刷题
导入试题
【单选题】
《机动车查验工作规程》(GA801-2019)规定,进口机动车注册登记,专项作业车、挂车、中型(含)以上载客汽车、中型(含)以上载货汽车的注册登记和变更登记(变更迁出除外),危险货物运输车辆的所有登记业务,以及申领机动车登记证书和校车使用许可、报废机动车法定监督解体、嫌疑车辆调查取证等业务的机动车查验应由___负责。
A. 外观员    
B. 审核员  
C. 民警查验员    
D. 初级查验员
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
《机动车查验工作规程》(GA801-2019)规定,先行核发机动车检验合格标志后监督检查的,机动车安全技术检验远程视频监管中心应在检验照片(或视频)上传后的___内将检验照片(或视频)比对完毕;采用了符合规定的机动车检验智能审核监管方式的,按比例抽查。比对结果表明检验项目不符合 GB7258 国家标准及其他相关规定的,应要求机动车安全技术检验机构通知送检的机动车重新进行检验,并按规定对机动车安全技术检验机构予以处罚。
A. 1 h    
B. 12 h   
C. 24 h     
D. 48 h
【单选题】
汽车一般由发动机、___、车身、电气和电子设备四大部分组成。
A. 底盘   
B. 变速箱  
C. 离合器      
D. 驾驶室
【单选题】
目前汽车用代用燃料主要有:合成液体石油、___、压缩天然气(CNG)、 醇类等燃料。
A. 汽油 
B. 液化石油气(LPG) 
C. 柴油     
D. 蓄电池
【单选题】
发动机按工作方式分,有___和四冲程两种,一般发动机为四冲程 发动机。
A. 二冲程  
B. 三冲程  
C. 五冲程  
D. 六冲程
【单选题】
通常讲的发动机排气量指的是___。
A. 气缸总容积    
B. 燃烧室容积    
C. 气缸工作容积    
D. 活塞行程
【单选题】
行驶系统包括:支撑全车的承载式车身及副车架、悬架和___等部分。
A. 车轮    
B. 离合器       
C. 半轴  
D. 变速器
【单选题】
转向盘在空转阶段中的___称为转向盘自由行程。
A. 距离       
B. 角行程        
C. 长度      
D. 半径
【单选题】
轮胎标志为205/ 75R15,这里205表示___。
A. 断面宽度(cm)    
B. 轮辋直径(cm)   
C. 轮辋直径(inch)   
D. 断面宽度(mm)
【单选题】
轮胎标志为205/ 75R15,这里75表示___。
A. 扁平比                 
B. 轮辋直径(cm)
C. 轮辋直径(inch)        
D. 轮胎宽度(mm)
【单选题】
轮胎标志为205/ 75R15,这里15表示___。
A. 轮辋直径(mm)       
B. 轮辋直径(cm)
C. 轮辋直径(inch)    
D. 轮胎宽度(cm)
【单选题】
轮胎标志为205/ 75R15,这里R表示___。
A. 斜交胎 
B. 子午线胎 
C. 轮辋直径(inch) 
D. 断面宽度(mm)
【单选题】
目前各类机动车所用的摩擦制动器可分为鼓式和___两大类。
A. 机械式 
B. 气压式  
C. 手动式 
D. 盘式
【单选题】
按照GB21861的规定:对于不适用于仪器设备制动检验的车辆,用制动 距离或者___判定制动性能。
A. 最大减速度和制动协调时间
B. 充分发出的最大减速度和制动协调时间
C. 充分发出的平均减速度和制动时间
D. 充分发出的平均减速度和制动协调时间
【单选题】
依据“GB21861-2014”对非营运小型、微型载客汽车车辆底盘部件检查 工位的最少检验时间为___s。
A. 40   
B. 60   
C. 100   
D. 180
【单选题】
车的制动初速度应___。
A. 不低于20km/h    
B. 不低于30km/h
C. 不低于50km/h    
D. 不高于30km/h
【单选题】
侧滑检验台是汽车在滑动板上驶过时,用测量滑动板左右___的方法来测量车轮滑移量的大小和方向,并判断是否合格的一种检测设备。
A. 移动量  
B. 滑动率  
C. 阻力  
D. 驱动力
【单选题】
前照灯远近光一体检测仪检测时对车辆停放距离要求一般是___。
A. 2米   
B. 2、5米   
C. 1米   
D. 0、5米
【单选题】
检测设备最大负荷指被测车辆的___。
A. 整车质量 
B. 单轮最大轮荷
C. 单轴最大轴荷  
D. 3轮质量
【单选题】
常用侧滑检验台为带放松板的___型式。
A. 单板单动     
B. 双板联动    
C. 双板连体单动   
D. 双板分体分动
【单选题】
常用侧滑检验台的测量范围为___。
A. ±10m/km     
B. ±8 m/km     
C. ±12 m/km     
D. ±5m/km
【单选题】
被检车辆在检测线上行驶时车辆应沿着检测线___行驶。
A. 左边    
B. 右边    
C. 中心线  
D. 斜线
【单选题】
上线检验时,当灯箱显示制动信号时,将前轮驶上制动台,停放在两滚筒中间,将变速杆放入空档位置,随即___。
A. 将脚迅速离开油门踏板   
B. 将脚迅速离开离合器踏板
C. 将脚迅速离开制动踏板      
D. 拉紧手制动
【单选题】
在检验车速表时对前驱动车辆司机为了避免车头在加速过程中左右摆动,要注意___。
A. 加速动作不能过猛   
B. 可猛打方向找正
C. 使用最高档               
D. 加速动作不能过慢
【单选题】
在进行底盘项目检查时,除具备检查工具外检验员还必需配戴___。
A. 视频记录仪 
B. 防毒面具 
C. 安全帽 
D. 劳保鞋
【单选题】
车下检查时,底盘检验员应按照车下检查项目将___通过键盘输入计算机。
A. 合格项目    
B. 不合格项目代码(具体不合格项目说明)
C. 随意输入项目   
D. 具体不合格零件
【单选题】
在滚筒反力式制动台检测行车制动时,引车员应___。
A. 急踏制动踏板    
B. 点踏制动踏板
C. 缓慢踏下制动踏板       
D. 踏时超出规定时间
【单选题】
底盘动态检验应由___实施。
A. 引车员 
B. 底盘检验员
C. 外观检验员
D. 主任检验员
【单选题】
引车员在上线检验前应对被检车辆进行___。
A. 底盘动态检验 
B. 外观检验  
C. 底盘检验 
D. 路试检验
【多选题】
机动车检验检测人员要在检验检测工作中()、()、(),为社会风气增添正义和正气。___
A. 不谋私利         
B. 吃拿卡要
C. 清正廉明         
D. 反腐拒贿
【多选题】
《公民道德建设实施纲要》指出:要大力倡导以(       )、(       )、(       )、服务群众、奉献社会为主要内容的职业道德,鼓励人们在工作中做一个好建设者。___
A. 爱岗敬业         
B. 诚实守信
C. 办事公道         
D. 热情周到
【多选题】
随着社会生产的专业化,许多人相对固定在某一个专业上进行生产工作,从而形成了社会职业,因此,在这些职业群体中逐步发展的关于本职业思想和行为的善与恶、(      )、(      )、(      )等观念、原则、规范和标准的总和,即职业道德。___
A. 偏私                 
B. 美与丑
C. 正义与非正义         
D. 公正与偏私
【多选题】
《中华人民共和国道路交通安全法》第九条规定申请机动车登记,应当提交以下证明、凭证___
A. 机动车所有人的身份证明;
B. 机动车来历证明;
C. 机动车整车出厂合格证明或者进口机动车进口凭证;
D. 车辆购置税的完税证明或者免税凭证;
【多选题】
《中华人民共和国道路交通安全法》第十二条有下列情形之一的,应当办理相应的登记___
A. 机动车所有权发生转移的;      
B. 机动车登记内容变更的;
C. 机动车用作抵押的;            
D. 机动车报废的。
【多选题】
《中华人民共和国道路交通安全法》规定,对登记后上道路行驶的机动车,应当依照法律、行政法规的规定,根据(        )、(        )、(       )等不同情况,定期进行安全技术检验。___
A. 车辆用途;         
B. 载客载货数量;
C. 使用年限;         
D. 车辆实际状况。
【多选题】
《中华人民共和国道路交通安全法》规定,对提供(    )和(     )的,机动车安全技术检验机构应当予以检验,任何单位不得附加其他条件。对符合机动车国家安全技术标准的,公安机关交通管理部门应当发给检验 合格标志。___
A. 机动车行驶证;         
B. 机动车第三者责任强制保险单;
C. 机动车驾驶证;        
D. 机动车车船税凭证。
【多选题】
《中华人民共和国道路交通安全法》规定,警车、(     )、(      )、(      )应当按照规定喷涂标志图案,安装警报器、标志灯具。其他机动车不得喷涂、安装、使用上述车辆专用的或者与其相类似的标志图案、 警报器或者标志灯具。___
A. 运钞车;   
B. 消防车;    
C. 救护车;    
D. 工程救险车
【多选题】
《中华人民共和国道路交通安全法》第十六条规定,任何单位或者个人不得有下列行为: ___
A. 拼装机动车或者擅自改变机动车已登记的结构、构造或者特征;
B. 改变机动车型号、发动机号、车架号或者车辆识别代号;
C. 伪造、变造或者使用伪造、变造的机动车登记证书、号牌、行驶证、检验合格标志、保险标志;
D. 使用其他机动车的登记证书、号牌、行驶证、检验合格标志、保险标志。
【多选题】
《中华人民共和国道路交通安全法》第九十六条规定,伪造、变造或者使用伪造、变造的机动车登记证书、(    )、(    )、(    )的,由公安机关交通管理部门予以收缴,扣留该机动车,处十五日以下拘留,并处二千元以上五千元以下罚款;构成犯罪的,依法追究刑事责任。___
A. 车船税凭证   
B. 号牌    
C. 行驶证    
D. 驾驶证
【多选题】
《中华人民共和国计量法》规定,县级以上人民政府计量行政部门对社会公用计量标准器具,部门和企业、事业单位使用的最高计量标准器具,以及用于(     )、(     )、(     )、环境监测方面的列入强制检定目录的工作计量器具,实行强制检定。未按照规定申请检定或者检定不合格的,不得使用。___
A. 贸易结算;   
B. 安全防护;   
C. 医疗卫生;  
D. 车辆检验
【多选题】
《中华人民共和国标准化法》所称标准(含标准样品),是指农业、工业、服务业以及社会事业等领域需要统一的技术要求。标准包括国家标准、(       )、(       )、(       )。___
A. 行业标准;                
B. 公司标准;
C. 地方标准和团体标准;      
D. 企业标准
推荐试题
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用