刷题
导入试题
【多选题】
旅客票价里程,没有直达列车的,按中转次数___的列车径路计算,中转次数相同的,按(AB )列车径路计算。
A. 最少
B. 最短
C. 最多
D. 最长
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AB
解析
暂无解析
相关试题
【多选题】
计算旅客票价的起码里程为:客票___千米;空调票(ABD )千米;加快票(ABD )千米;卧铺票(ABD )千米.
A. 20
B. 100
C. 200
D. 400
【多选题】
计算行李、包裹运价的起码里程为:行李___千米;包裹(AB )千米。
A. 20
B. 100
C. 200
D. 400
【多选题】
以下说法正确的是___
A. 空调票的起码里程为20KM
B. 客票的起码里程为20KM
C. 客票的起码里程为40KM
D. 加快票的起码里程为100KM
【多选题】
旅客客票票价:分为___、(AD )客票票价。
A. 硬座
B. 硬卧
C. 软卧
D. 软座
【多选题】
旅客附加票票价:分为___、(CDE )、(CDE )票票价。
A. 普快
B. 快速
C. 加快
D. 卧铺
E. 空调
F. 硬卧
【多选题】
旅客票价按照旅客___和(AC ),采取递远递减的办法确定。
A. 旅行的距离
B. 距离
C. 不同的列车设备条件
D. 设备条件
【多选题】
儿童票可享受___、(ACD )和(ACD )的优惠
A. 客票
B. 软硬座车票
C. 加快票
D. 空调票
【多选题】
免费乘车的儿童单独使用卧铺时,可享受___。
A. 半价客票
B. 半价空调票
C. 半价卧铺票
D. 全价卧铺票
【多选题】
身高1.2~1.5m的儿童乘车时,可购买半价___
A. 硬座票
B. 加快票
C. 空调票
D. 软座票
【多选题】
儿童票是指半价的___
A. 客票
B. 加快票
C. 卧铺票
D. 空调票
【多选题】
伤残军人半价票包括___。
A. 半价硬座客票
B. 半价软座客票
C. 半价加快票
D. 半价空调票
【多选题】
优惠票包括___
A. 儿童票
B. 学生票
C. 伤残军、警票
D. 团体旅客票
【多选题】
学生票和儿童票的相同点在于___
A. 客票
B. 卧铺票
C. 空调票
D. 加快票
【多选题】
残疾军人票和儿童票的相同点在于___
A. 客票
B. 卧铺票
C. 空调票
D. 加快票
【多选题】
学生票和残疾军人票的相同点在于___
A. 客票
B. 卧铺票
C. 空调票
D. 加快票
【多选题】
学生票可享受___、(BCD )和(BCD )的优惠
A. 硬座车票
B. 硬座客票
C. 加快票
D. 空调票
【多选题】
享受优惠的儿童、学生、伤残军人乘坐___、(AD )时,仍按硬座半价计算,不再减价。
A. 市郊
B. 硬座车
C. 普客车
D. 棚车
【多选题】
下列行李、包裹规定计价重量正确的是___
A. 残疾人用车25kg/辆
B. 自行车25kg/辆
C. 助力自行车40kg/辆
D. 两轮轻便摩托车50kg/辆
【多选题】
按保价运输的行李、包裹核收保价费。行李保价费按声明价格的___、包裹保价费按声明价格的(AB )计算。
A. 0.50%
B. 0.01
C. 0.5
D. 1
【多选题】
___是特定运价
A. 包车费
B. 租车费
C. 挂运费
D. 行驶费
【多选题】
特定运价包括___。
A. 挂运运价
B. 租车运价
C. 包车运价
D. 空驶运价
【多选题】
包用座车时,应按座车___核收全价客票票价
A. 种别
B. 定员
C. 席别
D. 人数
【多选题】
___可以采用过轨运输。
A. 国家铁路
B. 合资铁路
C. 地方铁路
D. 俄罗斯铁路
【多选题】
" 客运杂费是指在铁路运输过程中,除去___、(BC )以外,铁路运输企业向旅客、托运人、收货人提供的辅助作业、劳务及物耗等所收的费用。
A. 旅客客票票价
B. 旅客车票票价
C. 行李包裹运价
D. 行包运价
【多选题】
客运杂费的___和(AD )由国务院铁路主管部门制定,统一规定的部分杂费收费标准见附表3。
A. 收费项目
B. 项目
C. 标准
D. 收费标准
【多选题】
迟交票款、运费、杂费时从应收该项费用之___起至付款日止,每迟交一日,按迟交总额的(BD )核收运输费用迟交金。
A. 当日
B. 次日
C. 0.02
D. 0.01
【多选题】
关于客运杂费收费项目及收费标准中的叙述,正确的是___
A. 站台票1元/张
B. 货签费0.25元/个
C. 安全标志费0.20元/个
D. 在装运前行李、包裹手续费5元/票次
【多选题】
CRH5G型动车组在___车设置洗面间。
A. 1
B. 4
C. 5
D. 8
【多选题】
CRH5G型动车组应急梯放在___车备品柜内。
A. 1
B. 4
C. 5
D. 8
【多选题】
集装容器外部长、宽、高尺寸之和不大于___厘米,袋状容器最大直径不大于(BAD )厘米,最短边长不小于(BAD )厘米。
A. 80
B. 160
C. 40
D. 30
【多选题】
中部车门是指___车门。
A. 3
B. 4
C. 6
D. 5
【多选题】
安全管理考核坚持___、(ABC )、(ABC )的原则,按管理权限和管理职责分工实施。
A. 公平
B. 公正
C. 公开
D. 公道
【多选题】
动车组列车发生故障时,列车工作人员要及时广播晚点原因,做好___旅客工作,稳定情绪,同时要加大巡视车厢频次,维持好车内秩序。
A. 安抚
B. 咨询
C. 解释
D. 服务
【多选题】
行车设备发生故障造成动车组非正常运行或停车时,动车组___、应按照有关规定进行处理。
A. 司机
B. 列车长
C. 随车机械师
D. 乘警
【多选题】
热备动车组的机务、车辆、客运和保洁等乘务人员必须按运营要求配备,并在热备动车组上待命,确保接令后在车站热备的动车组___分钟、在车站外热备的动车组(AC )分钟具备车站发车条件。
A. 10
B. 15
C. 20
D. 30
【多选题】
动车组发生故障后,如果区间停车超过___分钟、站内停车超过(BC )分钟后,仍无法判明故障原因或虽已判明故障原因,但短时间内难以处置修复时,随车机械师须及时果断通知司机请求救援。
A. 15
B. 20
C. 30
D. 60
【多选题】
动车组列车晚点时,故障造成动车组无法运行并全列空调失效时,___应立即通知(BD )请求救援。
A. 列车长
B. 随车机械师
C. 乘警
D. 司机
【多选题】
动车组列车故障确需换乘时,列车调度员要将救援方案及时通知司机,司机通知___。
A. 车站
B. 司机
C. 随车机械师
D. 列车长
【多选题】
动车组票价可按公布票价打折,经过___应执行同一票价。
A. 相同径路
B. 相同站间
C. 相同时段
D. 不同车次
【多选题】
实行打折优惠时,车站除公布票价外,另要及时公布车次别、点到点票价的___。
A. 折扣率
B. 公布票价
C. 折后票价
D. 票价
推荐试题
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用