下载
加入VIP
  • 专属下载特权
  • 现金文档折扣购买
  • VIP免费专区
  • 千万文档免费下载

上传资料

关闭

关闭

关闭

封号提示

内容

首页 CISP模拟题3及答案(CISP simulation questions 3 and answ…

CISP模拟题3及答案(CISP simulation questions 3 and answers).doc

CISP模拟题3及答案(CISP simulation que…

芭bi娃娃kong
2017-09-26 0人阅读 举报 0 0 暂无简介

简介:本文档为《CISP模拟题3及答案(CISP simulation questions 3 and answers)doc》,可适用于领域

CISP模拟题及答案(CISPsimulationquestionsandanswers)CISP模拟题及答案(CISPsimulationquestionsandanswers)departmentOneCISPsimulationexercises()ModelandguaranteesystemInformationsecuritysystemInformationsecuritymodelInformationsecurityassessmentcertificationWhichofthefollowingmodelscanbeusedtoprotecttheconfidentialityofhierarchicalinformationAmodelandBibamodelBellLapadulaBBellLapadulamodelandinformationflowmodelCBellLapadulamodelandClarkWilsonmodelDClarkWilsonmodelandinformationflowmodelAnswer:BReference:Theoryandtechnology,PMultilevelsecuritymodel:BellLapadulamodel(confidentiality),ClarkWilsonmodel(integrity),Bibamodel(endIntegrityMultilateralsecuritymodel:Chinese,Wallmodel,BMAmodelConfidentialitymodel:,informationflowmodel(nonintrusive,nonobserver),accesscontrolmodel:MACmandatory(BLP,Chinese,Wall),DAC,autonomic,RBAC,rolebasedaccesscontrolIntegritymodel:ClarkWilsonmodel,Bibamodel,inwhichsecuritymodelisthesystemaccessatleastatthetoplevelsecureAmultilevelsecuritymodelBDedicatedsecuritymodelCCompartmenamousTCSECAISOBIECCCNITSECD,DODAnswer:DWhatisthelayerconceptualmodelofTCPIPprotocolAapplicationlayer,transportlayer,networklayerandnetworkinterfacelayerBapplicationlayer,transportlayer,networklayerandphysicallayerCapplicationlayer,datalinklayer,networklayerandnetworkinterfacelayerDsessionlayer,datalinklayer,networklayerandnetworkinterfacelayerAnswer:AReference:Theoryandtechnology,P,standardsandregulations,PWhatarethemainpartsoftheCCstandardAprofilesandgeneralmodels,safetyfunctionalrequirements,safetyassurancerequirements,andguidelinesforthegenerationofPPandSTBprofilesandgeneralmodels,safetyfunctionalrequirements,safetyassurancerequirementsCgeneralassessmentmethods,safetyfunctionalrequirements,safetyassurancerequirementsBriefintroductiontoDandgeneralmodel,safetyrequirements,PPandSTproductionguidelinesAnswer:BIn,thethreetierstructureofsecurityassurancerequirementsinCCis(inorderoforderfromlargetosmall)Aclass,subclass,elementBcomponents,subclasses,elementsCclasses,subclasses,componentsDsubclasses,components,andelementsAnswer:CHowmanylevelsofassessmentassurancelevel(EAL)arethereinandCCA,levelB,leveldepartmentFourC,levelD,levelAnswer:BIntheandCC,whatlevelofevaluationguaranteeclass(EAL)correspondstoTCSECandITSECTheAcorrespondstotheTCSECBclass,correspondingtotheITSECEclassTheBcorrespondstotheTCSECCclass,correspondingtotheITSECEclassTheCcorrespondstotheTCSECBclass,correspondingtotheITSECEclassTheDcorrespondstotheTCSECCclass,correspondingtotheITSECEclassAnswer:CReference:standardsandregulations,P,P:payattentiontotherules,firstcorrespondingtoITSECEAL:CEEAL:CEEAL:BEEAL:BEEAL:BEEAL:AE,thesecurityrequirementsinPPdonotincludewhichofthefollowing(safetyenvironment)AassumptionsabouttheenvironmentB'sthreattoassetsCorganizationsecuritypolicyDITguaranteessafetyrequirementsAnswer:D,whatarethefourbusinessesoftheChinainformationsecurityproducttestingandCertificationCenterAproducttestingandcertificationBinformationsystemsecurityevaluationcertificationCinformationsystemsecurityservicequalificationcertificationDCertifiedInformationSecurityProfessionalQualificationAnswer:ABCD,whatarethestandardizationorganizationsofinformationtechnologysecurityAISOIECBITUAnswer:ABReference:standardsandregulations,P,P,PInternationalOrganizationforStandardization:ISO(InternationalOrganizationforStandardization)andIEC(InternationalElectrotechnicalCommission)ISOInternationalOrganizationforStandardization(foundedin)IECInternationalElectricityCommitteeISOIECJTC:inchargeofinternationalstandardsinthefieldofinformationtechnologyISOIECJTCSC:specializesinthedevelopmentofstandardsforgeneralinformationtechnology,securitytechnology,andsecuritymechanismsISOIEC,JTCSC,SC,SC,SC,SC,SCandothersubtechnicalcommittees:undertakeonerespectivelyThedevelopmentofsomeinformationtechnologysecuritystandardsISOTC:responsibleforthedevelopmentofindustryapplicationinformationsecuritystandardsTheITUTInternationalTelecommunicationsUnion'sTelecommunicationsStandardizationdivision,aloneorinconjunctionwithISOIEC,setsstandardsOther:ISOTC:qualitymanagementandqualityassurancetechnicalcommitteeformulatedtheISOfamilystandardsdepartmentFive,whatisthewordingoftherecommendednationalstandardsinChinaAGBT,thewritingofcompulsorynationalstandardsinourcountryAGBWhataretheinternationalstandardscorrespondingtoandCCAISOIEC,CCcorrespondingnationalstandards,whatisitAGBT,aboutPP,whichoneiscorrectAisacompletesetoffunctionsandguaranteerequirementsforasetofsecurityobjectsforaclassofproductsorsystemsAreusesetisanabstractionofavarietyofapplicationsBisgenerallyproposedbyusersChasnothingtodowithimplementationDisusefulforbothbusinessbusinessowners,users,developers,evaluators,andauditorsAnswer:A,B,C,DReference:standardsandregulations,P,foraclassofproductsorsystems:setasetofsecurityobjectsforasetoffunctionsandguaranteerequirementsofacompleteset,Reusablecollections,abstractionsforavarietyofapplications,generallyproposedbytheuser,similartothetenderbook,whatneeds(need),PPisthebasicrequirementsofusers,userswanttoreachTowhatextent,nothingtodowiththeimplementation(implementationindependent),usefulforbothbusinessbusinessowners,users,developers,evaluators,andauditors,aboutST,whichoneiscorrectAforspecificTOEBisprovidedbydevelopersChasnothingtodowithimplementationDisrelatedtoimplementationAnswer:ABDReference:standardsandregulations,P,forspecificTOE,suchasWindows,providedbydevelopers,similartothetender,whattoprovide(provide),relatingtoimplementation(implementationdependent)WhatistheandCCstandardEALAsystemtestingandinspectionReference:standardsandregulations,P,China'sstandardisdividedintoseverallevelsLevelALevelBLevelCLevelDAnswer:BdepartmentSixThree,networktechnologyFirewalltechnologyIDSCryptographyPKICAVPNFour,operatingsystemanddatabaseWindowssecuritymanagementUnixsecuritymanagementDatabasesecuritymanagementMaliciouscodeSecureprogrammingSecurityattackanddefenseNetworkandcommunicationsecurity,whichlayerdoesnotprovideconfidentialservicesinOSIApresentationlayerBtransportlayerCnetworklayerDsessionlayerAnswer:DReference:standardsandregulations,tablePerrors,"theoryandtechnology"P,Table,layerfifth,thesessionlayerdoesnotprovideSecurityserviceWhichofthefollowingdoesnotbelongtooneoftheservicesbasedonthesecurityarchitectureoftheOSIsevenlayerprotocolAdataintegrityBdataconfidentialityCnotaryDnonrepudiationAnswer:CReference:Theoryandtechnology,P,standardsandregulations,Psecurityservices:authenticationservices,accesscontrol,dataintegrity,dataconfidentiality,andnonrepudiation,testingdatabaseapplications,themainriskisAunauthorizedusersexecutethe"ROLLBACK"commandBunauthorizedusersexecutethe"COMMIT"commandCunauthorizedusersexecutethe"ROLLFORWARD"commandDunauthorizedusersmodifyrowsinthedatabaseAnswer:DWhatisthepropertestsequenceoftheapplicationsoftwareAintegrationtest,unittest,systemtestandacceptancetestBunittest,systemtest,integrationtestandacceptancetestCacceptancetest,unittest,integrationtest,systemtestDunittest,integrationtest,systemtestandacceptancetestAnswer:D,therearerelationaldatabasetables,eachtablehastwolines,threecolumns,ifthereareusersoftheseformsonlydepartmentSevenReadaccess,thenhowmanysecurityauthorizationsareallocatedtoguaranteethetablelevelsecurityrequirementsABCDAnswer:AwhichofthefollowingsecurityfeaturesandmechanismsareuniquetotheSQLdatabaseAidentificationandidentificationBtransactionmanagementCauditDfaulttolerancemechanismAnswer:BWhatcomponentdoestheSQLdatabaseusetosaverealdataASchemasBSubschemasCformDViewsAnswer:CWhatarethecharacteristicsofrelationaldatabasetechnologydeterminedbythefollowingelementsArowsandcolumnsBnodesandbranchesC,Blocks,andArrowsDparentclassandsubclassAnswer:A,whatarethedisadvantagesofthedistributedrelationaldatabasecomparedwiththecentralizeddatabaseAAutonomyBreliabilityCflexibilityDdatabackupAnswer:D,doesnotbelongtothedatabaseencryptionmethodisAofflibraryencryptionBlibraryencryptionChardwaresoftwareencryptionDdedicatedencryptionMiddlewareAnswer:DReference:Theoryandtechnology,P,whichstepscanbeignoredbeforethedatabaseisopenedtotheInternetAsecurelyinstallsandconfigureoperatingsystemsanddatabasesystemsTheBapplicationsystemhasbeenrunningintheintranetformonthsCperformssecuritychecksonapplicationssuchasWEBpages,ASPscripts,andsoonDnetworksecuritypolicyhasbecomeeffectivedepartmentEightAnswer:BReference:externalnetworktestoperation,putthenetworkmeaningless,inpracticalapplications,whichofthefollowingformsofencryptionissafeandconvenientAselectiverecordingencryptionBselectivefieldencryptionCdatatableencryptionTableencryptionofDsystemAnswer:BReference:thefinerthegranularityofencryption,themorecomplexthealgorithmsystemtableencryptiontoreduceperformance,memoryconsumption,timeandspacecostsarehigh,butcountSimplemethod,theroleoffirewalls:Aimplementsacompany'ssecuritypolicyBcreatesablockingpointCrecordsInternetactivityDlimitsnetworkexposureAnswer:ABCD,thegeneralfirewallcannotachievethefollowingfunctionsAisolatescompanies,networks,anduntrustednetworksBpreventsvirusesandvirusesfromtrojansCisolatedintranetDprovidessinglepointmonitoringAnswer:BReference:Generalfirewall,canpartiallymonitorthevirus(noviruslibrary),butcannotfilter,takeintoaccountthespeed,mostlyanticreepWorms,IPheads,whichisthesafestlocationforaHTTPserverthatneedstocommunicatewiththeInternetAisinsidetheDMZareaBisintheintranetTheCandthefirewallareonthesamecomputerDisoutsidetheInternetFirewallAnswer:A,allowingfirewallsandcertainrouterstohidenetworkaddressesbyhidingaddressesintountrustednetworksiscalledAaddressfilteringBNATCinversionDIPspoofingAnswer:B,thedrawbackofafirewallisthatthereisnowaytoanalyzepacketsfromthesubtleties,butithastheadvantageofbeingveryfastWhichofthefollowingisthewallAcircuitlevelgatewayBapplicationlevelgatewayCsessionlayerfirewallDpacketfilterfirewallAnswer:DdepartmentNinewhichofthefollowingfirewallsistheslowestandrunsatthetopoftheOSImodelAcircuitlevelgatewayBapplicationlevelgatewayCsessionlayerfirewallDpacketfilterfirewallAnswer:B""and"DMZ"meansAdemilitarizedzoneWherepublicservicesareplacedontheBnetworkwhichoneisthecorrectdescriptionofthecircuitlevelgatewayReference:circuitlevelgateways,alsocalledcircuitrelaysorTCPagents,workinthesamewayasapplicationagents,anddifferfromtheagentsTheprogramisspeciallydesignedforthetransportlayerTCPprotocolWhichoneisthecorrectdescriptionoftheapplicationlevelgatewayReference:alsocalledapplicationlevelproxy,whichactsontheapplicationlayer,ischaracterizedbycompletelyblockingthenetworktrafficflowthrougheachapplicationTheservicecreatesaspecializedagentthatimplementstheroleofmonitoringandcontrollingapplicationlayercommunicationflowswhichoneisthecorrectdescriptionofpacketfilteringReference:functionatnetworklayerandtransportlayer,accordingtogrouping,Baotousourceaddress,destinationaddressandportnumber,protocoltypeandsoonDetermineswhetherpacketsareallowedtopassOnlypacketsthatsatisfythefilterlogicareforwardedtothecorrespondingdestinationexitPacketsarelostfromthedatastreamwhichoneisthecorrectdescriptionoftheproxyserverReference:ahighlevelapplicationconnectiononbehalfofaninternalhostthatcompletelyinterruptsthenetworklayerconnectionbetweentheinternalhostandtheexternalhostwhichoneisthecorrectdescriptionofthebastionhostReference:anapplicationlayergatewayisoftencalledabastionhostItisdividedintosinglehost,bastionhost,dualhost,bastionhost,singlepurposeAbastionhostaninternalbastionhost,underLinuxbuildafirewallmainpointsandmattersneedingattention,howtobuildafirewallbasedontheuser'senvironmentReference:dividingthenetworkthatneedsprotection,determiningtheintranetandIntranet,installingandsettingaccesspolicies,howtoconfigurefirewallpolicyReference:accessrequirements,firstallocation,efficiency,access,priority,bigrule,smallrule,ACL,sizeclass,Determinethewindow,thepriorityofthepolicy,thematch,thesmallrulefirst,thebigrule(thescopeoftherule),thesameevent,onlyreportedonce,Justmatchandquit,aboutthedescriptionofVPN,whichoneisincorrectAandVPNareextensionsofenterprisenetworksonpublicnetworkssuchastheinternetBandVPNcreateasecureprivateconnectionthroughaprivatechannel,remoteusers,companybranches,Thecompany'sbusinesspartners,etc,areconnectedtotheenterprisetoformanextendedcorporatenetworkCandVPNbuildtheirownsecuredatatunnelsonpublicdatanetworksbyusingspecificsecuritytechnologiesThedataistransmittedoverthepublicnetworkandthecorrespondingencryptionandauthenticationtechniquesareusedtoensurethattheuserdataisonthepublicnetworkTransmissionsecurity,soastoachievethetransmissioneffectoftelecommunicationlineDprovideshighperformanceandlowpriceInternetaccessdepartmentTenAnswer:DReference:highperformance,lowprice,butnotInternetaccess,aboutthecorrectdescriptionofSA(Security,Association)Reference:acommonagreementestablishedbynegotiationbetweentwoIPSeccommunicationentitiesItspecifiestheuseofcommunicationbetweenthetwopartiesIPSecprotocoltoprotectdatasecurity,applicationalgorithmidentification,encryptionandverificationofkeyvalues,andthekeylifecycleWaitforsecurityattributevalues,IPSECimplementationmodelAtunnelingmodeBtransportmodeWhatistheprotocolusedbyVPNbasedonIPSEC,thepurposeofkeyexchangeAestablishesconsistentsecurityalliancesandsharedkeysforbothIPSeccommunicationparties,theprocessofkeyexchangeAphase:establishasecureandreliablechannelforthekeyexchangeitselfPhaseBtwo:negotiateandcalculatethefinaldataunderthischannelprotectionAnswer:AB,thealgorithmusedinkeyexchangeAandDiffleHellmenalgorithm(IKE),PPDRCryptographyconsistsoftwoopposingbranchesAsymmetricencryptionandasymmetricencryptionBcryptographyandcryptanalysisCsequencealgorithmandgroupingalgorithmD,DES,andRSAAnswer:B,encryptiontechnologycannotprovidewhichofthefollowingsecurityservicesAidentificationBconfidentialityCintegrityDavailabilityAnswer:DInandnineteenthCentury,Kerchoffswrotetheprinciplesofmoderncryptography,oneofwhichistheprincipleofencryptionsystemsecurityThesecurityoftheAencryptionsystemdependsontheencryptionmethodsusedThesecurityofBencryptionsystemdependsonwhethertousesymmetricorasymmetricencryptionThesecurityoftheCencryptionsystemdependsonthekeyusedThesecurityoftheDencryptionsystemdependsonwhetherornottheencryptionmethodusedisunknownAnswer:CIncryptography,whatistheoriginalmessagethatneedstobetransformeddepartmentElevenAciphertextBalgorithmCpasswordDplaintextAnswer:DIntheKaisercode,howmanylettersarefollowedbyeachletterABCDAnswer:C,whichpasswordalgorithmisabsolutelyimpossibletocrackthealgorithmADESBOTPCIDEADRCAnswer:B,BC,theancientGreeksusedafamousencryptionmethod,whatisthenameAScytalepasswordBKaisercodeCinsteadofcipherDsubstitutioncipherAnswer:A,onceadensegarbled,notewhichofthefollowingtwopointsTheAkeylettermustbetrulyrandomBkeyletterscannotbereusedTheCkeycannotbereusedDencryptionalgorithmsmustbekeptsecretAnswer:AC,incryptography,thedescriptionofRSAiscorrect,isn'titARSAisasecretkeyalgorithmandasymmetrickeyalgorithmBRSAisanasymmetrickeyalgorithmandapublickeyalgorithmCRSAisasecretkeyalgorithmandanasymmetrickeyalgorithmDRSAisapublickeyalgorithmandasymmetrickeyalgorithmAnswer:BWhatisthekeylengthofandbitDESABCDAnswer:BWhatisthekeylengthofandbitIDEAdepartmentTwelveABCDAnswer:D,whatisthebiggestinconvenienceforRSAAgenerateskeysthatrequirepowerfulcomputingpowerAlargenumberisrequiredintheBalgorithmCalgorithmrequiresprimenumbersDhasbeenattackedmanytimesAnswer:AtypicalmilitaryEnigamacomponentsareArunners,blocks,reflectorsBrunners,blocks,reflectorsCrunners,blocks,reflectorsDrunners,blocks,reflectorsAnswer:A""and"ECB"AciphertextlinkmodeBciphertextfeedbackmodelCoutputfeedbackmodeDcodemodeAnswer:DWhichencryptionmethodorbelowneedsdecryptionatthecentralnodeAnodeencryptionBlinkencryptionCendtoendencryptionDapplicationlayerencryptionAnswer:BHowmanybitsofhashvaluearegeneratedbyandMDABCDAnswer:CHowmanybitsofhashvaluearegeneratedbyandMDABCDAnswer:CdepartmentThirteenHowmanybitsofhashvaluearegeneratedbyandSHAABCDAnswer:D,forahashalgorithm,theuseoftwomethodswiththesamehashvalueoftheattackiscalledAdictionaryattackBplaintextattackCciphertextattackDbirthdayattackAnswer:DEverytimeanattackerinsertsaselectedplaintextandinterceptsitsencryptedversion,heidentifiessomestatisticsabouttheencryptionmethodSex"WhatkindofattackisthisAciphertextattackBknownplaintextattackCchosenciphertextattackDselectsplaintextattacksAnswer:DWhatisthehashalgorithmusedinandPGPARSABSHACSHADMDAnswer:BWhatisthesymmetricalgorithmoriginallyusedinandPGPARSABDESCIDEADAESAnswer:WhichEMailstandardwasbuiltonthebasisofwhichandSMIMEAMOSSBPEMCMIMEDPGPAnswer:C,asystemthatusesbothasymmetricencryptionalgorithmandapublickeyencryptionalgorithm,oftenreferredtoasApublickeycryptosystemBsymmetricencryptionsystemChybridencryptionsystemDhashencryptionAnswer:CdepartmentFourteen,thelevelofSETworkisBetweentheAtransportlayerandtheapplicationlayerBtransportlayerCapplicationlayerDnetworklayerAnswer:C,whatdoSSLandSEThaveincommonAaremultipartyauthenticationBcanusetheRSAalgorithmCistransparenttousersDconsumerinformationiscompletelyconfidentialAnswer:BWhat'sthefullnameof""and"SET"AsecurenetworktransactionsBsecureelectronictransactionsCsystematizedelectronictransactionsDelectronicsecuritytransactionsAnswer:B,CAfirstgeneratesitsownprivatekeyandpublickey,howlongisthekeylengthABCDAnswer:A,whichstandarddoesthegeneralcertificateuseAISOIECBISOIECCBSDXvAnswer:D,theRSApublickey(n,e)andthesecretkey(n,d)mustbesatisfiedinEandDAcoprimeBareprimenumbersCed=,mod,nDed=nAnswer:BReference:thesecurityofRSAisbasedonthedifficultyoffactoringlargenumbersPandQaretwolargeprimenumbers(primenumbers),n=PQRandomencryptionkeye,eand(p)(Q)(coprimecoprime)ThedecryptionkeyDiscomputedfromtheEuclideanextensionalgorithm,whichmakesed=,mod(p)(Q),NotethatDandNareeandNarecoprime,publickey,privatekeyisdTwoprimes,PandQ,arenolongerneeded,shouldbeabandoned,butmustnotbedivulgedWhatisthesymmetricalgorithmoriginallyusedinandPGPARSABDESdepartmentFifteenCIDEADAES,whatisthebestwaytodestroythemagneticmediumAformattingBdamageCdegaussingDeleteDAnswer:BReference:whenmostofthefilesaredeletedonacomputer,thefileisnotreallydeletedTheonlythingthatwasdeletedwasTheentryinthediskindexfileThediskindexfileisusedtotellwherethedataonthemachinediskisVirtualmemorymeansthatyourcomputercanwritememorytoyourdiskatanytimeEvenifyoudon'tkeepit,you'llneverknowitWhenisasensitivefileyouarerunningondiskThatis,evenifyouhaveneversavedtheplaintext,Thecomputerdiditforyou,tooDoDrequiresthreewritecoversfordeletingfiles,firstusingoneformat,thenusingthecomplementoftheformat,andfinallyusingtheotherFormatMorerecently,NIST'sstudyofelectrontunnelingmicroscopyhasshownthateventhisisnotenoughIfyourdataisbigenough,orburnorshredthemagneticmedium,buyanewdiskratherthanloseyoursecretMuchbetter,aboutEFS'sstatement,wrongAisvalidonlyontheNTFSpartitionBfilesarestillencryptedwhenEFSencryptedfilesarepostedonthenetworkWhenCmovesunencryptedfilestotheEFSencrypteddirectory,thefilesremainunencryptedD,whichofthefollowingpersonnelsecurityriskisthebiggestamongtheunitsAtemporarystaffBexternalconsultantsCpresentemployeesDoutgoingemployeesAnswer:CReference:theconceptofbelievablebehavior,whatshouldbethefirststepwhenaninvasionisdetectedAunplugthenetBlookatthecurrentsituation,checkwhatmighthavehappened,anddecideonthenextstep,dependingonthesituationCimmediatelyreportedtotheauthoritiesconcernedDshutdown,covertchannelisCCEALlevelrequirementsABCDAnswer:DIsthereaprotocolthatisnotassociatedwithEmailAPEMBPGPCXdepartmentSixteenDX,intheidentificationmethod,inadditiontowhatyouknow,whatyouhave,whatarethecommonlyusedmethodsIntheandPDRmodels,thefollowingdoesnotbelongtotheprotectionofPAfirewallsystemBintrusiondetectionsystemCphysicalaccesscontrolDencryptionHowmanylayersaredividedintoandIeafA,youcanencryptanylengthoftextencryptionalgorithmisADESBDESCstreamencryptionDMDAnswer:D,BiBamodelbelievesthattheriskcomesmainlyfrom,thefollowingstatementoftheChineseWallmodeliscorrectIntheandTCPIPprotocols,theprotocolthatworksatthelowerlevelisASSLBSKIPCSRPCDSMIME,SSECMMplanningandtrackingfocusesonInUnix,thecommandthatliststhecommandlistthathasbeenusedis,whichcommandinUnixcanlistallsuidfilesFive,managementsystem,riskassessmentInformationsecuritymanagementsystemRiskassessmentSafetyengineeringSix,physicalsecurityandemergencyresponsePhysicalsafetyEmergencyresponseDisasterbackupandrecover

用户评价(0)

关闭

新课改视野下建构高中语文教学实验成果报告(32KB)

抱歉,积分不足下载失败,请稍后再试!

提示

试读已结束,如需要继续阅读或者下载,敬请购买!

文档小程序码

使用微信“扫一扫”扫码寻找文档

1

打开微信

2

扫描小程序码

3

发布寻找信息

4

等待寻找结果

我知道了
评分:

/36

CISP模拟题3及答案(CISP simulation questions 3 and answers)

VIP

在线
客服

免费
邮箱

爱问共享资料服务号

扫描关注领取更多福利