刷题
导入试题
【单选题】
未经国家邮政部门批准,快件运营人不得承揽、承运__________。___
A. 文件
B. 个人物品
C. 私人信件
D. 外交邮袋
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
__________快件是指法律、法规规定予以免税且无商业价值的文件、单证、票据及资料。___
A. 文件类
B. 个人物品类
C. 货样、广告品类
D. 货物类
【单选题】
某企业因生产急需,通过快件渠道从境外购进一批价值人民币20000元的塑胶粒。按照规定,这批塑胶粒需按照__________快件办理报关手续。___
A. 文件类
B. 货物I类
C. 货物Ⅱ类
D. 普通货物类
【单选题】
某企业通过快件渠道进口一件价值为人民币100元的服装样品,可按照__________快件办理报关手续。___
A. 文件类
B. 货物I类
C. 货物Ⅱ类
D. 个人物品类
【单选题】
进境快件应当自装载快件的运输工具申报进境之日起________内向海关申报。___
A. 10日
B. 14日
C. 15日
D. 20日
【单选题】
出境快件应当在装载快件的运输工具离境__________之前,向海关申报。___
A. 3小时
B. 6小时
C. 12小时
D. 24小时
【单选题】
__________应按文件类快件办理海关手续。___
A. 私人信件
B. 法律、法规规定予以免税且无商业价值的单证
C. 境内收件人向境外订购的需要对外付汇的印刷品
D. 境内收件人向境外订购的需要对外付汇的文件及资料
【单选题】
文件类快件报关时,运营人应当向海关提交__________。___
A. 进出境快件KJ1报关单
B. 进出境快件KJ2报关单
C. 进出境快件KJ3报关单
D. 进出境快件个人物品申报单
【单选题】
__________快件报关时,运营人应当向海关提交进境快件收件人或出境快件发件人身份证件影印件。___
A. 文件类
B. 货物I类
C. 货物Ⅱ类
D. 个人物品类
【单选题】
货物Ⅱ类快件是指:___
A. 应予征税的进境货物(实行许可证件管理的、需进口付汇的除外)
B. 货样、广告品(实行许可证件管理的、应征出口关税的、需出口收汇的、需出口退税的除外),
C. 应予征税的货样、广告品(实行许可证件管理的、需进口付汇的除外)
D. 应予免税的货样、广告品(实行许可证件管理的、需进口付汇的除外)
【单选题】
“货物Ⅱ类快件”进境申报,应当提交__________。___
A. KJ2报关单
B. KJ3报关单
C. 进口货物报关单
D. 个人物品申报单
【单选题】
某公司通过DHL公司从美国进口新研发的手机10部,作为以后大批量采购该手机的样品。这些手机应以__________方式进口。___
A. 个人物品类
B. 货物I类
C. 货物Ⅱ类
D. 普通货物
【单选题】
“货物I类快件”进境申报,应当提交__________。___
A. KJ2报关单
B. KJ3报关单
C. 进口货物报关单
D. 个人物品申报单
【单选题】
某公司从韩国邮递进境10台具有发射、接收无线电功能电视机顶盒,经查验该机顶盒上有DVB-S.2字样(数字卫星广播标准)。该批快件应以__________申报。___
A. 个人物品类
B. 普通货物
C. 货物I类
D. 货物Ⅱ类
【单选题】
海关查验进出境快件时,__________应派员到场,并负责进出境快件的搬移、开拆和重封包装。___
A. 快件收货人
B. 快件发货人
C. 快件运营人
D. 运输工具负责人
【单选题】
进出境快件开箱查验后,要在快件包装内明显位置放置统一格式的__________。___
A. 查验通知书
B. 查验告知单
C. 查验货物清单
D. 进出境快件报关单
【单选题】
对进出境快件开箱查验后,查验关员应填写__________。___
A. 进出境货物查验记录单
B. 进出境快件查验通知书
C. 进出境快件查验记录单
D. 进出境快件查验告知单
【单选题】
快件机检图像保存时间不得少于__________。___
A. 3个月
B. 6个月
C. 1年
D. 3年
【单选题】
快件机检图像与快件报关单信息同屏对比时,机检关员对每件快件的判图时间应大于__________。___
A. 5秒
B. 6秒
C. 8秒
D. 10秒
【单选题】
快件运营人不得承揽、承运禁止进出境物品,如有发现,快件运营人应当__________。___
A. 立即作退运处理
B. 立即作销毁处理
C. 立即通知海关
D. 立即告知收发件人
【单选题】
文件类、货物Ⅰ类、货物Ⅱ类快件通过__________接受申报。___
A. H2010通关管理系统
B. 快件通关管理系统
C. 公自用物品管理系统
D. 旅客通关子系统
【单选题】
快件通关管理系统发生故障时,凭__________提交的纸质进出境快件报关单及随附单证办理海关手续。___
A. 快件运营人
B. 快件收货人
C. 快件发货人
D. 快件监管场所运营人
【单选题】
快件通关管理系统故障恢复后,应在__________内补办电子申报手续。___
A. 12小时
B. 24小时
C. 48小时
D. 72小时
【单选题】
从国外或香港、澳门地区进口的遗物,应由物主在国内的继承人向海关申请交验物主的( )和国内公证机关出具的( ),经海关核准后,方可一次进口。___
A. 火化证明书 继承权公证书
B. 死亡证明书 继承权公证书
C. 死亡证明书 财产公证书
D. 火化证明书 财产公证书
【单选题】
出境用于预防、诊断、治疗的人类疾病的生物制品、人体血液制品,应当提供药品监督管理部门出具的___
A. 药品注册证书
B. 销售证明
C. 生物安全资质证明
D. 批准文书
【单选题】
现场海关关员在对旅客小陈行李箱进行开箱查验时,发现行李箱中有干海马1袋、花胶1盒、人体免疫白蛋白1瓶、燕窝面膜1盒,其中属于需要进行卫生检疫的特殊物品是___。
A. 干海马
B. 花胶
C. 人体免疫白蛋白
D. 燕窝面膜
【单选题】
下列哪项物品不属于需要卫生检疫的特殊物品?___
A. 人体假发
B. 甲型流感病毒抗原检测快速诊断试剂
C. 卡介苗疫苗
D. 人体血小板
【单选题】
周先生携带3支乙脑疫苗制剂经口岸入境,下列说法不正确的是___
A. 乙脑疫苗属于出入境特殊物品,周先生需要取得《入/出境特殊物品审批单》,口岸现场海关人员查验无误后方可放行;
B. 周先生没有提交《入/出境特殊物品审批单》,现场海关应予以截留,并出具《出入境人员携带物留验/处理凭证》,截留期限不超过31天 ;
C. 周先生可以在疫苗被截留期限内,补办《入/出境特殊物品审批单》,凭审批单海关可以予以放行;
D. 周先生未能在要求期限内补办《入/出境特殊物品审批单》,口岸海关将签发《检验检疫处理通知书》,对该批疫苗予以退运或者销毁
【单选题】
快件通关管理系统故障恢复后,应在__________内补办电子申报手续。___
A. 12小时
B. 24小时
C. 48小时
D. 72小时
【单选题】
从国外或香港、澳门地区进口的遗物,应由物主在国内的继承人向海关申请交验物主的( )和国内公证机关出具的( ),经海关核准后,方可一次进口。___
A. 火化证明书 继承权公证书
B. 死亡证明书 继承权公证书
C. 死亡证明书 财产公证书
D. 火化证明书 财产公证书
【单选题】
出境用于预防、诊断、治疗的人类疾病的生物制品、人体血液制品,应当提供药品监督管理部门出具的___
A. 药品注册证书
B. 销售证明
C. 生物安全资质证明
D. 批准文书
【单选题】
现场海关关员在对旅客小陈行李箱进行开箱查验时,发现行李箱中有干海马1袋、花胶1盒、人体免疫白蛋白1瓶、燕窝面膜1盒,其中属于需要进行卫生检疫的特殊物品是___。
A. 干海马
B. 花胶
C. 人体免疫白蛋白
D. 燕窝面膜
【单选题】
下列哪项物品不属于需要卫生检疫的特殊物品?___
A. 人体假发
B. 甲型流感病毒抗原检测快速诊断试剂
C. 卡介苗疫苗
D. 人体血小板
【单选题】
周先生携带3支乙脑疫苗制剂经口岸入境,下列说法不正确的是___
A. 乙脑疫苗属于出入境特殊物品,周先生需要取得《入/出境特殊物品审批单》,口岸现场海关人员查验无误后方可放行;
B. 周先生没有提交《入/出境特殊物品审批单》,现场海关应予以截留,并出具《出入境人员携带物留验/处理凭证》,截留期限不超过31天 ;
C. 周先生可以在疫苗被截留期限内,补办《入/出境特殊物品审批单》,凭审批单海关可以予以放行;
D. 周先生未能在要求期限内补办《入/出境特殊物品审批单》,口岸海关将签发《检验检疫处理通知书》,对该批疫苗予以退运或者销毁。
【多选题】
海关工作任务包括:___
A. 监管进出境运输工具、货物、物品
B. 征收关税和其他税费
C. 查缉走私
D. 编制海关统计
【多选题】
在海关监管区和海关附近沿海沿边规定地区以外,海关在调查走私案件时,经直属海关关长或者其授权的隶属海关关长批准,可以行使的权力有:___
A. 检查有走私嫌疑的汽车
B. 检查有走私嫌疑的飞行器
C. 检查有藏匿走私物品嫌疑的住宅
D. 检查有藏匿走私货物嫌疑的厂房
【多选题】
__________,应当接受海关监管。___
A. 进口货物自进境起到办结海关手续止
B. 出口货物自向海关申报起到出境止
C. 过境自进境起到出境止
D. 通运货物自进境起到出境止
【多选题】
确属溢卸的进境货物,经海关审定,由_________自该运输工具卸货之日起3个月内,办理退运或者进口手续。___
A. 原运输工具负责人
B. 码头堆场负责人
C. 货物的收货人
D. 货物的发货人
【多选题】
收货人或者货物所有人声明放弃的进口货物,由海关提取依法变卖处理;所得价款在扣除__________等费用后,上缴国库。___
A. 运费
B. 装卸费
C. 储存费
D. 关税
【多选题】
__________的物品,由海关作依法变卖处理。___
A. 进出境物品所有人声明放弃
B. 在海关规定期限内未办理海关手续
C. 在海关规定期限内无人认领
D. 无法投递又无法退回的进境邮递物品
【多选题】
__________减征或者免征关税。___
A. 进出口无商业价值的广告品和货样
B. 外国政府、国际组织无偿赠送的物资
C. 在海关放行前遭受损坏或者损失的进口货物
D. 进出境规定数额以内的物品
推荐试题
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用