刷题
导入试题
【判断题】
对没收的犀牛角和虎骨,一律交市级以上林业行政主管部门按规定处理
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
旅客携带伴侣猫进境,须持有输出国(或地区)官方兽医检疫机关出具的检疫证书和狂犬病免疫证书向海关申报
A. 对
B. 错
【判断题】
外国国宾代表团入境访问结束后,随行记者应及时将采访器材复运出境
A. 对
B. 错
【判断题】
外国短期来华采访记者采访活动结束后,记者应及时将采访器材复运出境,并在出境地海关办理担保函或保证金结案手续
A. 对
B. 错
【判断题】
进出境物品申报手续应由旅客本人填写申报单证向海关办理,不可委托他人
A. 对
B. 错
【判断题】
除随同成人旅行的18周岁以下旅客以外,进出境旅客携带有应向海关申报物品的,须向海关书面申报
A. 对
B. 错
【判断题】
在过境期限内离开海关监管区的过境旅客,携带的行李物品中属于《旅客进出境行李物品分类表》第三类物品的,海关不予放行
A. 对
B. 错
【判断题】
相田真纪是日本驻我国使馆外交代表,他申请免税进境机动车辆时无需向海关递交使馆照会
A. 对
B. 错
【判断题】
氧气设备不属于《中华人民共和国海关关于境外登山团体和个人进出境物品管理规定》中所指的“特准进口物品”范围
A. 对
B. 错
【判断题】
使馆和使馆人员进出境公用、自用物品应当以海关核准的直接需用数量为限
A. 对
B. 错
【判断题】
留学人员在外学习1年以上学成回国工作的,可购买免税国产汽车1辆
A. 对
B. 错
【判断题】
携运、邮寄文物出口,不向海关申报的,不论是否藏匿,均属走私行为
A. 对
B. 错
【判断题】
进境物品归类表中高档手表的完税价格是人民币10000元
A. 对
B. 错
【判断题】
按进境物品归类原则,施华洛世奇水晶首饰应归类在27000000其他物品下
A. 对
B. 错
【判断题】
经海关办理手续并签章交由旅客收执的专用申报单证,在有效期内或在海关监管时限内,旅客应妥善保存,并在申请提取分离运输行李物品或购买征、免税外汇商品或办理其它有关手续时,主动向海关出示
A. 对
B. 错
【判断题】
进出境旅客行李物品,可以通过边境地点进境或者出境。()
A. 对
B. 错
【判断题】
香港人阿发定居北京尚不满两年,因工作需要去美国定居,其免税携运进境的自用物品应复运出境,或依照相关规定向海关补缴进口税
A. 对
B. 错
【判断题】
对台湾人阿九在天津长期学习、工作,他在取得长期居留证件之前,海关按照《中华人民共和国海关对中国籍旅客进出境行李物品的管理规定》验放其携运进出境的行李物品;在取得长期居留证件之后,另按海关对非居民长期旅客和常驻机构进出境公、私用物品的规定办理
A. 对
B. 错
【判断题】
对不予放行的中国籍旅客进出境行李物品,除本人声明放弃外,应在六个月内限本人向海关办理退运手续;逾期不办的,由海关按《中华人民共和国海关法》第五十一条规定处理
A. 对
B. 错
【判断题】
过境旅客获准离开海关监管区,转换交通工具出境的,海关依照短期旅客的规定办理。()
A. 对
B. 错
【判断题】
“进出境旅客旅行自用物品”系指本次旅行途中海关准予旅客随身携带的暂时免税进境或者复带进境的在境内、外使用的自用物品
A. 对
B. 错
【判断题】
《中华人民共和国海关对进出境旅客旅行自用物品的规定》适用于当天或短期内多次往返的进出境旅客旅行自用物品的管理
A. 对
B. 错
【判断题】
“非居民长期旅客”是指经公安部门批准进境并在境内连续居留一年以上(含一年),期满后仍回到境外定居地的外国公民、港澳台地区人员、华侨
A. 对
B. 错
【判断题】
《中华人民共和国海关对外国驻中国使馆和使馆人员进出境物品监管办法》中的“公务用品”是指使馆执行职务直接需用的进出境物品,包括使馆使用的办公用品、办公设备、车辆;使馆主办或者参与的商业性活动所需物品;使馆使用的维修工具、设备;使馆免费散发的广告宣传品;使馆使用的招待用品、礼品等
A. 对
B. 错
【判断题】
象牙、玳瑁等濒危物种制品属于限制进境物品和禁止出境物品
A. 对
B. 错
【判断题】
微生物、生物制品、血液及其制品、人类遗传资源、管制刀具既属于限制进境物品又属于限制出境物品
A. 对
B. 错
【判断题】
因治疗疾病需要,个人凭医疗机构出具的医疗诊断书、本人身份证明,可以携带单张处方最大用量以内的麻醉药品和第一类精神药品;携带麻醉药品和第一类精神药品出入境的,由海关根据自用、合理的原则放行
A. 对
B. 错
【判断题】
考虑到唐卡所具有的丰富宗教含义,现阶段,海关对其应继续按照宗教用品进行监管,不应按照美术品进行管理
A. 对
B. 错
【判断题】
进境宗教印刷品有下列内容或携带人、寄件人有下列行为之一的应予没收:
A. 对
B. 错
【判断题】
进出境载有图文声像信息的磁、光、电存储介质的,属于进出境音像制品的范畴
A. 对
B. 错
【判断题】
印刷品及音像制品进出境,海关难以确定是否载有禁止进出境内容的,依据国务院有关行政主管部门或者其指定的专门机构的审查、鉴定结论予以处理
A. 对
B. 错
【判断题】
因修复、展览、销售、鉴定等原因临时进境的文物,经海关加封后,报文物进出境审核机构审核、登记。文物进出境审核机构查验海关封志完好无损后,对每件临时进境文物进行审核,标明文物临时进境标识并登记。临时进境文物复出境时,海关可径行验放
A. 对
B. 错
【判断题】
运送、携带文物出境,应当在文物出境前填写文物出境申请表,报文物进出境审核机构审核。文物进出境审核机构应当自收到文物出境申请之日起15个工作日内作出是否允许出境的审核意见
A. 对
B. 错
【判断题】
文物出境许可证,由参加审核的文物进出境责任鉴定员签署。文物进出境责任鉴定员一方同意允许出境的文物,文物进出境审核机构即可加盖文物出境审核专用章
A. 对
B. 错
【判断题】
携带或者复带金银出境,海关凭中国人民银行出具的证明或者原入境时的申报单登记的数量查验放行;不能提供证明的或者超过原入境时申报登记数量的,不许出境
A. 对
B. 错
【判断题】
外国常驻新闻机构、外国记者因采访报道需要暂时进口无线电通信设备的,应向进境地海关提交有关主管部门的批准文件
A. 对
B. 错
【单选题】
“卫生处理”指隔离、留验和就地诊验等医学措施,以及()等卫生措施?___
A. 消毒、除鼠、灭蝇
B. 消毒、除鼠、除虫
C. 消毒、除鼠、除蟑螂
D. 消毒、除虫、灭蚊
【单选题】
出入境邮包最好的消毒方法是()。___
A. 微波照射
B. 熏蒸消毒
C. 喷洒消毒
D. 紫外线消毒
【单选题】
使用下列哪种方法对空气消毒比较合适()。___
A. 常量喷雾
B. 喷洒
C. 超低容量喷雾
D. 泼浇
【单选题】
在口岸检疫过程中,预防性消毒可选择()。___
A. 不需消毒剂,通风就行
B. 低效消毒剂
C. 中效消毒剂
D. 高效消毒剂
【单选题】
以下哪种方法适用于室内滞留喷洒除虫()___
A. 常量喷雾
B. 低容量喷雾
C. 超低容量喷雾
D. 热烟雾
推荐试题
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用