【判断题】
根据案件调查需要,海关可以对有关货物进行取样化验、鉴定。化验、鉴定应当交由海关化验鉴定机构,也可委托国家认可的其他机构进行。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
国家将旧汽车列入《禁止进口货物目录(第二批)》范围,实施禁止进口管理,但旧发动机允许进口。
【判断题】
《限制进出境物品表》列名物品,作为货物成批进出境时,视同限制进出口货物,应经主管部门审批。
【判断题】
过境、转运、通运易制毒化学品的,应当如实向海关申报,但无需提交两用物项和技术进出口许可证。
【判断题】
两用物项和技术在海关特殊监管区域之间进出,无需办理两用物项和技术进出口许可证。
【判断题】
出口经营者知道其拟出口的物项和技术存在被用于大规模杀伤性武器风险的,无论该物项和技术是否列入《两用物项和技术进出口许可证管理目录》,都应办理两用物项和技术出口许可证。
【判断题】
《濒危野生动植物种国际贸易公约》禁止以商业贸易为目的进出口的濒危野生动植物及其产品,禁止进出口。
【判断题】
非法进口、出口或者以其他方式走私濒危野生动植物及其产品的,由海关依照海关法的有关规定予以处罚。
【判断题】
进口抗生素类药品,海关凭药品监督管理部门出具的进口药品通关单放行。
【判断题】
货物包装的标志是为了方便货物的识别、运输、仓储、检验和交接,防止错发、错运、错提货物,按其作用不同,可分为运输标志、指示性标志和警告性标志。
【判断题】
指示性标志用于提醒装卸、搬运、储存人员注意商品危险属性,并提高警惕。
【判断题】
警告性标志是指于危险品货物包装上刷制的表明货物危险性质和等级的标志。
【判断题】
在辐射基础理论中,表示计数率的单位符号是Sv/h,其含义是每小时接受的辐射剂量。
【判断题】
旅检现场某旅客触发辐射探测设备报警,他声称3个月前接受过锝-99m注药诊断,并能提供相应医学证明。对此海关可予放行。
【判断题】
辐射探测设备开机时要远离放射源,避免放射源对环境本底产生影响。
【判断题】
辐射探测设备在工作时会对外发射放射性射线,海关关员工作时应与设备保持一定的距离。
【判断题】
当源强一定时,受照剂量与受照时间成正比,与受照者距放射源的距离平方成反比。
【判断题】
货物辐射强度偏低,表明其没有放射性超标嫌疑,因此无需进行二次检查。
【判断题】
触发门户式辐射探测设备的集装箱货物,在人工持手持式辐射探测设备对货物检查时,如果未能找到放射性来源,关员可以对货物作放行处理
【判断题】
旅检现场门户式辐射探测器可供多名旅客同时通过,探测精度不受影响。
【判断题】
领导进入下级办公场所、业务现场时,全体在场关员应自行起立,主动致意。
【判断题】
海关工作人员应自觉遵守各项廉政有关规定,不以权谋私、徇情枉法,不参加任何有碍于公正执法的活动。
【判断题】
海关旅检通道的合理位置可设置中外文公告栏、宣传栏和自愿放弃物品投放箱等工作设施。
【判断题】
在查验工作中,海关封志施封作业应由报关人员负责操作。
【判断题】
进出口货物运抵海关监管场所后,方可以办理货物的查验、放行手续。
【判断题】
某企业申报进口冻鸡,经货物收货人或者其代理人申请,海关可以优先查验。
【判断题】
抽查中发现有重大走私嫌疑的,查验人员应当直接实施彻底查验。
【判断题】
登临检查适用于对进出境航空器、船舶、列车等运输工具的查验。
【判断题】
配备机检设备的海关对适于机检查验的货物,应当优先采用机检查验,布控指令有特殊要求的除外。
【判断题】
进出口货物查验自动派单结果因现场人员调配等原因无法执行时,可由派单岗位进行人工干预。
【判断题】
通常情况下,大型集装箱检查设备查验应由计算机自动向图像分析员分配扫描图像;有特殊需要时,系统操作员可进行人工干预,但必须做好相应记录。
【判断题】
大型集装箱检查设备机检查验结论与人工开箱查验具有同等法律效力。
【判断题】
经授权的主任科员以上职务关员可代行查验工作现场带班科长的相关职责。
【判断题】
大型集装箱检查设备货物扫描图像以及查获案例图像的电子档案保存期限,应与对应的报关单证保存期限一致。
【判断题】
大型集装箱检查设备扫描图像,向海关以外单位提供的,应当经直属海关关领导或经授权的处级领导批准。
【判断题】
大型集装箱检查设备图像分析员应使用本人授权账号登录,并于离开时及时注销。
【判断题】
进出口货物容易因开启、搬运不当导致损毁,需要查验人员予以特别注意的,收发货人或其代理人应当在海关实施查验前声明。
【判断题】
实施查验过程中,查验关员不得离开实施查验的现场,特殊情况下确需离开的,应经带班科长批准,并采取加封等必要的安全措施,或者在查验现场办理交接手续,由接替的关员继续实施作业,直至作业完毕。
【判断题】
经抽查发现单货不符,经带班科长批准并修改查验指令后,可以改为彻底查验。
推荐试题
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall