刷题
导入试题
【判断题】
根据货物的外部形态分类可分为成件货物、大件货物、散堆装货物和集装箱货物等
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
按照货物对运输条件要求的不同分为按普通条件运输的货物和按危险条件运输的货物
A. 对
B. 错
【判断题】
危险货物、易于污染其他货物的污秽品可以办理整车分卸
A. 对
B. 错
【判断题】
货物数量不够一车,托运人要求在同一经路上两个取三个车站卸车可以办理整车分卸
A. 对
B. 错
【判断题】
零担与整车的区别为先承运后装车
A. 对
B. 错
【判断题】
途中装卸是指在两个车站之间的区间或在不办理货运营业的车站装车
A. 对
B. 错
【判断题】
货物运输合同的展行是从受理开始至货物交付完毕时止
A. 对
B. 错
【判断题】
交付工作包括票据交付、现货交付、现金交付三部分
A. 对
B. 错
【判断题】
卸车后,货运员应检查运输票据、检查货物、卸后空车等内容
A. 对
B. 错
【判断题】
蔬菜与大米可以一批办理
A. 对
B. 错
【判断题】
在到站由铁路组织卸车的,货物的实际运到日数是从货物承运之日起算至卸车完了时终止
A. 对
B. 错
【判断题】
超限、限速运行和免费运输的货物以及货物全部灭失超过运到期限时需支付违的金
A. 对
B. 错
【判断题】
铁路货物运输合同是铁路承运人将货物从起运地点以铁路运输的方式,运输到的定地点,托运人或者收货人支付运输费用的合同
A. 对
B. 错
【判断题】
卸车前,货运员应对施封的货车安排卸车工核对、拆封
A. 对
B. 错
【判断题】
领货凭证的背面分别印有“承运人须知”和“收货人领货须知”
A. 对
B. 错
【判断题】
托运人、承运人、收货人三方在填写货物运单时均应对货物运单所填记的内容负责
A. 对
B. 错
【判断题】
运单填写各栏有更改时,在更改处,由托运人加盖车站站名裁记证明
A. 对
B. 错
【判断题】
车站承运货物时,要将运单、领货凭证上下对齐,不得有空隙,在货物运单和领货凭证骑处,加益一个发站承运日期(不可重叠)
A. 对
B. 错
【判断题】
托坛人对在货物运单和物品清单内所填记的事项负责
A. 对
B. 错
【判断题】
规格不同,一批数量超过1600件的货物应按披件和重量承运
A. 对
B. 错
【判断题】
铁路运输货物,一般由托运人确定重量
A. 对
B. 错
【判断题】
货物装车或卸车的组织工作,在车站公共装卸场所内由承运人负责;在其他场所,均由托运人或收货人负责
A. 对
B. 错
【判断题】
保密物资、涉外物资、精密仪器、展览品,当无棚车时,可用散车装运,但必须苫盖篷布
A. 对
B. 错
【判断题】
毒品专用车和危险品专用车用于装运普通货物时必须打扫干净
A. 对
B. 错
【判断题】
增载货车车型、适装货物品类、最大允许增蒙量按《铁路货车增载暂行规定》执行
A. 对
B. 错
【判断题】
26在容许增敦规定范围内的货物重量超过标记歌重量的,按标记载重收贵
A. 对
B. 错
【判断题】
使用棚车装载货物时,装在车门口的货物时,应与车门密贴,以防止车门滑动
A. 对
B. 错
【判断题】
施封锁的货车应使用粗铁线将两侧车门上部门扣和门鼻拧固并剪断燕尾
A. 对
B. 错
【判断题】
用散、平车装軟需要加固的货物、轻浮货物、成件货物,已有定型方案的,可按定型方案装载或有托运人自行定制定型方案
A. 对
B. 错
【判断题】
30托运人在货物托运后,托运人要求变更的,承运人应无条件办理
A. 对
B. 错
【填空题】
1.按特殊条件运输的货物:包括大货物、危险货物和___货物
【填空题】
2.根据托运货物的数量、性质、形状及所使用的___不同,将铁路货物运输的种类划分为整车、零
【填空题】
3.一批货物的重量、体积、形状或性质需要以一辆以上货车运输的,应按___
【填空题】
4.按整车分卸办理的货物,若无押运人押运托运人必须在每件货物上拴挂___
【填空题】
5.___是指一批货物的重量、体积、形状和性质不需要单独使用一辆铁略货车装运的货物
【填空题】
6.零担货物一般使用___车运输
【填空题】
7.托运人托运快运货物时,应在运单上加盖横式带边红色___记,须缴纳快运费
【填空题】
8.货物的实际运到日数,从货物承运___起算。
【填空题】
9.货物的途中作业形式包括“货运检查、交接”、___及“异常情况的处理”
【填空题】
10.货物运单由货物运单和___两部分组成
【填空题】
11.货物运单所记载的货物名称、重量与货物的实际应完全相符,___人对其真实性负责
推荐试题
【填空题】
43.1957年10月4日,苏联把世界上第一颗 ___ 送入地球近地轨道.
【填空题】
44.中央军委下属机关有___个部<厅>、___个委员会、___个直属机构。
【填空题】
45.___是国防强大的基础。
【填空题】
46.天基武器系统主要指攻击对方航天器用的卫星和卫星平台,包括 ___ 、 ___和___ 等。
【填空题】
47.中国人民解放军海军成立于___年。
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用