刷题
导入试题
【判断题】
入境、出境的集装箱、货物、废旧物等物品在到达口岸的时候,承运人、代理人或者货主,必须向海关申报并接受卫生检疫。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
入境的集装箱、货物、废旧物等必须在到达口岸实施卫生检疫。
A. 对
B. 错
【判断题】
对入境、出境的旅客、员工个人携带的行李和物品,不需实施卫生检查。
A. 对
B. 错
【判断题】
海关可以派员随入境直通列车实施检疫。
A. 对
B. 错
【判断题】
徒步入境、出境的人员,必须首先在指定的场所接受入境、出境查验,未经海关许可,不准离开指定的场所。
A. 对
B. 错
【判断题】
由国外起运经过我国境内的货物,如果不在境内换装,除发生在流行病学上有重要意义的事件,需要实施卫生处理外,在一般情况下不实施卫生处理。
A. 对
B. 错
【判断题】
海关对已在其他口岸实施卫生处理的交通工具不再重复实施卫生处理。
A. 对
B. 错
【判断题】
中风险防护适用于对可疑病例和密切接触者进行流行病学调查和医学观察的检疫人员。
A. 对
B. 错
【判断题】
列车在运行中曾经有霍乱病例发生,但是在到达前5日以内,没有新病例发生,可以判定列车为霍乱染疫嫌疑列车。
A. 对
B. 错
【判断题】
列车上与疑似病例同车厢的旅客或同一卧铺车厢的旅客,照顾护理疑似病例的人以及接触疑似病例呼吸道分泌物、血液、尿液的人为密切接触者。
A. 对
B. 错
【判断题】
所有出入境交通工具应当实施卫生检疫。
A. 对
B. 错
【判断题】
对来自霍乱疫区未超过5天的人员及霍乱染疫人的密切接触者应进行登记,并自其出发时算起,实施不超过5天的就地诊验或者留验。
A. 对
B. 错
【判断题】
海关如果发现在船舶实施出境检疫完毕后,又有人员上船或装卸货物的或者因其他特殊情况24小时内不能离境的,应对该船舶重新实施出境检疫。
A. 对
B. 错
【判断题】
接受入境检疫的船舶,必须按照规定悬挂检疫信号,在海关签发入境检疫证书或者通知检疫完毕以前,不得解除检疫信号。
A. 对
B. 错
【判断题】
口岸突发公共卫生事件应急处理采取边调查、边报告、边处理、边核实的方式
A. 对
B. 错
【判断题】
在国境口岸检疫查验工作中,经确诊患有肺结核病的外国人,要阻止其入境。
A. 对
B. 错
【判断题】
霍乱弧菌可经苍蝇传播至食物从而感染人。
A. 对
B. 错
【判断题】
一次性乳胶手套或橡胶手套在佩戴前须检查有无破损和漏气。
A. 对
B. 错
【判断题】
对可疑病例和密切接触者进行流行病学调查和医学观察的检疫人员应做好中风险防护。
A. 对
B. 错
【判断题】
穿脱防护装备的原则是基于以下设定:个体防护装备是洁净、安全的,正确使用能够确保个体不受病原体危害;穿戴防护装备前设定个体是相对污染体;从污染现场出来后,设定防护装备的外表面已经受到污染。
A. 对
B. 错
【判断题】
个人防护主要包括手卫生防护、呼吸道防护和皮肤接触防护等。一般而言,对呼吸道传染病的个人防护要求较高。
A. 对
B. 错
【判断题】
对疑似体温超标的旅客,以水银温度计测量其腋下温度3分钟,复测结果≥37.3℃的,判定为发热旅客。
A. 对
B. 错
【判断题】
检疫审批单可在有效期内多次使用,一次审批,分次核销,现场抽批查验属于C级风险特殊物品。
A. 对
B. 错
【判断题】
船舶到达时载有检疫传染病染疫人的,判定为染疫船舶。
A. 对
B. 错
【判断题】
隶属海关应当要求船舶负责人向海关申报运输工具动态,分为预报、确报、抵港报。
A. 对
B. 错
【判断题】
船舶在口岸停留时间不足12小时的,经海关同意,船方或者其代理人在办理入境手续时,可以同时办理出境手续。
A. 对
B. 错
【判断题】
携带自用且仅限于预防或者治疗疾病用的血液制品或者生物制品出入境的,不需办理卫生检疫审批手续,出入境时应当向海关出示医院的有关证明;允许携带量以处方或者说明书确定的一个疗程为限。
A. 对
B. 错
【判断题】
无死亡报告或者死亡医学诊断书的尸体,且托运人或者其代理人未能在规定期限内补交的,按照死因不明处置,以骨灰的形式入出境。
A. 对
B. 错
【判断题】
对持有海关签发的有效《交通工具卫生证书》,且不符合锚地检疫和靠泊检疫条件的船舶,经船方或代理人申请,隶属海关应当实施随船检疫。
A. 对
B. 错
【判断题】
当发生国际关注呼吸道传染病时,对来自流行区的交通工具上和口岸现场的一般接触者登记个人信息、给予健康建议后放行。
A. 对
B. 错
【判断题】
对出境航空器查验完毕后,如果没有染疫,检疫医师应当签发出境检疫证或者在必要的卫生处理后,再发给出境检疫证。
A. 对
B. 错
【判断题】
对染疫或染疫嫌疑的航空器,不得签发入境检疫证。
A. 对
B. 错
【判断题】
对染有黄热病的船舶、航空器,在海关监督下,并且采取预防控制措施的情况下,可以在灭蚊以前卸货。
A. 对
B. 错
【判断题】
对所有来自检疫传染病疫区的交通工具都应当实施卫生处理。
A. 对
B. 错
【判断题】
对蚊媒传染病染疫嫌疑航空器的隔离应设置半径100米的隔离圈,未经检验检疫部门许可,严禁任何人上下航空器。
A. 对
B. 错
【判断题】
航空器到达时载有黄热病病例,为染有黄热病。
A. 对
B. 错
【判断题】
航空器在到达前曾经有霍乱病例发生,但在到达之前该病员已离去,可认为没有染有霍乱嫌疑。
A. 对
B. 错
【判断题】
接受入出境检疫的交通工具包括:飞机、船舶、火车、汽车以及摩托车、拖拉机、畜力车、人力车等。
A. 对
B. 错
【判断题】
就国境卫生检疫而言,领导人乘坐的专机应实施免检。
A. 对
B. 错
【判断题】
来自黄热病疫区的航空器,应当出示在疫区起飞前的灭蚊证书;如果在到达时不出示灭蚊证书,或者海关认为出示的灭蚊证书不符合要求,并且在航空器上发现活蚊,为染有黄热病嫌疑。
A. 对
B. 错
【判断题】
民用航空器上,口岸呼吸道传染病密切接触者的判定:民用航空器上舱内以疑似病例座位为中心,周边各方位相邻座位(含通道另一侧)的旅客、同行人员以及在上述区域内提供客舱服务的乘务员。
A. 对
B. 错
推荐试题
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用