【单选题】
《中华人民共和国献血法》规定,国家实行()制度。国家提倡十八周岁至五十五周岁的健康公民自愿献血。(出题单位:复旦大学附属华山医院)
A. 无偿献血
B. 义务献血
C. 自愿献血
D. 志愿献血
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
A
解析
《中华人民共和国献血法》第二条规定,国家实行无偿献血制度。国家提倡十八周岁至五十五周岁的健康公民自愿献血。
相关试题
【单选题】
档案是指过去和现在的国家机构、社会组织以及个人从事政治、军事、经济、科学、技术、文化、宗教等活动()对国家和社会具有保存价值的各种文字、图表、声像等不同形式的历史记录。(出题单位:上海市档案局)
A. 直接形成的
B. 间接形成的
C. 直接和间接形成的
【单选题】
1921年12月10日创刊于上海的()是中国共产党领导创办的第一份妇女刊物。(出题单位:上海市档案局)
A. 《妇女评论》
B. 《妇女声》
C. 《妇女生活》
D. 《妇女大众》
【单选题】
上海吴淞口国际邮轮港于2011年10月正式开港试运营。吴淞口国际邮轮港投入运营至今,累计接靠国际邮轮2000余艘次、出入境游客突破1200万人次,已成为()的国际邮轮母港,并带动中国成为全球仅次于美国的第二大邮轮客源地市场。(出题单位:宝山区委宣传部)
A. 亚洲第一、全球第四
B. 亚洲第二、全球第五
C. 亚洲第三、全球第六
D. 亚洲第四、全球第七
【单选题】
上海轨道交通11号线总长约82.4公里,超过英国伦敦地铁中央线,是目前世界上最长的地铁线路,亦是国内第()条跨省地铁线路。 (出题单位:嘉定区委宣传部)
A. 一
B. 二
C. 三
【多选题】
社会主义并没有定于一尊、一成不变的套路,只有把科学社会主义基本原则同中国()、()、()紧密结合起来,在实践中不断探索总结,才能把蓝图变为美好现实。(出题单位:复旦大学)
A. 具体实际
B. 历史文化传统
C. 时代要求
D. 人民对美好生活的向往
【多选题】
共产党人要把读马克思主义经典、悟马克思主义原理当作一种()、当作一种(),用经典涵养正气、淬炼思想、升华境界、指导实践。(出题单位:复旦大学)
A. 生活习惯
B. 精神追求
C. 生活乐趣
D. 业余爱好
【多选题】
《中华人民共和国未成年人保护法》由1991年9月4日七届全国人大常委会第21次会议通过,并经过两次进行修改。当前《中华人民共和国未成年人保护法》共设总则、()、()、()、()、法律责任和附则七章。(出题单位:共青团上海市委)
A. 家庭保护
B. 学校保护
C. 政府保护
D. 社会保护
E. 司法保护
【多选题】
2017年6月,我国科学家利用"墨子号"量子科学实验卫星在实际上率先成功实现了千公里级的星地双向量子纠缠分发,"量子纠缠"就是两个(或多个)粒子制造成的量子状态,无论粒子之间相隔多远,测量其中一个粒子必然会影响其他粒子,"量子纠缠"现象虽然未被完全认知,但它仍然能够说明()(出题单位:上海健康医学院)
A. 世界的真正统一性在于它的物质性
B. 事物联系的主观性和偶然性
C. 事物联系的复杂性和多样性
D. 物质世界联系的客观性和普遍性
【多选题】
“十五”期间,我国新能源汽车发展“三纵三横”的总体路线被提出。其中,“三纵”是指混合动力汽车、纯电动汽车、燃料电池汽车,“三横”则是指“三电”技术,即()、()、()。(出题单位:上汽集团)
A. 多能源动力总成控制系统
B. 电机及其控制系统
C. 电池及其管理系统
D. 车载互联网系统
【多选题】
下列哪些情形下,监察机关在调查涉嫌贪污贿赂、失职渎职等严重职务违法或职务犯罪案件时,可以将被调查人留置在特定场所。()(出题单位:杨浦区纪委监委)
A. 涉及案情重大、复杂的
B. 可能逃跑、自杀的
C. 可能串供或者伪造、隐匿、毁灭证据的
D. 可能有其他妨碍调查行为的
【多选题】
上海地铁1号线是上海的第一条地铁,亦为上海轨道交通最为繁忙、最重要的大动脉,地铁一号线(莘庄站—富锦路站)途经(), 全长36.89公里。(出题单位:闵行区梅陇镇)
A. 闵行区
B. 徐汇区
C. 黄浦区
D. 静安区
E. 宝山区
【多选题】
实现中华民族伟大复兴,是近代以来中国人民最伟大的梦想,我们称之为“中国梦”,基本内涵是实现_____。(出题单位:闵行区经委)
A. 国家富强
B. 民族振兴
C. 人民幸福
D. 社会和谐
【多选题】
老闵行曾经是上海县的所在地,它承载着上海近代的工业文明,在这里诞生了令上海人自豪而骄傲的“四大金刚”。以下属于老闵行的“四大金刚”的是()(出题单位:闵行区江川路街道)
A. 上海汽轮机厂
B. 上海机械厂
C. 上海电机厂
D. 上海电子厂
E. 上海锅炉厂
F. 上海重型机器厂
【多选题】
开展“不忘初心、牢记使命”主题教育,具体目标是()。(出题单位:嘉定区委宣传部)
