【单选题】
造成交通事故后逃逸被吊销机动车驾驶证的,机动车驾驶证档案资料_____。___
A. 保留两年后销毁
B. 保留三年后销毁
C. 保留五年后销毁
D. 长期保留
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
年龄在_____以上,只具有低速载货汽车、三轮汽车、轮式自行机械车准驾车型的,车辆管理所应注销其驾驶证。___
A. 50周岁
B. 55周岁
C. 60周岁
D. 70周岁
【单选题】
身体条件证明自出具之日起____内有效。___
A. 1个月
B. 3个月
C. 6个月
D. 12个月
【单选题】
申请人在学车专用标识签注的指导人员随车指导下,使用符合规定的机动车学习 ________驾驶中有道路交通安全违法行为或者发生交通事故的,______承担责任。___
A. 不
B. 申请人
C. 随车指导人员
D. 申请人和随车指导人员
【单选题】
_办理自愿降级换证业务时,机动车驾驶证的有效期起始日期应当按照______录入。___
A. 受理申请日期
B. 核发驾驶证日期
C. 原驾驶证有效期起始日期
D. 原驾驶证有效期截止日期
【单选题】
申请小型汽车、小型自动挡汽车、残疾人专用小型自动挡载客汽车、轻便摩托车准驾车型时,年龄在69周岁以上的,学习驾驶证明有效期截止日期按照申请人满______生日录入。____
A. 69周岁
B. 70周岁
C. 71周岁
D. 72周岁
【单选题】
机动车驾驶人在机动车驾驶证的六年有效期内,每个记分周期均未记满12分的,换发______有效期的机动车驾驶证。___
【单选题】
学习驾驶证明上车辆管理所业务专用章,应当符合全国统一的规格,并压盖申请人照片的_____。___
A. 右下角
B. 左下角
C. 右上角
D. 左上角
【单选题】
车辆管理所核发的学习驾驶证明应加盖____。___
A. 行政印章
B. 业务专用章
C. 证件印章
D. 业务手续专用名章
【单选题】
车辆管理所办理机动车驾驶证业务使用的印章分为业务专用章、证件专用章、个人名章,印章的规格_____统一。___
【单选题】
持B2准驾车型记录的,不准驾驶_____准驾车型。___
【单选题】
持有B1B2驾驶证的,如果具有规定注销最高准驾车型情形之一的,降级后的准驾车型为_____。___
【单选题】
驾驶机动车在进出非机动车道时,最高速度不能超过多少?___
A. 30公里/小时
B. 40公里/小时
C. 50公里/小时
D. 60公里/小时
【单选题】
驾驶机动车行经下列哪种路段不得超车?___
A. 主要街道
B. 高架路
C. 人行横道
D. 环城高速
【单选题】
驾驶机动车在没有道路中心线的狭窄山路怎样会车?___
A. 速度慢的先行
B. 重车让空车先行
C. 靠山体的一方先行
D. 不靠山体的一方先行
【单选题】
驾驶机动车在高速公路遇到能见度低于50米的气象条件时,车速不得超过20公里/_小时,还应怎么做?___
A. 进入应急车道行驶
B. 尽快驶离高速公路
C. 在路肩低速行驶
D. 尽快在路边停车
【单选题】
有下列哪种违法行为的机动车驾驶人将被一次记12分?___
A. 驾驶故意污损号牌的机动车上道路行驶
B. 机动车驾驶证被暂扣期间驾驶机动车的
C. 以隐瞒、欺骗手段补领机动车驾驶证的
D. 驾驶机动车不按照规定避让校车的
【单选题】
危险报警闪光灯可用于下列什么场合?___
A. 在道路上跟车行驶时
B. 遇到道路拥堵时
C. 机动车发生故障停车时
D. 引领后车行驶时
【单选题】
下列关于大型、中型载客汽车能否牵引挂车的说法,正确的是什么?___
A. 不得牵引挂车
B. 允许牵引1辆挂车
C. 可以牵引不超过本身载质量的挂车
D. 允许牵引总质量700千克以下的挂车
【单选题】
某日13时10分,罗某驾驶一辆中型客车从高速公路0公里处出发,下午14时10分行至该高速公路125公里加200米处时,发生追尾碰撞,机动车驶出西南侧路外边坡,造成11人死亡、2人受伤。罗某的主要违法行为是什么?___
A. 超速行驶
B. 不按交通标线行驶
C. 客车超员
D. 疲劳驾驶
【单选题】
_当机动车在湿滑路面上行驶时,路面附着力随着车速的增加如何变化?___
A. 急剧增大
B. 逐渐增大
C. 急剧减小
D. 没有变化
【单选题】
轮胎气压过低时,高速行驶可能导致什么结果?___
A. 气压不稳
B. 气压增高
C. 行驶阻力减小
D. 爆胎
【单选题】
会车前选择的交会位置不理想时,应怎样做?___
A. 加速选择理想位置
B. 减速、低速会车或停车让行
C. 向左占道,让对方减速让行
D. 打开前照灯,示意对方停车让行
【单选题】
车辆驶近停在车站的公交车辆时,为预防公交车突然起步或行人从车前穿出,应怎样做?___
A. 减速,保持足够间距,随时准备停车
B. 保持正常车速行驶
C. 随时准备紧急制动
D. 鸣喇叭提醒,加速通过
【单选题】
下长坡连续使用行车制动会导致什么?___
A. 会缩短发动机寿命
B. 增加驾驶人的劳动强度
C. 会使制动器温度升高而使制动效果急剧下降
D. 容易造成车辆倾翻
【单选题】
申请人在考试过程中有_____行为的,取消考试资格,已经通过考试的其他科目成绩无效。___
A. 异常
B. 缺考
C. 贿赂、舞弊
D. 中途离开考场
【单选题】
窄路掉头考试要求车辆行驶至掉头路段靠右停车,不超过_____,将车辆掉头。___
A. 一进二退
B. 二进二退
C. 三进二退
D. 二进三退
【单选题】
每个科目考试一次,考试不合格的,可以补考一次。不参加补考或者补考仍不合格的,本次考试终止,申请人应当重新预约考试,但科目二、科目三考试应当在_____后预约。___
A. 十日
B. 二十日
C. 三十日
D. 四十日
【单选题】
持有_____机动车驾驶证的考试员,不能承担残疾人专用小型自动挡载客汽车准驾车型科目三道路驾驶技能考试。___
A. 大型货车
B. 小型汽车
C. 中型客车
D. 小型自动挡汽车
【单选题】
恢复驾驶资格考试试题数量为_____道试题,考试时间为_____min。___
A. 50,30
B. 50,45
C. 100,30
D. 100,45
【单选题】
对考试系统故障等原因出现误判的,安排考生重新参加考试,程序不正确的是_____。___
A. 考试员应当在当日内
B. 通过考试监管系统报业务领导批准后
C. 保存误判的考试过程音视频资料
D. 考试员直接安排
【单选题】
______应当严格遵守考试工作纪律。___
A. 仅考试员
B. 仅考试辅助和监管人员
C. 仅考场工作人员
D. 以上人员都
【单选题】
持境外机动车驾驶证申请机动车驾驶证的,申请准驾车型为大型客车、牵引车、____ ________城市公交车、中型客车、大型货车机动车驾驶证的,应当考试_____。___
A. 仅科目一
B. 仅科目一、科目三
C. 仅科目三
D. 科目一、科目二和科目三
【单选题】
持境外机动车驾驶证申请小型汽车机动车驾驶证的(属于外国驻华使馆、领馆人员及国际组织驻华代表机构人员申请的除外),应当______。___
A. 考试科目一
B. 考试科目一和科目三
C. 考试科目一、科目二和科目三
D. 免予考试核发机动车驾驶证
【单选题】
坡道定点停车和起步项目的坡度取值为_____。___
A. 5%
B. 10%
C. 15%
D. 20%
【单选题】
按照机动车工作规范规定,加强业务告知管理。指标“逾期未检验告知”,是指对逾期_____个月未检验的机动车,未按规定告知机动车所有人的。___
【单选题】
监管指标“同一驾驶人或机动车多起违法业务”,业务监管的核查标准是:同一驾驶 证或机动车名下有超过______起违法记录的。___
【单选题】
_监管指标“同一人或车多次发生事故”,是为了甄别事故当事人是否存在“碰瓷”、“骗保”等情况。监管此种数据核查的标准是:同一人或车一年内发生____次及以上__ 交通事故的。___
【单选题】
将本月数据和去年同月份数据进行对比,即计算“(本月-去年同月)/去年同月“的结果,一般称该指标为_____。___
A. 环比
B. 同比
C. 百分比
D. 百分点
【判断题】
公安机关交通管理部门、机动车安全技术检验机构可以要求机动车到指定的场所进行维修、保养。
【判断题】
交通警察为不符合驾驶许可条件、未经考试或者考试不合格人员发放机动车驾驶证的,依法给予行政处分。
推荐试题
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic