【单选题】
要清醒认识网络环境的复杂性、挑战性,把握好新媒体传播的 ,主动引导舆论,增信释疑,牢牢掌握宣传舆论的主动权。
A. 方向
B. 特点
C. 规律
D. 变化
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
C
解析
暂无解析
相关试题
【单选题】
提高政治站位,牢牢把握意识形态工作领导权管理权话语权,开展网络意识形态管理现状分析,找问题、补短板、查缺漏,筑牢网络意识形态管理的 。
A. 基础
B. “防火墙”
C. 红线
D. 阵地
【单选题】
《人民日报》有位记者,曾采写了一篇令人振聋发聩的新闻述评《水,让我们重新认识你》。这次采访的成功,主要是因为 。
A. 做好充分的准备工作
B. 记者的头脑灵活
C. 采访的机遇好
D. 记者的笔杆子硬
【单选题】
在采访中,记者既要“身入”,又要“心入”。“心入”,就是要有强烈的社会责任感, 要对客观事物进行由表及里的分析,还要 。
A. 广泛地接触群众
B. 多方面地挖掘材料
C. 细心地掂量各种材料的价值
D. 真心实意地和群众打成一片
【单选题】
加强体制机制建设,努力构建起各单位 统一领导,宣传部门牵头协调,业务部门分工负责,基层单位主动落实,全员共同参与的“大宣传”工作格局。
A. 行政
B. 党委
C. 纪委
D. 工会
【单选题】
开展“庆祝新中国成立70周年”主题宣传,深入挖掘电网重大工程、科技创新成果、先进典型等背后的故事,创作一批 相统一的优秀作品,满足广大职工精神文化生活需要。
A. 思想性、艺术性、观赏性
B. 思想性、艺术性、先进性
C. 思想性、历史性、观赏性
D. 创造性、艺术性、观赏性
【单选题】
开展“庆祝新中国成立70周年”主题宣传,深入挖掘电网重大工程、科技创新成果、先进典型等背后的故事,创作一批 相统一的优秀作品,满足广大职工精神文化生活需要。
A. 思想性、艺术性、观赏性
B. 思想性、艺术性、先进性
C. 思想性、历史性、观赏性
D. 创造性、艺术性、观赏性
【单选题】
举旗帜,就是要高举马克思主义、 的旗帜,坚持不懈用新时代中国特色社会主义思想武装全党、教育人民、推动工作,在学懂弄通做实上下功夫,推动当代中国马克思主义、21世纪马克思主义深入人心、落地生根。
A. 列宁主义
B. 邓小平理论
C. 中国特色社会主义
D. 毛泽东思想
【单选题】
兴文化,就是要坚持中国特色社会主义文化发展道路,推动中华优秀传统文化创造性转化、 发展,继承革命文化,发展社会主义先进文化,激发全民族文化创新创造活力,建设社会主义文化强国。
A. 持续性
B. 创新性
C. 延续性
D. 创造性
【单选题】
加强体制机制建设,努力构建起各单位 统一领导,宣传部门牵头协调,业务部门分工负责,基层单位主动落实,全员共同参与的“大宣传”工作格局。
A. 行政
B. 党委
C. 纪委
D. 工会
【单选题】
坚持党性,核心就是坚持正确 方向,站稳政治立场,坚定宣传党的理论和路线方针政策,坚定宣传中央重大工作部署,坚定宣传中央关于形势的重大分析判断,坚决同党中央保持高度一致,坚决维护中央权威。
A. 理论
B. 政治
C. 文化
D. 意识形态
【单选题】
各级党委要负起 责任和领导责任,加强对宣传思想领域重大问题的分析研判和重大战略性任务的统筹指导,不断提高领导宣传思想工作能力和水平。
A. 宣传
B. 政治
C. 引领
D. 引导
【单选题】
以来,中央主要媒体突出宣传党的十八大和十八届三中、四中、五中全会精神,阐释党中央重大决策和工作部署,反映人民伟大实践和精神风貌,唱响了主旋律,传播了正能量,有力激发了全党全国各族人民为实现中华民族伟大复兴的中国梦而团结奋斗的强大力量。
A. 党的十八大
B. 党的十六大
C. 党的十五大
D. 党的十四大
【单选题】
都要坚持党性和 性相统一,把党的理论和路线方针政策变成人民群众的自觉行动,及时把人民群众创造的经验和面临的实际情况反映出来,丰富人民精神世界,增强人民精神力量。
A. 群众
B. 人民
C. 政府
【单选题】
新闻舆论工作者要增强 办报意识,在围绕中心、服务大局中找准坐标定位,牢记社会责任,不断解决好“为了谁、依靠谁、我是谁”这个根本问题。
A. 思想家
B. 理论家
C. 政治家
D. 政党
【单选题】
要增强同媒体打交道的能力,善于运用媒体宣讲政策主张、了解社情民意、发现矛盾问题、引导社会情绪、动员人民群众、推动实际工作。
A. 政府
B. 领导干部
C. 人民群众
D. 党员
【单选题】
我国网民达到8.02亿,其中手机网民占比98.3%。 和各类社交媒体成为很多干部群众特别是年轻人的第一信息源,而且每个人都可能成为信息源。
A. QQ
B. 微信
C. 新闻客户端
D. 微博
【单选题】
我们推动媒体融合发展,是要做大做强 ,巩固全党全国人民团结奋斗的共同思想基础,为实现“两个一百年”奋斗目标、实现中华民族伟大复兴的中国梦提供强大精神力量和舆论支持。
A. 主流舆论
B. 重要媒体
C. 地方媒体
D. 新媒体
【单选题】
要坚持 发展方向,加快从相加阶段迈向相融阶段,通过流程优化、平台再造,实现各种媒介资源、生产要素有效整合,实现信息内容、技术应用、平台终端、管理手段共融互通,催化融合质变,放大一体效能,打造一批具有强大影响力、竞争力的新型主流媒体。
A. 纵向
B. 横向
C. 一体化
D. 纵深
【单选题】
我们要增强紧迫感和使命感,推动关键核心技术自主创新不断实现突破,探索将 运用在新闻采集、生产、分发、接收、反馈中,用主流价值导向驾驭“算法”,全面提高舆论引导能力。
A. 人工智能
B. 科学技术
C. 现代科技
D. 新的宣传方式
【单选题】
我们走的是正路、行的是大道,这是主流媒体的历史机遇,必须增强底气、鼓起士气,坚持不懈讲好中国故事,形成同我国 相适应的国际话语权。
A. 综合国力
B. 国际地位
C. 地理区域
D. 社会主义道路
推荐试题
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network