A. 理论学习有收获
B. 思想政治受洗礼
C. 干事创业敢担当
D. 为民服务解难题
E. 清正廉洁作表率
F. 践行宗旨转作风
【多选题】
主题教育学习中要抓好问题检视,自觉对表对标,重点开展“五查工作”,其中“五查”具体指的是:()(出题单位:嘉定区委宣传部)
A. “查思想意识”
B. “查初心使命”
C. “查宗旨立场”
D. “查意识形态”
E. “查纪律作风”
F. “查职责担当”
【多选题】
十九届四中全会提出,坚持和完善党的领导制度体系,提高党()水平。必须坚持党政军民学、东西南北中,党是领导一切的,坚决维护党中央权威,健全总揽全局、协调各方的党的领导制度体系,把党的领导落实到国家治理各领域各方面各环节。(出题单位:嘉定区委宣传部)
A. 科学执政
B. 民主执政
C. 为民执政
D. 依法执政
【多选题】
坚持和完善党和国家监督体系,强化对权力运行的制约和监督。党和国家监督体系是党在长期执政条件下实现自我净化、自我完善、自我革新、自我提高的重要制度保障。必须健全党统一领导、全面覆盖、权威高效的监督体系,增强监督(),形成决策科学、执行坚决、监督有力的权力运行机制。(出题单位:嘉定区委宣传部)
A. 严肃性
B. 协同性
C. 有效性
D. 科学性
【多选题】
开展“不忘初心、牢记使命”主题教育,是以习近平同志为核心的党中央统揽()作出的重大部署,对决胜全面建成小康社会、夺取新时代中国特色社会主义伟大胜利、实现中华民族伟大复兴的中国梦,具有重大而深远的意义。(出题单位:嘉定区委宣传部)
A. 伟大斗争
B. 伟大国家
C. 伟大工程
D. 伟大事业
E. 伟大梦想
【多选题】
领导班子和班子成员要发扬刀刃向内的自我革命精神,认真检视反思,针对工作短板、具体问题,从思想、政治、作风、能力、廉政方面进行深入剖析,并形成检视剖析材料。重点采取五联方式,其中“五联”具体指的是:()
A. 联系工作查找问题
B. 联系实际查找问题
C. 联系职责查找问题
D. 联系服务查找问题
E. 联系思想查找问题
F. 联系政策查找问题
【多选题】
党的十九届四中全会《决定》指出:中国特色社会主义制度和国家治理体系是以马克思主义为指导、植根中国大地、()的制度和治理体系,是()的制度和治理体系,是能够持续推动拥有近十四亿人口大国进步和发展、确保拥有五千多年文明史的中华民族实现“两个一百年”奋斗目标进而实现伟大复兴的制度和治理体系。
A. 具有深厚中华文化根基、深得人民拥护
B. 党和人民在长期实践探索中形成
C. 具有强大生命力和巨大优越性
D. 能够加强和完善国家治理
【多选题】
坚持和完善中国特色社会主义制度、推进国家治理体系和治理能力现代化,是全党的一项重大战略任务。各级党委和政府以及各级领导干部要切实强化制度意识,带头维护制度权威,做制度执行的表率,带动全党全社会()。
A. 自觉尊崇制度
B. 有效学习制度
C. 严格执行制度
D. 坚决维护制度
【多选题】
根据工信部于2019年报批公示的《电动汽车用动力蓄电池安全要求》,我国新能源汽车动力电池包或系统需经过包括()、()、()、()、()等在内的16项安全检测。(出题单位:上汽集团)
A. 振动
B. 模拟碰撞
C. 浸水安全
D. 外部火烧
E. 外部短路保护
【多选题】
上海市优秀历史建筑的保护要求分为以下哪几类?(出题单位:徐汇区房管局历保办)
A. 建筑的立面、结构体系、平面布局和内部装饰不得改变;
B. 建筑的立面、结构体系、基本平面布局和有特色的内部装饰不得改变;
C. 建筑的主要立面、主要结构体系和有特色的内部装饰不得改变;
D. 建筑的主要立面、有特色的内部装饰不得改变。
【多选题】
上海市闵行区颛桥镇作为“全国文明镇”,多项特色文化品牌入选上海市非物质文化遗产名录,以下属于“颛桥三艺”的项目有:(出题单位:闵行区颛桥镇)
A. 颛桥剪纸
B. 颛桥腰鼓
C. 颛桥转伞
D. 颛桥桶蒸糕
【多选题】
自1998年10月1日起正式施行的《中华人民共和国献血法》鼓励()、()和()率先献血,为树立社会新风尚作表率。(出题单位:复旦大学附属华山医院)
A. 国家工作人员
B. 现役军人
C. 高等学校在校学生
【多选题】
人与环境密切的联系体现在()。(出题单位:上海中医药大学)
A. 人和自然界的统一性
B. 社会的进步
C. 人和社会关系密切
D. 地区不同、多发病不同
E. 个人社会地位改变
【多选题】
县级以上地方人民政府的()主管本行政区域内的档案事业。中央和县级以上地方各级各类(),是集中管理档案的文化事业机构,负责接收、收集、整理、保管和提供利用各分管范围内的档案。(出题单位:上海市档案局)
A. 档案室
B. 档案行政管理部门
C. 档案馆
推荐试题
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode