式控制:1.GYK 监控轨道车按道岔限速出站,在对标公里标处按压【开车】键对标;当按【开车】键运行___m或越过道岔按压【解锁】键后,语音及DMI窗口提示“尾部过岔,请确认!”,同时发出报警音,进行确认操作后,道岔限速解除,按模式限速值控制。
【填空题】
2.限速曲线默认在进站信号机前___m闭口。
【填空题】
3.进站控制:在___前3km——车机联控点,DMI 显示“进站确认”提示,并语音提示“进站确认”。由司机人工按压【车位/3】+【模式/5】调出进站选择窗口,显示“0-站外停车;1-进站停车,2-侧线通过,3-正线通过”,允许进行选择,默认或选择0-站外停车:控制曲线保持不变;正向时,自闭区间在预告信号机位置进行信号机位置对标或半自闭区间在进站信号机前3km 范围内进行公里标位置对标,控制曲线以进站信号机为目标点进行控制___。
【填空题】
选择2-侧线通过::限速曲线控制到进站信号机前___m降为道岔限速;若在进站信号机前进行过人工车位校正,限速曲线在进站信号机前___控制到道岔限速;当过站中心___m或司机按压【解锁】键后,语音及 DMI 窗口提示“尾部过岔,请确认!”,同时发出报警音,司机按“确认”操作后,解除道岔限速。
【单选题】
一个人如果没有崇高理想或者缺乏理想,就会像一艘没有舵的船,随波逐流,难以顺利地到达彼岸。人只要有了崇高的理想,就会在黑暗中看到光明,在平凡中看到伟大,在遭受困难和挫折时能充满信心,坚持胜利。这就是理想在人生中的 ___
A. 精神向导的指路明灯作用
B. 精神支柱作用
C. 精神动力作用
D. 思想武器作用
【单选题】
理想的超越性表现为 ___
A. 同一定社会的历史条件相联系
B. 同一定时代的生产力发展水平相联系
C. 能为社会大多数人谋利益
D. 来源于社会现实又高于社会现实
【单选题】
“千里之行,始于足下。”理想的实现,需要每个人从我做起,从现在做起,从平凡做起。这是因为 ___
A. 理想是人们为之奋斗的目标
B. 社会实践是产生科学知识的源泉
C. 把理想变为现实,要靠努力奋斗,在实践中才能达到
D. 有了坚定的信念,理想就会自然得到实现
【单选题】
邓小平明确指出:“为什么我们过去能在非常困难的情况下奋斗出来,战胜千难万险使革命胜利呢?就是因为我们有理想,有马克思主义信念,有共产主义信念。”邓小平的这句话意思是说___
A. 理想信念是我们的指路明灯
B. 理想信念是我们的精神支柱
C. 理想信念是我们的精神动力
D. 有科学和不科学的区分
【单选题】
现阶段科学的理想信念的基础是 ___
A. 社会主义荣辱观
B. 马克思主义科学世界观
C. 构建社会主义和谐社会理论
D. 建设中国特色社会主义的理论
【单选题】
在新时期,邓小平提出的“四有”新人指的是 ___
A. 有知识、有能力、有文化、有纪律
B. 有理想、有道德、有文化、有纪律
C. 有素质、有本领、有道德、有理想
D. 有理想、有信念、有才华、有纪律
【单选题】
理想作为一种社会意识形态,不是从天而降,而是 ___
A. 社会存在的反映,是从社会实践中产生的
B. 人们头脑中构造出来的
C. 能为社会大多数人谋利益的构想
D. 人们的政治立场和世界观在人生奋斗目标上的体现