【判断题】
甲为刑满释放人员,出狱后自己开办了一家饭店。由于其曾有犯罪前科,当地县工商局要求其每年额外交纳一万元的“诚信保证金”,否则将吊销其营业执照。对此,甲可以向上一级工商管理部门申请行政复议
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
行政复议机关决定撤销或者确认某具体行政行为违法的,可以责令被申请人在一定期限内重新作出具体行政行为
A. 对
B. 错
【判断题】
对地方各级人民政府的具体行政行为不服的,可以向本级人民政府申请行政复议,也可以向上一级地方人民政府申请行政复议
A. 对
B. 错
【判断题】
公民、法人或者其他组织自具体行政行为发生之日起六十日内未提出行政复议申请的,将不能再申请行政复议
A. 对
B. 错
【判断题】
行政复议期间有关“五日”、“七日”等的规定是指工作日,不含节假日
A. 对
B. 错
【判断题】
行政复议只采用书面审查的方式
A. 对
B. 错
【判断题】
对本县公安局的具体行政行为不服的,申请人只能向本县人民政府申请行政复议
A. 对
B. 错
【判断题】
行政复议机关在复议过程中发现被申请人对申请人作出的处罚决定过轻,应当决定撤销原处罚决定,作出较原处罚更重的处罚决定
A. 对
B. 错
【判断题】
被申请人因不可抗力,不能参加行政复议的,行政复议不中止审理
A. 对
B. 错
【判断题】
申请人在行政复议决定作出前自愿撤回行政复议申请的,需经行政复议机构同意方可撤回
A. 对
B. 错
【判断题】
案件涉及法律适用问题,需要有权机关作出解释或者确认的,行政复议中止,满60日该情形仍持续的,行政复议终止
A. 对
B. 错
【判断题】
申请人S公司在复议期间与D公司合并为Y公司,若Y公司声称放弃行政复议,该行政复议终止
A. 对
B. 错
【判断题】
案件审理需要以其他案件的审理结果为依据,而其他案件尚未审结的,行政复议中止审理
A. 对
B. 错
【判断题】
行政复议机关应当为申请人查阅有关材料提供必要条件
A. 对
B. 错
【判断题】
案件涉及法律适用问题,需要有权机关解释或者确认的,行政复议终止审理
A. 对
B. 错
【判断题】
A公司受某县工商局处罚1万元,A公司不服,于同一时间分别向县人民政府和市工商局提出行政复议申请,可以由县人民政府和市工商局共同受理该案件,也可以由县人民政府和市工商局协商确定案件的受理
A. 对
B. 错
【判断题】
除《行政复议法》及其实施条例特别规定的行政复议案件以外,行政复议不适用调解
A. 对
B. 错
【判断题】
行政强制措施实施前须向行政机关负责人报告并经批准
A. 对
B. 错
【判断题】
人民法院发现申请强制执行的行政决定明显缺乏法律依据的,应当自受理之日起三十日内作出是否执行的裁定
A. 对
B. 错
【判断题】
行政机关的执法人员实施行政强制措施时必须出示执法身份证件
A. 对
B. 错
【判断题】
人民法院对行政机关强制执行的申请进行书面审查,行政决定具备法定执行效力的,人民法院应当自受理之日起七日内作出执行裁定
A. 对
B. 错
【判断题】
解除查封的,行政机关已将鲜活物品拍卖或者变卖的,退还拍卖或者变卖所得款项。变卖价格明显低于市场价格,给当事人造成损失的,应当给予补偿
A. 对
B. 错
【判断题】
金融机构在冻结前向当事人泄露信息的,由金融业监督管理机构责令改正,对直接负责的主管人员和其他直接责任人员依法给予处分
A. 对
B. 错
【判断题】
被执行当事人提出的事实、理由或者证据成立的,行政机关应当采纳
A. 对
B. 错
【判断题】
为防止证据损毁,县税务局冻结逃税人的存款是行政强制执行行为
A. 对
B. 错
【判断题】
行政机关在查封、扣押法定期间不作出处理决定,由上级行政机关或者有关部门直接作出
A. 对
B. 错
【判断题】
行政机关对人民法院不予受理强制执行申请的裁定有异议的,可以在十日内向上一级人民法院申请复议
A. 对
B. 错
【判断题】
当事人收到催告书后有权进行陈述和申辩
A. 对
B. 错
【判断题】
行政机关不得在夜间或者法定节假日实施行政强制执行。但是,情况紧急的除外
A. 对
B. 错
【判断题】
行政机关申请人民法院强制执行前,可以不用催告当事人履行义务
A. 对
B. 错
【判断题】
执行对象是不动产的,行政机关向不动产所在地有管辖权的人民法院申请强制执行
A. 对
B. 错
【判断题】
人民法院发现申请强制执行的行政决定明显缺乏事实根据的,在作出裁定前可以听取被执行人和行政机关的意见
A. 对
B. 错
【判断题】
行政机关违反法定程序实施行政强制的,由该机关对直接负责的主管人员和其他责任人员依法给予处分
A. 对
B. 错
【判断题】
行政机关在实施行政强制时,对居民生活采取停止供热等方式迫使当事人履行相关行政决定的,由上级行政机关或者有关部门对直接负责的主管人员和其他直接责任人员依法给予警告
A. 对
B. 错
【判断题】
行政机关及其工作人员不得利用行政强制权为单位或者个人谋取利益
A. 对
B. 错
【判断题】
公民、法人或者其他组织对行政机关实施行政强制,有权依法申请行政复议或者提起行政诉讼
A. 对
B. 错
【判断题】
行政强制的实施机关可以对已设定的行政强制的实施情况及存在的必要性适时进行评价
A. 对
B. 错
【判断题】
在行政诉讼中,被告不提交答辩状的,人民法院应当中止对案件的审理
A. 对
B. 错
【判断题】
人民法院应当在立案之日起五日内,将起诉状副本发送被告
A. 对
B. 错
【判断题】
由行政机关委托的组织所作的具体行政行为,委托的行政机关是被告
A. 对
B. 错
【判断题】
由行政机关委托的组织所作的具体行政行为,该组织是行政诉讼中的被告
A. 对
B. 错
推荐试题
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL