刷题
导入试题
【单选题】
74、车长大于等于_ 的乘用车设置的侧向座椅不核定乘坐人数。___
A. 5m
B. 6m
C. 7m
D. 8m
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
75、所有货车和专项作业车均应在驾驶室(区)两侧喷涂总质量(半挂牵引车为最大允许牵引质量);其中,栏板货车和自卸车还应在驾驶室两侧喷涂栏板高度,罐式汽车和罐式挂车还应在罐体上喷涂罐体容积及允许装运货物的种类。栏板挂车应在车厢两侧喷涂栏板高度。喷涂的中文及阿拉伯数字应清晰,高度应大于等于 _.___
A. 80mm
B. 100 mm
C. 120 m
D. 140mm
【单选题】
76、教练车应在车身两侧及后部喷涂高度_ 的“教练车”等字样___
A. 大于等于100 mm
B. 大于等于110 mm
C. 小于等于100 mm
D. 小于等于110 mm
【单选题】
77台式检验制动力要求对铰接客车、铰接式无轨电车、汽车列车空载时制动力总和与整车重量的百分比_ _, 挂车空载时轴制动力与轴荷的百分比对于后轴为_ _.___
A. ≥50≥50
B. ≥55≥55
C. ≥55≥50
D. ≥60≥50
【单选题】
78、车长大于 的客车和所有校车不得设置车外顶行事架。其他客车霄设置车外顶行李架时,行李架高度应小于等于___长度不得超过车长的三分之一。专用校车如有行李舱体,则行李舱体顶部离地面高度应小于___
A. 7. 5m 300 mm 1000 mm
B. 7.0m 300 mm 1000 mm
C. 7.5m 280 mm 1000 m
D. 7.5m 300 mm 1100 mm
【单选题】
79、幼儿校车、小学生校车的侧窗下边缘距其下方座椅上表面的高度应大于等于___ _ 。否则应加装防护装置。___
A. 300 mm
B. 280 mm
C. 270 mm
D. 250mm
【单选题】
80、货车驾驶室(区)最后一排座位后平面(前后位置可调座椅应处于滑轨中间位置,靠背角度可调式座椅的靠背角度及座椅其它调整量应处于制造厂规定的正常使用位置)与驾驶室后壁(驾驶区隔板)平面的问距对带卧铺的货车应小于等于_ , 对其他货车应小于等 于 .,___
A. 950 mm 450 mm
B. 900 mm。 450 mm
C. 950mm 400mm
D. 930mm。 450mm
【单选题】
81、幼儿专用校车和小学生专用校车学生座椅的座间距应分别大于等于___和______ ;其他客车同方向座椅的座间距应大于等于______相向座椅的座间距应大于等于____专用校车的学生座椅在车辆横向上最多采用“2+3”布置。___
A. 500mm 550mm 650mm 1100mm
B. 500mm 550mm 650mm 1200m
C. 550mm 550mm 650mm 1200mm
D. 500mm 500mm 650mm 1100mm
【单选题】
82、机动车应设置能满足号牌安装要求的号牌板(架)。前号牌板(架)(摩托车除外)应设于______ (按机动车前进方向), 后号牌板(架)应设于 ___
A. 前面的中部或右侧 后面的中部或左侧
B. 前面的中部或左侧 后面的中部或左侧
C. 前面的中部或右侧 后面的中部或右侧
D. 前面的中部或左侧 后面的中部或右侧
【单选题】
83、车长大于等于_______的客车, 如车身右侧仅有一个乘客门且在车身左侧未设置驾驶人门,应在车身左侧设置应急门。车长大于______的客车应设置撒离舱口。卧铺客车的卧铺布置为上、下双层时,侧窗洞口应为上下两层。___
A. 6m 8m
B. 7m 9m
C. 8m 10m
D. 6m 7m
【单选题】
84、 乘用车、专用校车和车长小于_______ 的其他客车前后部应设置保险杠,货车(三轮汽车除外)和货车底盘改装的专项作业车应设置前保险杠。___
A. 5 m
B. 6 m
C. 7 m
D. 9 m
【单选题】
85、 应配备急救箱,急救箱应放置在便于取用的位置并确保有效适用。___
A. 教练车
B. 汽车起重机
C. 自卸车
D. 校车
【单选题】
86、机动车发动机的排气管口不得指向_____如受结构限制排气管 口必须偏向右侧时,排气管口中心线与机动车纵向中心线的夹角应小于等于15 )和正下方;客车的排气尾管如为直式的,排气管口应伸出车身外蒙皮。___
A. 车身右侧
B. 车身左侧
C. 车身中部
D. 车身上部
【单选题】
87、幼儿专用校车的最大乘员数应不超过______ 人: 小学生专用校车和中小学生专用校车的最大乘员数应不超过_______人。 ___
A. 40 56
B. 45 55
C. 45 56
D. 38 56
【单选题】
88、《机动车强制报废标准规定》自 起施行。___
A. 2013年4月1日
B. 2013年5月1日
C. 2013年6月1日
D. 2013年7月1日
【单选题】
89、机动车强制报废标准规定对租赁载客汽车使用年限为____
A. 12年
B. 13年
C. 14年
D. 15年
【单选题】
90、机动车强制报废标准规定对公交客运汽车使用年限为____ _.___
A. 12年
B. 13年
C. 14年
D. 15年
【单选题】
91、机动车强制报度标准规定对专用校车使用年限为_______ ___
A. 8年
B. 10年
C. 12年
D. 15年
【单选题】
92、机动车强制报废标准规定对大、中型非营运载客汽车(大型轿车除外)使用年限为_ ___. ___
A. 20年
B. 18年
C. 15年
D. 12年
【单选题】
93、机动车强制报废标准规定对正三轮摩托车使用年限为_ ___
A. 8年
B. 10年
C. 12年
D. 15年
【单选题】
94、机动车强制报废标准规定对小、微型非营运载客汽车、大型非营运轿车、轮式专用机械车使用年限为______。___
A. 无限制
B. 15年
C. 20年
D. 30年
【单选题】
以下罚款,并依法撒销其检验资格:构成犯罪的,依法追究刑事责任。___
A. 七倍
B. 八倍
C. 九倍
D. 十倍
【单选题】
注册登记检验时,机动车车的外廓尺寸应与机动车产品公告、机动车出厂合格证相符。且误差满足:汽车(三轮车除外)。挂车不超过_______三轮汽车。摩托车不超过土3 %或土50mm. ___
A. 土2 %或土50mm
B. 士1 %或士50mmC.士1 %或土100mm D.土3 %或土50mm[本题答案] B
【单选题】
在用车检验时,重中型货车、挂车的外廓尺寸应与机动车行驶证签注的内容相符,且误差不超过 ___
A. 土2%或土100m
B. 土1 %或土100mm
C. 土3%或土100mm
D. 土2%或土50m[本题答案] A
【单选题】
注册登记检验时,货车挂车的栏板高度应与机动车产品公告、机动车出厂合格证相符、驾驶室两侧喷涂的栏板高度数值相符,且误差不超过___
A. 土2 %或土50mm
B. 土1 %或土100mm
C. 土3 %或士50mm[本题答案]
D.
【单选题】
在用车检验时,货车、挂车的栏板高度应与机动车登记信息、驾驶室两侧喷涂的栏板高度数值相符,且误差不超过______ ___
A. 土2 %或士100mm
B. 土1 %或士50mm
C. 土2 %或土50mm
D. 土1 %或土100mm
【判断题】
《中华人民共和国道路交通安全法》中明确规定机动车安全技术检验机构对机动车检验收取费用,应当严格执行质量技术监督部门核定的收费标准
A. 对
B. 错
【判断题】
质量技术监督部门负责对机动车安全技术检验设备进行检定
A. 对
B. 错
【判断题】
《中华人民共和国道路交通安全法》中明确规定机动车安全技术检验机构对机动车检验收取费用,应当严格执行质量技术监督部门核定的收费标准
A. 对
B. 错
【判断题】
质量技术监督部门负责对机动车安全技术检验设备进行检定
A. 对
B. 错
【判断题】
质量技术监督部门负责对执行国家机动车安全技术检验标准的情况进行监督
A. 对
B. 错
【判断题】
检验检测机构向社会出具具有证明作用的检验检测数据、结果的,应当在其检验检测报告上加盖检验检测专用章,并标注资质认定标志
A. 对
B. 错
【判断题】
从事检验检测的人员,可以同时在两个以上检验检测机构从业
A. 对
B. 错
【判断题】
机动车的检测设备未经检定或检定不合格的可以降低精度继续使用
A. 对
B. 错
【判断题】
机动车安全技术检验机构必须有相应的停车场地、试车跑道和试验驻车制动器的驻坡台
A. 对
B. 错
【判断题】
机动车安全技术检验机构必须建立、健全机动车安全技术检验档案
A. 对
B. 错
【判断题】
《中华人民共和国道路交通安全法》中规定机动车安全技术检验实行社会化的地方,任何单位不得要求机动车到指定的场所进行检验
A. 对
B. 错
【判断题】
《中华人民共和国道路交通安全法》中规定公安机关交通管理部门、机动车安全技术检验机构不得要求机动车到指定的场所进行维修、保养
A. 对
B. 错
【判断题】
驾驶机动车进行检检验的检验人员应当持有与检验车型相对应的有效机动车驾驶证
A. 对
B. 错
【判断题】
机动车安全技术检验机构的检验车间各工位要满足相关面积要求。厂房宽殿,通风、照明、排水,防雨、防火等安全防护满足要求。车间内部尺十和年间出入门尺寸应当满足相应检验车型的需要。检验车间应当充分考虑车间的空气流通,必要时应安装车辆度气排出装置,降低车间内的空气污染
A. 对
B. 错
【判断题】
车辆底盘部件的检验应与承检车型相适应,操作空间满足要求,有良好的照明、通风和信号装置。应能保护车辆底盘部件检验人员的健康和安全。人行通道应当设置隔离栏和标志,与检验通道隔离,宽度不小于1m
A. 对
B. 错
推荐试题
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用