【判断题】
如因ETC用户信用问题,如故意提供虚假行驶证等情况,造成故意偷逃费或欠费,由用户负责。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
如用户通行ETC车道交易流水未上传,根据用户提出交易的时间及地点,不必补传交易流水,直接进行退费处理。
【判断题】
ETC车道系统交易时,车道显示屏只需显示车牌信息及本次交易金额即可。
【判断题】
ETC车辆办理了非现金支付卡,则可以在ETC车道通行。
【判断题】
ETC设备型式检验可由设备生产厂家或者各省市ETC系统建设和管理单位委托,由具备相关检测资质的第三方检测机构进行。
【判断题】
ETC空卡可能是跟车造成的,应咨询司机入口站名, 人工输入入口站收费放行,并提醒司机通过ETC车道时保持车距。
【判断题】
OBU具备防止用户拆卸功能,一旦被拆卸,OBU信息储存区中标志字节/标志位被激活,引起的ETC应用失效。该状态不能够通过软件设置的方式得到恢复。
【判断题】
用户可在实际发生通行费用后的第10个自然日起,取得相应消费的增值税电子普通发票。
【判断题】
ETC车道系统应具备保存至少三个月交易记录的性能指标要求。
【判断题】
客户如果想取得增值税电子普通发票,应先办理ETC卡或用户卡,并在发票服务平台注册登记。
【判断题】
申请单位对使用过程中损坏的部级消费PSAM卡应如数退回国家密钥管理承担单位,由其统一销毁。
【判断题】
如收费公路经营管理单位收费站多收、错收、重复收取了通行费用,收费公路经营管理单位应根据有关规定,按流程及时为用户处理。
【判断题】
车辆通过ETC车道时,操作界面提示交易失败。可尝试倒车再次交易,若连续出现此类情况,需重启适配器并检查线路连接是否牢固,最后判定设备或接口是否存在故障。
【判断题】
收费公路通行费增值税发票以增值税电子普通发票的形式为主。
【判断题】
全国ETC联网部省通信传输通道,采取租用电信VPN专线作为链路主线,中国移动链路作为备线的方案。采用扁平化网络结构层次,网络规划均为2M专线。
【判断题】
各省中心提供的黑名单相互转发,在整个过程中不对进入黑名单的用户状态名单做任何修改。各省中心在接收到黑名单后,及时对路网收费车道系统的黑名单表进行更新。
【判断题】
各级ETC状态名单转发方负责将黑名单成功的发送至下级节点,应建立跟踪、重发机制以确保发送成功,一旦多次重发失败,应人为介入并及时与下级节点技术人员联系、备案。
【判断题】
我省工作车ETC车载设备编号不需录入工作车管理软件,通行ETC车道时,系统读取车牌信息后将自动比对工作车数据库,并判定能否执行公务放行。
【判断题】
整体更新用户状态名单数据包,不包含系统当前所有记录,接收方通过更新原有名单,使用更新的名单数据即可达到同步的目的。
【判断题】
黑名单是指禁止通过收费车道的车载单元或非现金支付卡列表。黑名单应由发行方生成,其他参与方不得更改。
【判断题】
发行方是指负责一定区域内公路电子不停车收费车载单元、非现金支付卡的经营和管理的实体。
【判断题】
在封闭式收费应用模式下,如果在入口ETC车道未使用非现金支付卡,出口车道则可以受理非现金支付卡支付方式。
【判断题】
正常情况下,车道天线通信覆盖范围应仅局限于本车道内,宽度为2.5米-3.25米,纵向通信区域不超过6米;车道天线信号不应产生临道干扰,也不应读取到相邻车道的电子标签。
【判断题】
由服务方发起的退费交易处理流程:服务方核实退费对应的交易记录后,录入相关信息,系统将退费申请流转至发行方所属省中心。发行方同意退费,应在10个工作日内完成退费操作。
【判断题】
逾期超过15个自然日的交易数据应作为确认拒付的争议交易数据。
【判断题】
ETC车道宜设置在收费站行车方向左侧,尽量减少进入收费广场的ETC车辆与非ETC车辆交叉并线的影响。
【判断题】
车道车辆流程中卡片发行属地判定主要是判断卡片发行属地是否是联网区域省(区、市)
【判断题】
非现金支付卡出现余额不足或被列入黑名单时,人工收费应采用现金或其他支付方式全额支付。
【判断题】
2017年7月17日,各试点省份已开展ETC异地充值圈存服务,各省发行方也可通过对所属ETC用户提供网上充值、手机充值等服务实现。
【判断题】
跨省投诉处理及时率是指省中心作为投诉受理方在规定时间内完成投诉处理的案次之和占省中心受理及被投诉总案次百分比。
【判断题】
套装发行的OBU和非现金支付卡中均应写入车牌号码,单独发行的非现金支付卡可以不写入车牌号码。
【判断题】
CG300视频采集卡中S-Video为高分辨率视频信号输入端。
【判断题】
车牌识别仪损坏时,应立即报修,并打开备用车道收费;若无备用车道可以使用,则可以手动输入车牌。
【判断题】
高速公路收费专用键盘,在第一个按下的键放开之前,按其它键无效。
【判断题】
收费专用键盘出现键值错乱时,需返厂重新定义键值。
【判断题】
MTC收费车道的费额显示器一般安装在收费亭侧窗后部或收费岛的某一适当位置,其安装位置应使驾驶员在各种照明和自然环境条件下能清晰地看见其显示的内容。
【判断题】
当栏杆处于竖直状态时,自动栏杆距收费车道边缘不小于350mm。
【判断题】
当车道处于关闭状态时,车辆检测器通常处于关闭状态。
【判断题】
车道计算机由于软件故障不能正常工作,并且不能确认该车道收费数据是否全部上传收费站服务器时可用备用车道计算机替换。
【判断题】
入口自动发卡车道是一种完全无需收费员来干预的发卡模式,但需要监控自动发卡机卡夹余卡状态,及时更换卡夹。
【判断题】
收费车道的通行信号灯与车道计算机的连接方式为模拟I/O板。
推荐试题
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP