刷题
导入试题
【判断题】
对《进出境旅客行李物品和个人邮递物品完税价格表》中未列明的应税物品,可以总署审价办下发的《行邮物品完税价格资料库》参考价格或当事人提供的价格凭证作为完税价格
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
在海关行政处罚案件中,“物品价值”是指进出境物品的完税价格与进口税之和
A. 对
B. 错
【单选题】
便携式放射性检测仪在测量本底值的时候需要测量()个点,再取平均值作为本底值。___
A. 1-3
B. 2-4
C. 3-5
D. 4-6
【单选题】
便携式放射性检测仪在测量本底值的时候需将检测仪探头置于测量点上方距地面()高处。___
A. 60cm
B. 80cm
C. 100cm
D. 120cm
【单选题】
便携式放射性检测仪在测量本底值的时候,每个测量点要测量()次,取平均值作为该点的本底值。___
A. 3
B. 5
C. 10
D. 20
【单选题】
在进行放射性物质监测工作时,检疫人员一次性短时间工作的受照剂量限值为()。___
A. 1mSv
B. 5mSv
C. 1μSv
D. 5μSv
【单选题】
检疫人员在对放射性物质测量,处置的时候必须对自己的受照剂量进行记录,每人每年累计计量不得超过()。___
A. 5mSv
B. 20mSv
C. 5μSv
D. 20μSv
【单选题】
利用便携式放射性检测仪器监测,距待检物表面0.1m处任一点的剂量当量率不小于()的,为放射性超标。___
A. 5mSv
B. 1mSv
C. 5μSv
D. 1μSv
【单选题】
通道式放射性监测系统在实行实时监测时。一般系统设定报警阈值为本底值的()倍。___
A. 1
B. 2
C. 3
D. 4
【单选题】
在监测被放射性物质大面积污染的集装箱.火车.轮船等选点应为()。___
A. 不少于12个
B. 不少于10个
C. 不少于8个
D. 不少于6个
【单选题】
γ放射剂量当量率的计算公式是()。___
A. (仪器测得的剂量当量率-仪器测得的本底值)×校正系数
B. (仪器测得的剂量当量率+仪器测得的本底值)×校正系数
C. 仪器测得的剂量当量率×校正系数-仪器测得的本底值
D. 仪器测得的剂量当量率-仪器测得的本底值×校正系数
【单选题】
放射性物质放射活度的单位是()。___
A. Sv
B. Bq
C. Gy
D. Rem
【单选题】
剂量当量的单位是()。___
A. Sv
B. Bq
C. Gy
D. Rad
【单选题】
吸收剂量的单位是()。___
A. Sv
B. Bq
C. Gy
D. Ram
【单选题】
在测量物体γ放射剂量当量时,测量仪器必须在距物体表面()处进行测量。___
A. 1-3cm
B. 2m
C. 1m
D. 0.1m
【单选题】
放射性物质α表面污染超标的判定标准是()。___
A. 4Bq/cm2
B. 0.4Bq/cm2
C. 0.04Bq/cm2
D. 0.004Bq/cm2
【单选题】
放射性物质β表面污染超标的判定标准是()。___
A. 4Bq/cm2
B. 0.4Bq/cm2
C. 0.04Bq/cm2
D. 0.004Bq/cm2
【单选题】
放射性物质γ辐射超标的判定标准是()。___
A. 1μSv/h
B. 1mSv/h
C. 1pSv/h
D. 1fSv/h
【单选题】
在对不能排除恐怖事件的放射性超标的情况,检疫人员应该以()为界线,向四周扩展()米,划出放射性安全警戒线。___
A. 1μSv/h;2
B. 1μSv/h;6
C. 0.1mSv/h;2
D. 0.1mSv/h;6
【单选题】
在检测物体α.β表面污染时,仪器探头应以不大于()速度移动。___
A. 5cm/s
B. 15cm/s
C. 10cm/s
D. 50cm/s
【单选题】
在检测物体α.β表面污染时,仪器探头应该距离被测物体表面()处进行。___
A. 1-3cm
B. 2m
C. 1m
D. 0.1m
【单选题】
对向外发射γ射线的物体,应将其置于()内,能够最大幅度降低其散布能量。___
A. 铅桶封存
B. 水或石蜡封存
C. 塑料盒封存
D. 大理石封存
【单选题】
对向外发射中子的物体,应将其置于()内,能够最大幅度降低其散布能量。___
A. 铅桶封存
B. 水或石蜡封存
C. 塑料盒封存
D. 大理石封存
【单选题】
Ci是以著名的波兰科学家居里命名的放射性强度的单位。自1985年起正式改用贝可(Bq)新单位。换算关系为:1Ci=()Bq。___
A. 1.4×10-9
B. 2.6×10-10
C. 3.7×1010
D. 2.8×1010
【单选题】
戈瑞(Gy)是()的国际单位,1Gy代表1kg被辐照物质吸收1J的能量。___
A. 剂量当量
B. 剂量当量率
C. 吸收剂量
D. 放射活度
【单选题】
处置放射性有害因子过程中,戴口罩的目的在于()。___
A. 减少受照时间
B. 远离放射源
C. 防止沾染放射性因子的粉尘摄入
D. 加强屏蔽
【单选题】
下列放射性射线中对人体危害最大的是:___
A. α射线
B. β射线
C. γ射线
D. 中子
【单选题】
辐射强度与距离的关系是:___
A. 与距离成正比
B. 与距离成反比
C. 与距离的平方成正比
D. 与距离的平方成反比
【单选题】
下列材料中对γ射线屏蔽效果最好材料是:___
A. 铝板
B. 铁板
C. 铅板
D. 含有贫铀涂层的铅板
【单选题】
国际原子能机构规定普通公众辐射暴露的限度是:___
A. 1mSv/年
B. 2mSv/年
C. 3mSv/年
D. 4mSv/年
【单选题】
国际原子能机构规定从事放射性岗位的从业人员辐射暴露的限度是:___
A. 10mSv/年
B. 20mSv/年
C. 30mSv/年
D. 40mSv/年
【单选题】
下列材料中对中子屏蔽效果最好材料是:___
A. 铝板
B. 铁板
C. 铅板
D. 水
【单选题】
门户式辐射探测器最终做出结案处理的部位是:___
A. 一检报警站
B. 二检报警站
C. 中央报警站
D. 服务器机房
【单选题】
门户式辐射探测器在安装时错开放置是为了:___
A. 便于安装
B. 节省空间
C. 美观实用
D. 降低串扰
【单选题】
一检报警站通常安装在:___
A. 靠近卡口的位置
B. 靠近探测器的位置
C. 靠近中央报警站的位置
D. 靠近服务器的位置
【单选题】
当没有物体通过时,门户式辐射探测器处于什么状态:___
A. 本底模式
B. 静态模式
C. 探测模式
D. 动态模式
【单选题】
为了有效的进行探测,必须严格控制车辆通过门户式辐射探测器时的车速,最佳的车速是:___
A. 5km/h
B. 8km/h
C. 10km/h
D. 12km/h
【单选题】
雨雪天气可能会造成门户式辐射探测器的读数:___
A. 比平时高
B. 比平时低
C. 不确定
D. 无变化
【单选题】
PRD最主要的用途是:___
A. 个人防护
B. 搜索放射源
C. 识别核素
D. 记录累计计量
【单选题】
门户式辐射探测器进行伽马探测的核心部件是:___
A. 闪烁塑料探测器
B. 碘化钠探测器
C. 高纯锗探测器
D. 氦-3气体探测器
【单选题】
门户式辐射探测器进行中子探测的核心部件是:___
A. 闪烁塑料探测器
B. 碘化钠探测器
C. 高纯锗探测器
D. 氦-3气体探测器
推荐试题
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用