【单选题】
一收费员的当前票号为001,在对一辆车收费时,因打印机卷纸原因,发票上卷,结果打印在003号票上,请问接下来如何操作?___
A. 重输票号“004”,重打票在“004”号上,“001、002、003”空票处理
B. “001”空票处理,重打票在“002”号上,“003”撕下空票处理,重输票号“004”
C. 重输票号“004”,对“001”销票,“002、003”空票处理
D. 不做任何处理
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
国安GA33--0XX标志由___核发,目前在用80块,编号为00----080号。
A. 浙江省国家安全厅
B. 浙江省交通厅
C. 浙江省公路管理局
D. 浙江省公安厅
【单选题】
出口车道收到缴费凭证时,正确的操作流程应该是___。
A. 输入车牌-输入"纸券键"→输入缴费凭证号→收费
B. 输入车牌-判车型→输入"纸券键"→输入缴费凭证号→收费
C. 输入车牌-输"纸券键"→输入缴费凭证号→输入入口站名→收费
D. 判车型-输入车牌→输"纸券键"→输入缴费凭证号→输入入口站名→收费
【单选题】
《中华人民共和国消防法》第十六条规定:机关、团体、企事业等单位应当履行___消防安全职责。
A. 确定消防安全管理人,组织实施本单位的消防安全管理工作
B. 建立消防档案。确定消防安全重点部位,设置防火标志,实行严格管理
C. 落实消防安全责任制,制定本单位的消防安全制度、消防安全操作规程,制定灭火和应急疏散预案
D. 对职工进行岗前消防安全培训,定期组织消防安全培训和演练
【单选题】
测量精度方面,从理论上讲,车辆低速___以下,通行称重台时,精度可以达到正负2%。
A. 10KM/H
B. 5KM/H
C. 20KM/H
D. 15KM/H
【单选题】
入口收费员刷卡后发现车型判别有误,应将已写入误判车型的通行卡置于一边,重新判车型进行发卡操作,第一张通行卡作为___。
A. 不可读卡
B. 正常卡
C. 已写未发卡
D. 损坏卡
【单选题】
由于不可抗和不可预测因素造成通讯系统断开,以下说法正确的是___。
A. 系统数据丢失
B. 数据还能传送到结算中心
C. 系统自动备份到本地机器上
D. 通讯恢复正常时,也不能传送未发的原始数据
【单选题】
车辆超限指的是___。
A. 轴载质量超过规定限值
B. 车货总重超过规定限值
C. 装载总尺寸超过规定限值
D. 全部都是
【单选题】
《劳动法》规定,提出仲裁要求的一方应当自劳动争议发生之日起___日内向劳动争议仲裁委员会提出书面申请。仲裁裁决一般应在收到仲裁申请的()日内作出。对仲裁裁决无异议的,当事人必须履行。
A. 60、60
B. 60、30
C. 30、30
D. 30、60
【单选题】
总轴限:各轴(联轴)的___之和称之为总轴限。
A. 总载值
B. 限载值
C. 承受值
D. 轴值
【单选题】
聚众堵塞高速公路或者聚集车辆强行冲卡,破坏交通秩序,抗拒、阻碍国家治安管理工作人员依法执行职务,情节严重的,对___以聚众扰乱交通秩序罪定罪处罚?
A. 参与人员
B. 聚众人员
C. 首要分子
D. 随从人员
【单选题】
入口超限车辆如内广场条件允许直接调头,入口正常发通行卡,由班长或安保员持卡引导内广场调头,出口验卡按_____放行。___
A. 有理由“U”型车
B. 无理由“U”型车
C. 卡不可读车辆
D. 无卡无票车辆
【单选题】
专用汽车具体分类以行驶证上的___为准。
A. 厂牌型号
B. 车辆类型
C. 核载吨位
D. 整备质量
【单选题】
根据国标GB/T3730.1-2001规定,专用汽车就是我们平常口语化的特种车辆,厂牌型号第一位数字为___。
【单选题】
收费道口常见的集装箱箱体为___,是一种通用集装箱,适用于装运没有特殊要求的一般货物。
A. 散货集装箱
B. 干货集装箱
C. 开顶集装箱
D. 罐装集装箱
【单选题】
《中华人民共和国公路法》第85条规定,对公路造成损害应当依法承担___责任。
A. 民事责任
B. 行政责任
C. 刑事责任
D. 国家责任
【单选题】
以下哪种混装车辆可以享受鲜活农产品运输绿色通道各项政策?___
A. 《目录》范围内的鲜活农产品与《目录》范围外的其他农产品混装,且混装的其它农产品超过车辆核定载质量或车厢容积20%的车辆
B. 《目录》范围内鲜活农产品与其它货物混装
C. 《目录》范围内不同鲜活农产品混装的车辆,超载5%以上
D. 《目录》范围内不同鲜活农产品混装的合法装载车辆
【单选题】
下列说法错误的是:___。
A. 空票须班长旁站
B. 制式警车可免费通行
C. 误判车型后,在收费界面,可按更改车型键更改车型
D. 公务卡必须与通行卡同时使用
【单选题】
出现打印机打出的发票损坏或卡纸原因造成发票损坏,收费员未按模拟通过键且车辆未驶离后线圈时重新打印发票,此时,前一张发票应做___。
A. 销票处理
B. 空票处理
C. 盖作废章即可
D. 预销票处理
【单选题】
20--39座客车车次费()、车公里费___。
A. 每车次5元、每公里0.4元
B. 每车次10元、每公里0.8元
C. 每车次10元、每公里1.2元
D. 每车次15元、每公里1.2元
【单选题】
聚众堵塞高速公路或者聚集车辆强行冲卡, ,抗拒、阻碍国家治安管理工作人员依法执行职务,情节严重的,对首要分子,依照刑法第二百九十一条的规定,以___罪处罚。
A. 聚众扰乱交通秩序
B. 聚众扰乱社会秩序
C. 危害公共安全
D. 破坏社会主义市场经济秩序罪
【单选题】
ETC用户遗失电子标签后在挂失生效前发生的高速公路通行费由___承担。
A. 高速公路业主单位
B. 不停车收费服务处
C. 用户本人
D. 银行
【单选题】
在特殊紧急情况下,高速公路入口收费站可发放___作为通行凭证,并及时向省交通运输厅报备。对于在高速公路入口领取该凭证的车辆,出口时,以其可能通行的最短路径,为计收车辆通行费的行驶路径。
A. 免费凭证
B. 复合通行卡
C. 节假日通行凭证
D. 纸质缴费凭证
【单选题】
持复合卡普通车操作(多路径) --最短路径和多条可能路径,供参考,与___确认行驶路径,路标信息、路径示意图,系统按照确认后的路径,计算通行费。
A. 司机
B. 班长
C. 监控室
D. 复合通行卡
【单选题】
对在全省高速公路网中通行的车辆,原则上按照___计收通行费。
A. 最短路径
B. 实际行驶路径
C. 司机自述
D. 参考路径
【单选题】
《浙江省专职消防队执勤车辆免费通行证》的由哪个部门负责通行证的使用管理?___
A. 省交通厅
B. 省物价局
C. 省公安厅消防部门
D. 省安监局
【单选题】
司机只有公务卡而没有通行卡时如何处理?___
A. 非本单位车辆,收取全程通行费
B. 本单位车辆,免费放行
C. 无论是否本单位车辆,按无卡无票收取通行费
D. 核实入口站点,若公务卡有效则按无卡无票刷公务卡放行;若公务卡无效,按无卡无票收取通行费
【单选题】
车辆厂牌型号中,其中车架型号第一个数字为6的代表含义是___。
A. 厢式汽车
B. 载客汽车
C. 轿车
D. 半挂车及专用车
【单选题】
对持纸制临时军牌照进出口的车辆,收费员应查看临时牌照的有效性,同时根据情况核查___等二证。
A. 部队驾驶证、部队行驶证
B. 部队行驶证、士官证
C. 部队行驶证、文职干部证
D. 部队驾驶证、军官证
【单选题】
如收费系统瘫痪,出口收费员使用定额发票,客车按___收取通行费。
A. 行驶证核载吨位
B. 司机自报站点
C. 通行卡内信息
D. 最低标准
【单选题】
不停车收费系统中路侧天线的英文缩写为___
A. OPU
B. OBU
C. ETC
D. RSU
【单选题】
若发生卡丢、卡损坏等情况,复合通行卡的工本费为___。
A. 15元
B. 20元
C. 70元
D. 75元
【单选题】
下列哪些不属于鲜活农产品运输绿色通道的产品?___
A. 干黄豆
B. 土豆
C. 地瓜(红薯)
D. 海瓜子
【单选题】
路径标识信息不准确:对有两个冗余路标缺失其一时,系统自动容错并唯一确定行驶路径的,仍按___。
A. 司机自报站点
B. 最短路径
C. 最远站点
D. 实际行驶路径
【单选题】
当车道上有一辆等待车辆时,可电脑屏幕上显示有2个图标,此时应进行的正确操作是 ___。
A. 按特情键使用初始化方法
B. 先刷等待车辆的通行卡然后进入到特情里使用整车删除方法,删除上一辆车的信息
C. 先刷等待车辆的通行卡然后进入到特情里使用整车插入方法
D. 正常打印发票收费放行
【单选题】
叠加通行费的隧道指装有通风和监控设施的独立隧道(含左右洞),按长度分1000-2500米、2500-4000米、4000-5500米、5500-7000米、7000-8500米、8500-10000米、10000米以上七类,分别叠加___辆/次。
A. 1元 2元 5元 8元 10元 12元 15元
B. 2元 3元 5元 7元 10元 12元 15元
C. 1元 3元 5元 8元 10元 12元 15元
D. 1元 2元 4元 5元 7元 10元 12元
【单选题】
对混装非农产品车辆,或者混装其它不属于绿色农产品重量或空间超过()的车辆,按普通车收费。___
A. 20%(含)
B. 20%
C. 80%(含)
D. 80%
【单选题】
高速公路在紧急情况下,入口可向车辆发放纸质缴费凭证作为通行凭证。出口时按___路径收费。
A. 最短
B. 最远
C. 实际
D. 可能行驶的最远站点
【单选题】
浙江省高速公路___起,实行按实际行驶路径收费。
A. 2012年5月15日零时
B. 2012年4月15日零时
C. 2012年5月16日零时
D. 2012年5月5日零时
【单选题】
在刷复合卡后,系统显示付费方式界面时,按___键,系统显示该复合卡采集的车辆的行驶路径信息,蓝点表示起点,绿点表示终点,红点表示经过的路径标息。
A. W键
B. ALT+W
C. F4
D. ALT+F4
【单选题】
根据浙江省最近颁布的关于办理偷逃高速公路通行费等刑事案件具体适用法律若干问题的意见,通过各种手段,累计偷逃车辆通行费达___以上,将以诈骗罪定罪处罚。
A. 2000元
B. 4000元
C. 10000元
D. 20000元
推荐试题
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management