【多选题】
内部稽核是指通过数据核查、事后核查对行业内部参与单位、业务人员的( )进行稽核,排查是否存在因行业人为原因造成的通行费损失等问题。 ___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
稽核追缴信息的生成均需明确责任认定,责任认定结果分为参与方省份( )。 ___
A. 发行服务机构责任
B. 收费公路经营管理单位责任
C. 收费所责任
D. 客户责任
【多选题】
为适应取消高速公路省界收费站后工作需要,确保收费公路联网收费运营工作稳定有序开展,对《鲜活农产品品种目录》进行调整完善。 以下关于新的《鲜活农产品品种目录》(2019)描述正确的是___
A. 将生姜由葱蒜类移至薯芋类。
B. 将无花果移至什果类
C. 将菜薹由白菜类移至甘蓝类。
D. 将食用蛙归类为鲜活水产类。
【多选题】
根据新的《鲜活农产品品种目录》(2019),以下哪些可以享受免费绿通优惠待遇? ___
A. 冷冻鸭肉
B. 牛
C. 仔猪
D. 新鲜鸡肉
【多选题】
根据JT/T 489—2019«收费公路车辆通行费车型分类»规定,以下哪些属于2类货车?___
A. 车长8000mm的两轴货车
B. 总质量6500kg的两轴货车
C. 车长7000mm的三轴货车
D. 4000kg的两轴货车
【多选题】
省(区、市)涉及新增、取消和变更哪些基础信息,省中心应早于变更内容生效前 30 个自然日向部联网中心发函进行相关备案,并配合完成收费公路通行费增值税发票开具相关涉税工作。 ___
A. 收费站
B. ETC 门架系统
C. 收费公路
D. 收费业主信息
【多选题】
以下哪种CPC卡通行异常,如后台系统无法获取计费信息,根据客户提供的入口、通行路径等信息,按全网可达最短路径收费。 ___
A. 出口车牌不一致
B. 无入口信息
C. 无效入口站编码
D. CPC 卡发行属地无效
【多选题】
关于收费业务 的评价指标包括( ) ___
A. ETC 通行成功率
B. 车型准确率
C. 车牌准确率
D. 交易成功率(ETC 门架系统)
【多选题】
ETC车辆正常通行入口车道的条件有哪些? ___
A. 有OBU,OBU为拆卸,OBU在有效期内
B. ETC卡在有效期内,ETC卡正常插入OBU
C. 不是状态名单,储值卡余额大于零
D. 卡签车牌一致,不是追缴黑名单 ,写入口信息
E. 货车已进行入口称重检测且准予通行
【多选题】
ETC车辆正常通过门架系统的条件有哪些? ___
A. 有入口信息
B. OBU未拆卸
C. ETC卡正常插入OBU
D. 卡签车牌一致
【多选题】
ETC车辆正常通行出口ETC车道/混合车道条件有哪些? ___
A. 有OBU,有入口信息
B. OBU未拆卸,ETC卡正常插入OBU
C. 卡签车牌一致,不是追缴黑名单
D. 卡内余额充足
【多选题】
非ETC车辆正常通行入口车道的条件有哪些? ___
A. 不是追缴黑名单
B. 发CPC卡
C. 货车已进行入口称重检测且准予通行
D. 有固定牌照的车辆
【多选题】
非ETC车辆正常通行出口混合车道条件有哪些? ___
A. 有CPC卡,CPC有入口信息, CPC发行属地有效
B. CPC卡内入口站编码有效,CPC卡内车牌、车型.车种与实际一致
C. 不是追缴黑名单
D. 如用ETC卡支付,
E. TC卡不在状态名单内,ETC卡车牌与实际一致
【多选题】
收费公路联网收费运营和服务规程中参考的政策有哪些(二)? ___
A. 关于切实做好货车通行费计费方式调整有关工作的通知(交公路发〔2019〕93号)
B. 关于全面清理规范地方性车辆通行费减免政策的通知(交公路发〔2019〕98 号)
C. 关于进一步优化鲜活农产品运输“绿色通道”政策的通知(交公路发〔2019〕99 号)
D. 关于印发取消高速公路省界收费站总体技术方案的通知(交办公路函320号)
E. 关于印发《收费公路联网收费运营和服务规则(2019)》的通知(交办公路函873号)
F. 关于印发《高速公路称重检测业务规范和技术要求》的通知(交办公路函1182号)
【多选题】
取消省界收费站后的收费模式,收费方式,收费依据分别是 ___
A. 分段(省)计费,分段收费
B. 开放式收费
C. 车型+里程+路径
D. 车次+隧道叠加
【多选题】
内部稽核内容有哪些? ___
A. 发行稽核
B. 收费行为稽核
C. 运营管理稽核
D. 车辆行为稽核
【多选题】
外部稽核类型包括但不限于 ___
A. 改变车型(车种)逃费
B. 改变缴费路径逃费
C. 利用优免政策逃费
D. 拒缴,U/J型等
【多选题】
ETC 入口车道判断通过内容包括OBU在(),()、()、OBU和ETC卡车牌号码()、不在状态名单或()、双片式OBU车辆的ETC卡正常插入、储值卡余额大于零。 ___
A. 有效期内
B. OBU未拆卸
C. ETC卡在有效期内
D. 一致
E. 追缴黑名单内
【多选题】
出口遇到车牌不一致:CPC 卡内车牌与实际车牌不一致时,收费员根据实际车牌、车型和车种,在系统中发起计费请求,根据获取到的计费信息进行收费;以下错误的是:___
A. 车道系统
B. 查询系统
C. 检测系统
D. 安全系统
【多选题】
ETC客车什么条件下可以正常通过? ___
A. 有OBU
B. OBU未拆卸
C. ETC卡正常插入OBU
D. 储值卡余额大于零
E. 不是追缴黑名单
【多选题】
以下特情业务处理原则正确的是 ___
A. 单次行程只按一种原则收费
B. 有入口信息,门架正常计费/扣费
C. ETC车辆有入口信息,出口视为ETC车辆处理
D. 持CPC卡计费原则:后台系统>CPC卡内信息>全网可达最短路径
E. 通行介质不可信情况计费原则:按实际车牌发起计费>全网可达最短路径
【多选题】
下列出口混合车道特情类型及处理原则正确的是: ___
A. 无入口信息查:是否有CPC卡,按非ETC车辆处理
B. 卡签车牌信息不一致:以出口车牌、车型和车种发起计费请求
C. 追缴黑名单:正常收取本次通行费用,并按要求追缴
D. 卡签损坏:根据实际车牌发起入口信息查询请求:有入口未领CPC,抬杆放行;有入口已领CPC,以实际车牌等发起计费请求,按非ETC车辆处理,收卡工本费
E. 卡签损坏:根据实际车牌发起入口信息查询请求:无入口信息,按实际车牌、车型和车种发起计费请求,按非ETC车辆收费
【多选题】
《收费公路联网收费运营和服务规程》-收费业务的编制原则: ___
A. 对运营规则进行细化
B. 进一步明确收费原则
C. 客户利益优先
D. 通行体验优先原则
E. 严厉打击逃费行为
【多选题】
非ETC货车驶通行高速,经入口称重检测系统检测并将相关信息发送至入口收费站,合法车辆准予驶入收费车道,并在CPC内写入入口称重检测系统传输并经收费员核实的()、()、()、()、()等入口信息 ___
A. 车型
B. 轴数
C. 车牌号码
D. 车牌颜色
E. 重量
【多选题】
下列对于CPC卡描述正确的是: ___
A. 无法读写或电量低于8%的CPC卡不得进行调拨或在车道发放。
B. 车道不得发放无入口信息或预先写入信息的CPC卡。
C. 各省(区、市)应根据本区域通行量增长和新开通联网路段等情况追加CPC卡投放数量,保障路网正常运营。追加投放应遵循CPC卡入网管理流程。
D. 各级卡管理机构均应以卡箱为单位进行CPC卡管理(车道应用除外),每个卡箱容量不宜超过500张且为整百数。
【多选题】
CPC卡车道使用基本流程: ___
A. 班长领卡
B. 拆箱
C. 车道发放
D. 车道余卡
E. 装箱
F. 归还
【多选题】
纸质通行券管理 ___
A. 纸质通行券由各省中心组织印制,版面应由部统一设计。
B. 纸质通行券用于收费站所有车道出现故障无法使用的紧急情况(☆大客流不允许发放)。
C. 纸质通行券使用前应经省中心同意,省中心同步通过通行介质管理平台向部联网中心报备启用和停用情况。
D. 各省应最大限度减少纸质通行券使用。
【多选题】
入口发放的CPC卡记录哪些信息( ) ___
A. 车牌
B. 车型
C. 入口信息
D. 货车轴数
E. 货车总重
F. 车种
【多选题】
特种车辆包括哪些车辆() ___
A. 货车列车车辆
B. 半挂车列车车辆
C. 超限车
D. 大件运输车辆
【多选题】
纸质通行劵包括哪些信息() ___
A. 入口路网
B. 入口站码
C. 入口站名
D. 车型
E. 车牌号码
F. 日期
G. 卷号
【多选题】
ETC客户服务渠道包括 ___
A. 线上服务渠道
B. 线下服务渠道
C. 客户联络中心
【多选题】
复合通行卡(CPC卡):集5.8GHz和13.56MHz通信功能于一体,具备( )等读写功能,在收费站入口车道发放给车辆、出口车道收回的可重复使用的通行介质。 ___
A. 车辆入口信息
B. 路径信息
C. 计费信息
【多选题】
入网管理工作包括CPC卡( )等。省中心在CPC卡流通使用前应做好入网管理工作。 ___
【多选题】
各级卡管理机构均应以卡箱为单位进行CPC卡管理(车道应用除外),每个卡箱容量不宜超过( )张且为( )数。 ___
A. 100
B. 500
C. 50
D. 整百
【多选题】
CPC卡通行异常包括:() ___
A. 出口车牌不一致
B. 无入口信息
C. 丢失卡或损坏卡
D. 无效入口站编码
E. CPU卡发行地无效
F. 出入口车型不一致
【多选题】
发行服务机构应提供以下哪些客户查询服务?() ___
A. 基本信息查询
B. 充值消费查询
C. 业务办理查询
D. 线上和线下渠道查询
【填空题】
1、了解和回忆生活中的点点滴滴,让我感受到自己的生活和成长都倾注了家人无尽的___与___。
【填空题】
2、如果不小心让身体受到伤害,不仅要承受___,还要面临生活中的种种___。
【填空题】
3、我们的健康成长,离不开家人的___和___。我们应该学会爱惜自己的身体,珍惜___。
推荐试题
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place