




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
CCNP/CCIESecuritySCOR題庫2
QUESTION51
AnengineerneedsasolutionforTACACS+authenticationandauthorizationfordevice
administration.Theengineeralsowantstoenhancewiredandwirelessnetworksecuritybyrequiring
usersandendpointstouse802.1X,MAB,orWebAuth.Whichproductmeetsalloftheserequirements?
A.CiscoPrimeInfrastructure
B.CiscoIdentityServicesEngine
C.CiscoStealthwatch
D.CiscoAMPforEndpoints
CorrectAnswer:B
Section:(none)
Explanation
Explanation/Reference:
QUESTION52
Whenwired802.1Xauthenticationisimplemented,whichtwocomponentsarerequired?(Choose
two.)
A.authenticationserver:CiscoIdentityServiceEngine
B.supplicant:CiscoAnyConnectISEPosturemodule
C.authenticator:CiscoCatalystswitch
D.authenticator:CiscoIdentityServicesEngine
E.authenticationserver:CiscoPrimeInfrastructure
CorrectAnswer:AC
Section:(none)
Explanation
Explanation/Reference:
Reference:/blog/ise-series-802.lx
QUESTION53
TheCiscoASAmustsupportTLSproxyforencryptedCiscoUnifiedCommunicationstraffic.Where
musttheASAbeaddedontheCiscoUCManagerplatform?
A.CertificateTrustList
B.EndpointTrustList
C.EnterpriseProxyService
D.SecuredCollaborationProxy
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/td/docs/security/asa/special/unified-
communications/guide/unified-comm/unified-comm-tlsproxy.html
QUESTION54
WhichAPIisusedforContentSecurity?
A.NX-OSAPI
B.IOSXRAPI
C.OpenVulnAPI
D.AsyncOSAPI
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/td/docs/security/security_management/sma/smal2
-0/api/b_SMA_API_12/test_chapter_01.html
QUESTION55
Whichtwobehavioralpatternscharacterizeapingofdeathattack?(Choosetwo.)
A.Theattackisfragmentedintogroupsof16octetsbeforetransmission.
B.Theattackisfragmentedintogroupsof8octetsbeforetransmission.
C.ShortsynchronizedburstsoftrafficareusedtodisruptTCPconnections.
D.Malformedpacketsareusedtocrashsystems.
E.PubliclyaccessibleDNSserversaretypicallyusedtoexecutetheattack.
CorrectAnswer:BD
Section:(none)
Explanation
Explanation/Reference:
Reference:/wiki/Ping_of_death
QUESTION56
Whichtwomechanismsareusedtocontrolphishingattacks?(Choosetwo.)
A.Enablebrowseralertsforfraudulentwebsites.
B.Definesecuritygroupmemberships.
C.RevokeexpiredCRLofthewebsites.
D.Useantispywaresoftware.
E.Implementemailfilteringtechniques.
CorrectAnswer:AE
Section:(none)
Explanation
Explanation/Reference:
QUESTION57
WhichVPNtechnologycansupportamultivendorenvironmentandsecuretrafficbetweensites?
A.SSLVPN
B.GETVPN
C.FlexVPN
D.DMVPN
CorrectAnswer:C
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/products/collateral/routers/asr-1000-series-
aggregation-services-routers/data_sheet_c78-704277.html
QUESTION58
WhichSNMPv3configurationmustbeusedtosupportthestrongestsecuritypossible?
A.asa-host(config)#snmp-servergroupmyv3v3privasa-host(config)#snmp-serveruserandymyv3
authshaciscoprivdesciscXXXXXXXXasa-host(config)#snmp-serverhostinsideversion
3andy
B.asa-host(config)#snmp-servergroupmyv3v3noauthasa-host(config)#snmp-serveruserandy
myv3authshaciscoprivaes256ciscXXXXXXXXasa-host(config)#snmp-serverhostinside
version3andy
C.asa-host(config)#snmp-servergroupmyv3v3noauthasa-host(config)#snmp-serveruserandy
myv3authshaciscopriv3desciscXXXXXXXXasa-host(config)#snmp-serverhostinside
version3andy
D.asa-host(config)#snmp-servergroupmyv3v3privasa-host(config)#snmp-serveruserandy
myv3authshaciscoprivaes256ciscXXXXXXXXasa-host(config)#snmp-serverhostinside
version3andy
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
QUESTION59
WhichfeatureissupportedwhendeployingCiscoASAvwithinAWSpubliccloud?
A.multiplecontextmode
B.userdeploymentofLayer3networks
C.IPv6
D.clustering
CorrectAnswer:B
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/td/docs/security/asa/asa96/asav/quick-start-
book/asav-96-qsg/asav-aws.html
QUESTION60
WhichproxymodemustbeusedonCiscoWSAtoredirectTCPtrafficwithWCCP?
A.transparent
B.redirection
C.forward
D.proxygateway
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/support/docs/security/web-security-
appliance/117940-qa-wsa-00.html
QUESTION61
AnMDMprovideswhichtwoadvantagestoanorganizationwithregardstodevicemanagement?
(Choosetwo.)
A.assetinventorymanagement
B.allowedapplicationmanagement
C.ActiveDirectorygrouppolicymanagement
D.networkdevicemanagement
E.criticaldevicemanagement
CorrectAnswer:AB
Section:(none)
Explanation
Explanation/Reference:
QUESTION62
WhichTalosreputationcenterallowsyoutotrackthereputationofIPaddressesforemailandweb
traffic?
A.IPBlacklistCenter
B.FileReputationCenter
C.AMPReputationCenter
D.IPandDomainReputationCenter
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
QUESTION63
UnderwhichtwocircumstancesisaCoAissued?(Choosetwo.)
A.AnewauthenticationrulewasaddedtothepolicyonthePolicyServicenode.
B.AnendpointisdeletedontheIdentityServiceEngineserver.
C.AnewIdentitySourceSequenceiscreatedandreferencedintheauthenticationpolicy.
D.Anendpointisprofiledforthefirsttime.
E.AnewIdentityServiceEngineserverisaddedtothedeploymentwiththeAdministrationpersona.
CorrectAnswer:BD
Section:(none)
Explanation
Explanation/Reference:
Reference:https://www.cisco.eom/en/US/docs/security/ise/l.0/user_guide/iselO_prof_pol.html
QUESTION64
WhichsolutioncombinesCiscoIOSandIOSXEcomponentstoenableadministratorstorecognize
applications,collectandsendnetworkmetricstoCiscoPrimeandotherthird-partymanagement
tools,andprioritizeapplicationtraffic?
A.CiscoSecurityIntelligence
B.CiscoApplicationVisibilityandControl
C.CiscoModelDrivenTelemetry
D.CiscoDNACenter
CorrectAnswer:B
Section:(none)
Explanation
Explanation/Reference:
QUESTION65
Whichtwoendpointmeasuresareusedtominimizethechancesoffallingvictimtophishingand
socialengineeringattacks?(Choosetwo.)
A.Patchforcross-sitescripting.
B.Performbackupstotheprivatecloud.
C.Protectagainstinputvalidationandcharacterescapesintheendpoint.
D.Installaspamandvirusemailfilter.
E.Protectsystemswithanup-to-dateantimalwareprogram.
CorrectAnswer:DE
Section:(none)
Explanation
Explanation/Reference:
QUESTION66
AnengineerusedaposturecheckonaMicrosoftWindowsendpointanddiscoveredthattheMS17-
010patchwasnotinstalled,whichlefttheendpointvulnerabletoWannaCryransomware.Whichtwo
solutionsmitigatetheriskofthisransomwareinfection?(Choosetwo.)
A.ConfigureaposturepolicyinCiscoIdentityServicesEnginetoinstalltheMS17-010patchbefore
allowingaccessonthenetwork.
B.SetupaprofilingpolicyinCiscoIdentityServiceEnginetocheckandendpointpatchlevelbefore
allowingaccessonthenetwork.
C.ConfigureaposturepolicyinCiscoIdentityServicesEnginetocheckthatanendpointpatchlevel
ismetbeforeallowingaccessonthenetwork.
D.Configureendpointfirewallpoliciestostoptheexploittrafficfrombeingallowedtorunand
replicatethroughoutthenetwork.
E.Setupawell-definedendpointpatchingstrategytoensurethatendpointshavecritical
vulnerabilitiespatchedinatimelyfashion.
CorrectAnswer:AC
Section:(none)
Explanation
Explanation/Reference:
QUESTION67
DRAGDROP
DraganddropthestepsfromtheleftintothecorrectorderontherighttoenableAppDynamicsto
monitoranEC2instanceinAmazonWebServices.
SelectandPlace:
CorrectAnswer:
Section:(none)
Explanation
Explanation/Reference:
QUESTION68
Whywouldauserchooseanon-premisesESAversustheCESsolution?
A.Sensitivedatamustremainonsite.
B.Demandisunpredictable.
C.Theserverteamwantstooutsourcethisservice.
D.ESAisdeployedinline.
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
QUESTION69
WhichtechnologymustbeusedtoimplementsecureVPNconnectivityamongcompanybranches
overaprivateIPcloudwithany-to-anyscalableconnectivity?
A.DMVPN
B.FlexVPN
C.IPsecDVTI
D.GETVPN
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
QUESTION70
WhichCiscosolutiondoesCiscoUmbrellaintegratewithtodetermineifaURLismalicious?
A.AMP
B.AnyConnect
C.DynDNS
D.Talos
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
QUESTION71
WhatisthepurposeoftheDecryptforApplicationDetectionfeaturewithintheWSADecryption
options?
A.ItdecryptsHTTPSapplicationtrafficforunauthenticatedusers.
B.ItalertsuserswhentheWSAdecryptstheirtraffic.
C.ItdecryptsHTTPSapplicationtrafficforauthenticatedusers.
D.ItprovidesenhancedHTTPSapplicationdetectionforAsyncOS.
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/td/docs/security/wsa/wsall7/user_guide/b_WSA_U
serGuide_ll_7/b_WSA_UserGuide_ll_7_chapter_01011.html
QUESTION72
WhatistheprimaryroleoftheCiscoEmailSecurityAppliance?
A.MailSubmissionAgent
B.MailTransferAgent
C.MailDeliveryAgent
D.MailUserAgent
CorrectAnswer:B
Section:(none)
Explanation
Explanation/Reference:
QUESTION73
WhichtwofeaturesofCiscoDNACenterareusedinaSoftwareDefinedNetworksolution?(Choose
two.)
A.accounting
B.assurance
C.automation
D.authentication
E.encryption
CorrectAnswer:BC
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/products/cloud-systems-management/dna-
center/index.html
QUESTION74
Whichcloudservicemodeloffersanenvironmentforcloudconsumerstodevelopanddeploy
applicationswithoutneedingtomanageormaintaintheunderlyingcloudinfrastructure?
A.PaaS
B.XaaS
C.laaS
D.SaaS
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
QUESTION75
WhatisarequiredprerequisitetoenablemalwarefilescanningfortheSecureInternetGateway?
A.EnableIPLayerenforcement.
B.ActivatetheAdvancedMalwareProtectionlicense
C.ActivateSSLdecryption.
D.EnableIntelligentProxy.
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
QUESTION76
WhichtwofeaturesareusedtoconfigureCiscoESAwithamultilayerapproachtofightvirusesand
malware?(Choosetwo.)
A.Sophosengine
B.whitelist
C.RAT
D.outbreakfilters
E.DLP
CorrectAnswer:AD
Section:(none)
Explanation
Explanation/Reference:
QUESTION77
HowisCiscoUmbrellaconfiguredtologonlysecurityevents?
A.perpolicy
B.intheReportingsettings
C.intheSecuritySettingssection
D.pernetworkintheDeploymentssection
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
Reference:/deployment-umbrella/docs/log-management
QUESTION78
WhatistheprimarydifferencebetweenanEndpointProtectionPlatformandanEndpointDetection
andResponse?
A.EPPfocusesonprevention,andEDRfocusesonadvancedthreatsthatevadeperimeterdefenses.
B.EDRfocusesonprevention,andEPPfocusesonadvancedthreatsthatevadeperimeterdefenses.
C.EPPfocusesonnetworksecurity,andEDRfocusesondevicesecurity.
D.EDRfocusesonnetworksecurity,andEPPfocusesondevicesecurity.
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/products/security/endpoint-security/what-is-
endpoint-detection-response-edr.html
QUESTION79
OnwhichpartoftheITenvironmentdoesDevSecOpsfocus?
A.applicationdevelopment
B.wirelessnetwork
C.datacenter
D.perimeternetwork
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
QUESTION80
WhichfunctionsofanSDNarchitecturerequiresouthboundAPIstoenablecommunication?
A.SDNcontrollerandthenetworkelements
B.managementconsoleandtheSDNcontroller
C.managementconsoleandthecloud
D.SDNcontrollerandthecloud
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
QUESTION81
Whatisacharacteristicoftrafficstormcontrolbehavior?
A.Trafficstormcontroldropsallbroadcastandmulticasttrafficifthecombinedtrafficexceedsthe
levelwithintheinterval.
B.Trafficstormcontrolcannotdetermineifthepacketisunicastorbroadcast.
C.Trafficstormcontrolmonitorsincomingtrafficlevelsovera10-secondtrafficstormcontrolinterval.
0.TrafficstormcontrolusestheIndividual/Groupbitinthepacketsourceaddresstodetermineifthe
packetisunicastorbroadcast.
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/td/docs/routers/7600/ios/121E/configuration/guide
/storm.html
QUESTION82
WhichtworequestofRESTAPIarevalidontheCiscoASAPlatform?(Choosetwo.)
A.put
B.options
C.get
D.push
E.connect
CorrectAnswer:AC
Section:(none)
Explanation
Explanation/Reference:
Reference:https://www.cisco.eom/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
QUESTION83
InaPaaSmodel,whichlayeristhetenantresponsibleformaintainingandpatching?
A.hypervisor
B.virtualmachine
C.network
D.application
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
Reference:https:〃/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-
how-to-choose/
QUESTION84
AnengineerisconfiguringAMPforendpointsandwantstoblockcertainfilesfromexecuting.Which
outbreakcontrolmethodisusedtoaccomplishthistask?
A.deviceflowcorrelation
B.simpledetections
C.applicationblockinglist
D.advancedcustomdetections
CorrectAnswer:C
Section:(none)
Explanation
Explanation/Reference:
QUESTION85
WhichASAdeploymentmodecanprovideseparationofmanagementonasharedappliance?
A.DMZmultiplezonemode
B.transparentfirewallmode
C.multiplecontextmode
D.routedmode
CorrectAnswer:C
Section:(none)
Explanation
Explanation/Reference:
QUESTION86
WhichtwodeploymentmodelconfigurationsaresupportedforCiscoFTDvinAWS?(Choosetwo.)
A.CiscoFTDvconfiguredinroutedmodeandmanagedbyanFMCvinstalledinAWS
B.CiscoFTDvwithonemanagementinterfaceandtwotrafficinterfacesconfigured
C.CiscoFTDvconfiguredinroutedmodeandmanagedbyaphysicalFMCapplianceonpremises
D.CiscoFTDvwithtwomanagementinterfacesandonetrafficinterfaceconfigured
E.CiscoFTDvconfiguredinroutedmodeandIPv6configured
CorrectAnswer:AC
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/products/collateral/security/adaptive-security-
virtual-appliance-asav/white-paper-cll-740505.html
QUESTION87
WhatcanbeintegratedwithCiscoThreatIntelligenceDirectortoprovideinformationaboutsecurity
threats,whichallowstheSOCtoproactivelyautomateresponsestothosethreats?
A.CiscoUmbrella
B.ExternalThreatFeeds
C.CiscoThreatGrid
D.CiscoStealthwatch
CorrectAnswer:C
Section:(none)
Explanation
Explanation/Reference:
QUESTION88
Whatprovidesvisibilityandawarenessintowhatiscurrentlyoccurringonthenetwork?
A.CMX
B.WMI
C.PrimeInfrastructure
D.Telemetry
CorrectAnswer:C
Section:(none)
Explanation
Explanation/Reference:
QUESTION89
WhichattackiscommonlyassociatedwithCandC++programminglanguages?
A.cross-sitescripting
B.waterholing
C.DDoS
D.bufferoverflow
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
Reference:/wiki/Buffer_overflow
QUESTION90
Anengineermustforceanendpointtore-authenticateanalreadyauthenticatedsessionwithout
disruptingtheendpointtoapplyaneworupdatedpolicyfromISE.WhichCoAtypeachievesthis
goal?
A.PortBounce
B.CoATerminate
C.CoAReauth
D.CoASessionQuery
CorrectAnswer:C
Section:(none)
Explanation
Explanation/Reference:
QUESTION91
SysauthcontrolEnabled
DotlxProtocolVersion3
DotlxInfoforGigabitEthernetl/0/12
PAEAUTHENTICATOR
PortcontrolFORCE__AUTHORIZED
ControlDirection=Both
HostModeSINGLE__HOST
QuietPeriod60
ServerTimeout0
SuppTimeout30
ReAuthMax2
MaxReq2
TxPeriod30
Refertotheexhibit.Whichcommandwasusedtodisplaythisoutput?
A.showdotlxall
B.showdotlx
C.showdotlxallsummary
D.showdotlxinterfacegil/0/12
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/td/docs/ios-xml/ios/sec_usr8021x/configuration/xe-
3se/3850/sec-user-8021x-xe-3se-3850-book/config-ieee-802x-pba.html
QUESTION92
WhichtwopreventiontechniquesareusedtomitigateSQLinjectionattacks?(Choosetwo.)
A.Checkinteger,float,orBooleanstringparameterstoensureaccuratevalues.
B.Usepreparedstatementsandparameterizedqueries.
C.Securetheconnectionbetweenthewebandtheapptier.
D.WriteSQLcodeinsteadofusingobject-relationalmappinglibraries.
E.BlockSQLcodeexecutioninthewebapplicationdatabaselogin.
CorrectAnswer:AB
Section:(none)
Explanation
Explanation/Reference:
Reference:/wiki/SQL_injection
QUESTION93
HowdoesCiscoStealthwatchCloudprovidesecurityforcloudenvironments?
A.Itdeliversvisibilityandthreatdetection.
B.Itpreventsexfiltrationofsensitivedata.
C.ItassignsInternet-basedDNSprotectionforclientsandservers.
D.Itfacilitatessecureconnectivitybetweenpublicandprivatenetworks.
CorrectAnswer:A
Section:(none)
Explanation
Explanation/Reference:
Reference:
/SHIcom/ContentAttachmentlmages/SharedResources/FBLP/Cisco/Ci
sco-091919-Simple-IT-Whitepaper.pdf
QUESTION94
WhichtwoapplicationlayerpreprocessorsareusedbyFirepowerNextGenerationIntrusionPrevention
System?(Choosetwo.)
A.SIP
B.inlinenormalization
C.SSL
D.packetdecoder
E.modbus
CorrectAnswer:AC
Section:(none)
Explanation
Explanation/Reference:
Reference:/c/en/us/td/docs/security/firepower/60/configuration/guide/
fpmc-config-guide-v60/Application_Layer_Preprocessors.html
QUESTION95
WhichfeatureisconfiguredformanageddevicesinthedeviceplatformsettingsoftheFirepower
ManagementCenter?
A.qualityofservice
B.timesynchronization
C.networkaddresstranslations
D.intrusionpolicy
CorrectAnswer:B
Section:(none)
Explanation
Explanation/Reference:
QUESTION96
ThemainfunctionofnorthboundAPIsintheSDNarchitectureistoenablecommunicationbetweenwhich
twoareasofanetwork?
A.SDNcontrollerandthecloud
B.managementconsoleandtheSDNcontrollerC.managementconsoleandthecloud
D.SDNcontrollerandthemanagementsolution
CorrectAnswer:D
Section:(none)
Explanation
Explanation/Reference:
QUESTION97
Gatewayoflastresortis1.1.1.1tonetwork0.0.0.0
S*0.0.0.0[1/0]via1.1.1.1zoutside
Cisdirectlyconnectxoutside
S[1/0]via,inside
Cisdirectlyconnected,inside
Cisdirectlyconnected,dmz
S(1/0]via,dmz
access-listredirect-aclpermitipany
access-listredirect-aclpermitipany
class-mapredirect-class
matchaccess-listredirect-acl
policy-mapinside-policy
class
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 食材經(jīng)銷合同范本
- 華人打工合同范本
- 焊接管道合同范本
- 高端生鮮預(yù)售合同范本
- 塔牌租賃合同范本
- 廣州幼兒師范高等??茖W(xué)?!豆こ探Y(jié)構(gòu)》2023-2024學(xué)年第一學(xué)期期末試卷
- 2025屆四川省成都市溫江區(qū)第二區(qū)初三下第三次大考化學(xué)試題含解析
- 景德鎮(zhèn)陶瓷大學(xué)《儀器分析(實驗)》2023-2024學(xué)年第二學(xué)期期末試卷
- 六盤水幼兒師范高等專科學(xué)?!锻艘圮娙耸聞?wù)概論》2023-2024學(xué)年第二學(xué)期期末試卷
- 大連汽車職業(yè)技術(shù)學(xué)院《交際口語(一)》2023-2024學(xué)年第一學(xué)期期末試卷
- 【基于Java的水果商城購物系統(tǒng)設(shè)計與實現(xiàn)10000字(論文)】
- 置業(yè)顧問銷售逼單技巧培訓(xùn)
- 醫(yī)院處方箋模板
- 【工程項目施工階段造價的控制與管理8100字(論文)】
- XX學(xué)校推廣應(yīng)用“國家中小學(xué)智慧教育平臺”工作實施方案
- 非遺文化創(chuàng)意產(chǎn)品設(shè)計 課件全套 第1-5章 概述- 非遺文創(chuàng)產(chǎn)品設(shè)計案例解析
- 法律盡職調(diào)查所需資料清單
- 幼兒園中班安全教育活動《緊急電話的用途》
- 118種元素原子結(jié)構(gòu)示意圖
- 幼兒園行政工作制度
- 廣州新華學(xué)院
評論
0/150
提交評論