【判断题】
李某明知13周岁的郑某被强迫卖淫,仍与其发生性关系,对李某以强奸罪处罚。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
张某、刘某二人因故发生争吵,刘某气急败坏,想教训张某,于是乘张某不备拔刀向张某的大腿部位刺去,不料刺中腿部动脉,张某因失血过多而死亡。刘某的行为构成过失致人死亡罪。
A. 对
B. 错
【判断题】
强制猥亵罪的犯罪对象只能是妇女。
A. 对
B. 错
【判断题】
甲男与乙女发生纠纷,乙将脏物泼在甲的身上,甲便揪住乙的上衣,并向乙的下身猛击几拳;乙骂声不止,甲便唤来自家豢养的大公狗,在有许多村民围观的情况下,扒下乙的裤子,使其当众赤裸身体,并叫狗扑在乙的身上。甲的行为构成侮辱罪。
A. 对
B. 错
【判断题】
刘某在街上堵住与其丈夫有私情的女子吴某,愤怒指责吴某,吴某反唇相讥。刘某愤怒之下将吴某打倒在地并扒光其衣服,称这是为了惩罚吴某勾引自己的丈夫。刘某的行为成立强制猥亵罪。
A. 对
B. 错
【判断题】
韩某在向张某催要赌债无果的情况下,纠集好友把张某挟持至韩家,并给张家打电话,声称如果再不还钱,就砍掉张某一只手。韩某的行为构成非法拘禁罪。
A. 对
B. 错
【判断题】
甲欠乙债款5万元久拖不还,乙为了逼甲还债把甲锁在自家地窖中3个月。乙的行为构成非法拘禁罪。
A. 对
B. 错
【判断题】
收买被拐卖的妇女,按照被买妇女的意愿,不阻碍其返回原居住地的,可以不追究刑事责任。
A. 对
B. 错
【判断题】
收买被拐卖的儿童,对被买儿童没有虐待行为,不阻碍对其进行解救的,可以不追究刑事责任。
A. 对
B. 错
【判断题】
张三受王五纠集,跟着另外十余人起哄打警察,阻碍民警解救被拐卖妇女。张三的行为构成聚众阻碍解救被收买的妇女罪。
A. 对
B. 错
【判断题】
强迫劳动罪的主体必须是单位。
A. 对
B. 错
【判断题】
李某通过网络捏造事实诽谤王某,情节严重,王某向法院起诉李某,但提供证据确有困难,法院可以要求公安机关提供协助。
A. 对
B. 错
【判断题】
民警甲为逼取口供殴打犯罪嫌疑人郭某,致其重伤。对甲应以刑讯逼供罪论处。
A. 对
B. 错
【判断题】
组织未成年人进行违反治安管理活动罪中要求未成年人进行盗窃、诈骗、抢夺、敲诈勒索等行为,并不要求这些行为都构成犯罪。
A. 对
B. 错
【判断题】
甲既组织乙(17周岁)实施违反治安管理活动,又组织乙进行盗窃犯罪活动。对甲应当实行数罪并罚。
A. 对
B. 错
【判断题】
甲为非法占有乙随身携带的贵重物品,把乙打死后将财物掠走。甲的行为构成抢劫罪。
A. 对
B. 错
【判断题】
甲抢劫到一信用卡,卡内共有1万元钱,其取出3000元消费。对甲的抢劫罪应按照1万元定罪量刑。
A. 对
B. 错
【判断题】
在未运营中的大、中型公共交通工具上针对司售、乘务人员抢劫的,或者在小型出租车上抢劫的,不属于《刑法》第263条第2项规定的“在公共交通工具上抢劫”。
A. 对
B. 错
【判断题】
乘坐小型出租车过程中,乘机抢劫司机钱财的行为不属于我国《刑法》第263条第2项规定的“在公共交通工具上抢劫”。
A. 对
B. 错
【判断题】
王某某晚窜至一居民楼,对该楼7户人家连续进行入户抢劫,其行为应当认定是“多次入户抢劫”。
A. 对
B. 错
【判断题】
绑架过程中又当场劫取被害人随身携带的财物,同时触犯绑架罪和抢劫罪两个罪名,应以绑架罪定罪处罚。
A. 对
B. 错
【判断题】
为个人使用,以暴力、胁迫等手段取得家庭成员或近亲属财产的,一般不以抢劫罪定罪处罚。
A. 对
B. 错
【判断题】
田某骑摩托车在大街上见妇女张某提着一个精致皮包在行走,即起歹意,从背后用力拉皮包带,试图将皮包抢走。张某拽住皮包带不放。田某见此情景,突然加速,并用力猛拉皮包带,张某当即被摔成重伤。田某的行为构成抢夺罪和故意伤害罪。
A. 对
B. 错
【判断题】
张某、王某二人发现刘某一人独自行走,拿一手提包(内有现金等贵重物品,价值5000余元),遂尾随其后,蓄谋行抢。当刘某走到一无人拐角处时,张某乘刘某不备从刘某背后用双手将其抱住,王某乘机将刘某手中提包抢走。张某、王某构成抢夺罪。
A. 对
B. 错
【判断题】
王某骑摩托车乘张某不备将其撞倒后抢走其钱包,王某的行为构成抢夺罪。
A. 对
B. 错
【判断题】
以用酒灌醉、用药物麻醉等方法,使被害人处于昏睡、无知觉或者不能反抗的状态,而当场将财物劫走的行为构成盗窃罪。
A. 对
B. 错
【判断题】
甲与乙(女)因琐事相互厮打时,乙的耳环(价值8000元)掉在地上。甲假装摔倒在地迅速将耳环握在手中,乙见甲摔倒便离开了现场。甲的行为成立抢夺罪。
A. 对
B. 错
【判断题】
盗窃罪是指以非法占有为目的,窃取公私财物数额较大,或者多次盗窃、入户盗窃、携带凶器盗窃、扒窃公私财物的行为。
A. 对
B. 错
【判断题】
甲请乙为其到丙家盗窃时望风,乙同意。某日晚,甲、乙两人相约前往丙家,乙在门外望风。甲进入丙家后,见丙一人在家,便对丙实施暴力,抢劫了1万元现金。甲成立抢劫罪,乙成立盗窃罪。
A. 对
B. 错
【判断题】
赵某趁深夜潜入某博物馆,意欲窃取馆内珍藏的一件汉朝文物,但由于对现场情况不熟,刚要着手取文物,不慎触响了报警装置而未得逞。赵某的行为属盗窃罪的未遂。
A. 对
B. 错
【判断题】
携带枪支、爆炸物、管制刀具等国家禁止个人携带的器械盗窃,或者为了实施违法犯罪携带其他足以危害他人人身安全的器械盗窃的,应当认定为“携带凶器盗窃”。
A. 对
B. 错
【判断题】
只要入户盗窃即构成盗窃罪,不受所盗窃财物是否达到数额较大的限制。
A. 对
B. 错
【判断题】
冒充国家机关工作人员进行诈骗,同时构成诈骗罪和招摇撞骗罪的,数罪并罚。
A. 对
B. 错
【判断题】
以虚假、冒用的身份证件办理入网手续并使用移动电话,造成电信资费损失数额较大的,以诈骗罪定罪处罚。
A. 对
B. 错
【判断题】
甲在某银行营业厅趁顾客乙不备,抓起乙放在柜台上装有现金的信封后逃跑,被保安当场抓住,审查中发现甲腰间别有匕首一把。甲的行为构成抢劫罪。
A. 对
B. 错
【判断题】
甲晚上看到一老人手上提一个包(内有现金1500元)独自行走,冲上去一把夺过包就跑,由于用力过猛,将老人带倒在地,老人摔成重伤。对甲应当以故意伤害罪从重处罚。
A. 对
B. 错
【判断题】
根据我国《刑法》第267条第2款的规定,携带凶器抢夺的,依照我国《刑法》关于抢劫罪的规定定罪处罚。
A. 对
B. 错
【判断题】
甲、乙共同盗窃,由乙在现场望风。甲窃取丙的现金2000元,丙发现后立即追赶甲和乙。甲逃脱,乙被丙抓住后对丙使用暴力,致丙重伤。甲和乙的行为构成抢劫罪。
A. 对
B. 错
【判断题】
张某为某私营企业的会计,一日深夜潜入本单位财务室,用所保管财务室钥匙打开保险柜拿走现金2万元。张某的行为构成盗窃罪。
A. 对
B. 错
【判断题】
某村民小组组长利用职务上的便利,将村民小组集体财产非法占为己有,数额较大,其行为应以职务侵占罪定罪处罚。
A. 对
B. 错
【判断题】
行为人冒充治安联防队员“抓赌”、“抓嫖”、没收赌资或者罚款的行为,构成犯罪的,以敲诈勒索罪定罪处罚。
A. 对
B. 错
推荐试题
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine