【多选题】
动车组餐车有___售货车、(ABCD )。备有餐巾纸、牙签。
A. 座椅套
B. 托盘
C. 热水瓶
D. 一次性硬质塑料水杯
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
动车组洗脸间有___(AD或干手器)。
A. 洗手液
B. 芳香盒
C. 抽纸
D. 擦手纸
【多选题】
厕所内有___和水溶性好的(ABCD ),座便器有(ABCD ),小便池内放置芳香球。
A. 芳香盒
B. 卫生纸
C. 擦手纸
D. 一次性座便垫圈
【多选题】
贴身卧具(ABC被套、床单、枕套)和头枕片___,无污渍、无破损,已使用与未使用的折叠整齐,分别装袋保管。
【多选题】
卧车被芯、枕芯先加装___,再使用(ABC )。包裹套定期清洗,保持干燥整洁。
【多选题】
清洁袋质地、规格符合规定,具有___性能,出库定位摆放,运行中及时补充。
【多选题】
服务指南由___邮箱公司负责编印、发放、日常维护,(ABCD )、(ABCD )负责审核,(ABCD )负责日常管理,
A. 沈阳铁道文化传媒集团
B. 铁路局宣传部门
C. 客运部门
D. 客运担当单位
【多选题】
"列车配有___通讯设备;乘务人员配置手持电台。设备电量充足,作用良好。
A. 票剪
B. 补票机
C. 站车客运信息无线交互系统手持终端
D. GSM-R
【多选题】
动车组出库标准:厕所___,地面干净(ABCD )。污物箱内污物排尽。
A. 无积便
B. 无积垢
C. 无异味
D. 无杂物
【多选题】
动车组出库标准:布制品、消耗品和保洁工具等服务备品___。
A. 配备齐全
B. 定位放置
C. 定型统一
D. 干净整洁
【多选题】
动车组出库标准:___、一次性座便垫圈、服务指南、免费读物、商务座专项服务等备品补足配齐,定位放置。
A. 清洁袋
B. 洗手液
C. 卫生纸
D. 擦手纸
【多选题】
服务指南中含有___、客运服务质量标准摘要及本趟列车销售的商品价目表、菜单。
A. 旅行须知
B. 乘车安全须知
C. 本车型的设备设施介绍
D. 主要停靠站公交信息
【多选题】
终到标准:终到站时车内___。垃圾装袋、封口、无渗漏,到站定点投放。
A. 无垃圾
B. 无污水
C. 无粪便
D. 无异味
【多选题】
垃圾箱满溢时及时更换垃圾袋,垃圾袋系紧扎严,防止液体外漏,放于___,不得放在(ABC )或(ABC )上。
A. 非乘降车门侧
B. 车厢连接处
C. 车门翻板
D. 车厢
【多选题】
头发___,不理奇异发型、不剃光头。
A. 长度适宜
B. 干净整齐
C. 颜色自然
D. 颜色统一
【多选题】
男性两侧鬓角不得超过___,后部不长于衬衣领,不遮盖(BD )、耳朵,不烫发,不留胡须。
A. 耳垂
B. 耳垂底部
C. 额头
D. 眉毛
【多选题】
女性发不___,刘海长不(AC ),短发不短于两寸。
【多选题】
女性眉笔和眼线为___或(BD )。
A. 深黑色
B. 黑色
C. 棕色
D. 深棕色
【多选题】
工作中保持妆容美观,端庄大方。补妆及时,在___或(AB )进行。
A. 洗手间
B. 乘务间
C. 车厢
D. 连接处
【多选题】
佩戴的外露饰物款式简洁,限手表、戒指各___,女性还可佩戴发夹、发箍或头花及一副直径不超过(BD )的耳钉。
A. 一枚
B. 一只
C. 2毫米
D. 3毫米
【多选题】
表情自然,___,庄重大方。
A. 面带笑容
B. 态度和蔼
C. 用语文明
D. 举止得体
【多选题】
服务语言表达规范、准确,使用“请、___、再见”等服务用语。
A. 您好
B. 谢谢
C. 对不起
D. 不客气
【多选题】
对旅客、货主称呼恰当,统称为“旅客们”、“各位旅客”、“旅客朋友”,单独称为“先生、___”等。
【多选题】
旅客问讯时,面向旅客站立(ACD工作人员办理业务时除外),目视旅客,___。
A. 有问必答
B. 回答标准
C. 回答准确
D. 解释耐心
【多选题】
女性可双手四指并拢,交叉相握,右手叠放在左手之上,自然垂于___;左脚靠在右脚内侧,夹角为(AD )呈“丁”字形。
A. 腹前
B. 胸前
C. 35°
D. 45°
【多选题】
办理交接时行___,右手五指并拢平展,向内上方举手至帽沿右侧边沿,小臂形成(BC )角。
A. 注目礼
B. 举手礼
C. 45°角
D. 35°
【多选题】
不高声喧哗、___,不在旅客面前吃食物、(ABC )、剔牙齿和出现其他不文明、不礼貌的动作。
A. 嬉笑打闹
B. 勾肩搭背
C. 吸烟
D. 吐痰
【多选题】
始发前对车厢进行预冷、预热,车内温度保持冬季___,夏季(AC )。
A. 18℃~20℃
B. 26℃~28℃
C. 18℃~22℃
D. 24℃~28℃
【多选题】
广播___,不干扰旅客正常休息。
A. 语音清晰
B. 音量适宜
C. 用语准确
D. 口齿清晰
【多选题】
广播、视频内容以方便旅行生活为主,介绍宣传安全常识和车辆设备设施的使用方法,提示旅客遵守安全乘车规定,播报前方停站、到站信息等内容,适当插播___、广告等节目。
A. 文艺娱乐
B. 文明礼仪
C. 沿线风光
D. 民俗风情
E. 餐食供应
【多选题】
运行途中,___时或(BD )时锁闭厕所,其他时间不锁厕所。
A. 厕所排污
B. 厕所吸污时
C. 供电
D. 未供电
【多选题】
通过___等方式宣传旅客运输服务信息及客运服务质量标准摘要,引导旅客自助服务。
A. 图形符号
B. 电子显示
C. 广播
D. 视频
E. 服务指南
【多选题】
商务座车配有专职人员,主动介绍专项服务项目,提供___、耳塞等服务。
A. 饮品
B. 餐食
C. 小食品
D. 小毛巾
【多选题】
商务座车正餐以冷链为主,配用速溶汤,分量适中,可另行配备___等。品种不少于3种,配有清真餐食,定期调整。
A. 面食
B. 面点
C. 菜品
D. 佐餐料包
【多选题】
商务座车选用非油炸类点心、蜜饯类、坚果类等___的休闲小食品,品种不少于6种,独立小包装。
【多选题】
“G”字头跨局动车组特、一等座车提供___等服务,全程提供送水服务。
A. 盒饭
B. 方便面
C. 饮品
D. 小食品
【多选题】
受理旅客咨询、求助、投诉,___。
A. 及时回应
B. 热情处置
C. 有问必答
D. 回答准确
【多选题】
对重点旅客做到“三知三有”(ABCD知座席、___、有交接)。
A. 知到站
B. 知困难
C. 有登记
D. 有服务
推荐试题
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol