【判断题】
克拉玛依火车站位于市区西南工业园区处
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
在车辆经营权有效期限内,需要变更车辆经营权经营主体的,应当到原许可机关办理变更许可手续
A. 对
B. 错
【判断题】
未经批准,擅自编辑、翻译、出版、印刷、复制、制作、发行、销售和传播宗教类非法出版物和音像制品。是非法宗教活动
A. 对
B. 错
【判断题】
冬季滑雪是北方传统旅游项目
A. 对
B. 错
【判断题】
特许经营者抗拒执法检查,拒绝执法部门的管理和监督,情节严重的,特许人有权视情节给予不低于三个月的延期年审处理并限制过户
A. 对
B. 错
【判断题】
驾车穿插、超越警车及其护卫车队的,处一百元以下罚款或者警告,可以并处吊扣四个月以下驾驶证
A. 对
B. 错
【判断题】
机动车会车,在没有划中心线的道路和窄路、窄桥,须减速靠右通过,并注意非机动车和行人的安全。会车有困难时,有让路条件的一方让对方先行
A. 对
B. 错
【判断题】
非法使用卫星地面接收设施,收听、收看、传播境外宗教广播电视节目,不是非法宗教活动
A. 对
B. 错
【判断题】
有权人及其委托的客运管理机构负责加强市场监管,依法行政,维护特许经营者的合法权益,严格监督协议的执行
A. 对
B. 错
【判断题】
违反少数民族民族风俗,强迫或者变相强迫他人做礼拜、封斋、男青年留异常大胡须、妇女蒙面、穿吉里巴甫服等。这不是宗教极端主义思想
A. 对
B. 错
【判断题】
以斋戒为借口干涉群众正常的生产、经营和社会活动。是非法宗教活动
A. 对
B. 错
【判断题】
客运出租汽车从业人员有权对监管人的行政行为进行监督,有权对侵害自身合法利益的行为进行举报和投诉
A. 对
B. 错
【判断题】
不按规定驾驶履带式车辆的,处二十元以下罚款或者警告,可以单处吊扣一个月以下驾驶证
A. 对
B. 错
【判断题】
新疆石油地质陈列馆是石油科技发展的窗口,是西北唯一具有石油特色的科学技术馆
A. 对
B. 错
【判断题】
公民在行使集会、游行、示威的权利的时候,必须遵守宪法和法律,不得损害国家的、社会的、集体的利益和其他公民的合法的自由和权利
A. 对
B. 错
【判断题】
出租汽车必须按照规定期限或者里程进行车辆二级维护,保障车辆技术性能完好
A. 对
B. 错
【判断题】
机动车会车,在狭窄的坡路,下坡车让上坡车先行;但下坡车已行至中途而上坡车未上坡时,让下坡车先行
A. 对
B. 错
【判断题】
少量饮酒后可以驾驶车辆
A. 对
B. 错
【判断题】
新疆石油工业的发源地是独山子
A. 对
B. 错
【判断题】
出租汽车从业人员应当根据租车人的要求使用车内空调和音响设施
A. 对
B. 错
【判断题】
境外组织和个人以经商、旅游、讲学、留学、文化交流以及给受灾地区捐款、捐资助学、扶贫帮困、防病治病等为名,进行宗教传教活动。不是非法宗教活动
A. 对
B. 错
【单选题】
特许经营者抗拒执法检查,拒绝执法部门的管理和监督,情节严重的,特许人有权视情节给予不低于___个月的延期年审处理并限制过户。
A. 三
B. 一
C. 六
D. 五
【单选题】
3每辆出租汽车外聘的驾驶员不得超过___。
A. 五人
B. 三人
C. 限制
D. 一人
【单选题】
驾驶员在回答乘客问题时的语调要尽量做到___。
A. 高亢。
B. 缓慢。
C. 柔和。
D. 随意。
【单选题】
特许经营者抗拒执法检查,拒绝执法部门的管理和监督,情节严重的,特许人有权视情节给予不低于___个月的延期年审处理并限制过户。
A. 三    
B. 一   
C. 六    
D. 五
【单选题】
3每辆出租汽车外聘的驾驶员不得超过___。
A. 五人   
B. 三人  
C. 限制  
D. 一人
【单选题】
驾驶员在回答乘客问题时的语调要尽量做到___。
A. 高亢。    
B. 缓慢。  
C. 柔和。  
D. 随意。
【单选题】
特许经营者需要延续特许经营期限的,应当在特许经营期限届满___前向特许人提出延续的书面申请。
A. 六十天。   
B. 九十天。 
C. 三十日。
【单选题】
特许经营者组织、煽动或者策划违法违规的群体性事件,或者暴力抗法、妨碍执法的,特许人有权视情节给予不低于___个月的延期年审处理并限制过户。
A. 一。  
B. 三。  
C. 六。  
D. 五。
【单选题】
市区发往九龙潭景区的公交线路是___路。
A. 103。  
B. 105。  
C. 3。  
D. 6。
【单选题】
出租汽车营运收费按车载收费计价器显示金额收取。车载收费计价器应当按___的规定进行检验。
A. 需检验   
B. 技术监督部门  
C. 车主  
D. 交通部门
【单选题】
克拉玛依市西郊水库的准确地名是___。
A. 西月潭。  
B. 金龙湖。 
C. 阿依库勒。 
D. 白杨河。
【单选题】
出租汽车驾驶员按规定着装、佩戴胸卡或服务标志,衣着整洁、服饰大方,发式整齐、面目洁净,是驾驶员___的要求。
A. 形象文明。 
B. 安全行车。 
C. 言行文明 。
D. 个性修饰。
【单选题】
出租汽车运价标准是由___确定。
A. 出租汽车经营者。 
B. 政府。 
C. 驾驶员。
D. 消费者协会。
【单选题】
世界魔鬼城是世界典型的雅丹地貌景区,距离克拉玛依市区___公里,与喀纳斯湖、天山天池相互映衬,共同构成了新疆北线黄金旅游线路。
A. 120。 
B. 115。 
C. 106。 
D. 100。
【单选题】
随车监控设施和服务设施法正常使用时,应当___运营服务。
A. 可以。 
B. 继续。 
C. 暂停。
【单选题】
交通指挥棒信号___:停止信号:右手持棒曲臂向上直伸,不准车辆通行,但已越过停止线的,可以继续通行。
A. 直行信号。 
B. 左转弯信号。 
C. 停止信号。 
D. 转弯信号。
【单选题】
世界魔鬼城是世界典型的雅丹地貌景区,距离克拉玛依市区___公里,与喀纳斯湖、天山天池相互映衬,共同构成了新疆北线黄金旅游线路。
A. 106。 
B. 120。 
C. 115。 
D. 100。
【单选题】
出租汽车单程运距超过___千米的长途出租业务,允许承租双方议价租乘。
A. 50。 
B. 40。 
C. 20。 
D. 30。
【单选题】
特许经营者或其聘用驾驶员应当根据乘客的要求使用车内空调和音响设施;营运期间,应当按规范使用空车待租标志 ,夜间运营必须___;必须按规定喷涂标识色,在车身明显部位标识服务单位全称,车体(车辆后窗处经批准除外)禁止喷贴广告或加装(贴)外装饰物。
A. 开启指示灯。 
B. 开启出租标志顶灯。 
C. 开启标志灯。
【单选题】
出租汽车必须按照规定期限或者里程进行车辆二级维护,保障车辆技术性能完好___。
A. 是     
B. 否
推荐试题
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto