【判断题】
食品生产企业内设的卫生间,不得与食品生产区域直接连通,但可与包装、仓库等储存区域直接连通
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
消毒餐(饮)具洗消剂残留量的评价指标,游离性余氯和阴离子合成洗涤剂(以十二烷基苯磺酸钠计)的计算单位为mg/100c㎡
A. 对
B. 错
【判断题】
大肠菌群发酵法和纸片法的限量值为不得检出
A. 对
B. 错
【判断题】
对于餐(饮)具的大肠菌群检验,采用发酵法和纸片法均可。以纸片法为仲裁方法
A. 对
B. 错
【判断题】
熟肉制品中大肠埃希氏菌O157·H7的检出限量为100MPN/g—1000MPN/g
A. 对
B. 错
【判断题】
即食生制水产品中金黄色葡萄球菌的检出限量为100MPN/g—1000MPN/g
A. 对
B. 错
【判断题】
即食果蔬制品中沙门氏菌的检出限量为100MPN/g—1000MPN/g
A. 对
B. 错
【判断题】
食品安全国家标准中污染物是指食品在生产(包括农作物种植、动物饲养和兽医用药)、加工、包装、贮存、运输、销售、直至食用等等过程中产生的,非有意加入的化学性危害物质,环境污染因素除外
A. 对
B. 错
【判断题】
未开展量化分级管理的食品生产经营单位监督频次每3个月不少于1次
A. 对
B. 错
【判断题】
《国境口岸食品卫生监督管理规定》适用于对在国境口岸从事食品生产经营单位以及为出入境交通工具提供食品、饮用水服务的口岸食品生产经营单位的卫生监督管理
A. 对
B. 错
【判断题】
从业人员每年必须进行健康检查,取得健康证明。临时参加工作的从业人员可暂不进行健康检查
A. 对
B. 错
【判断题】
取得《卫生许可证》的食品生产经营单位在向异地食品生产经营单位提供食品及食品用产品时,可到该地的海关备案
A. 对
B. 错
【判断题】
食品生产经营单位在停业时,应当到作出卫生许可决定的海关办理注销手续,缴销《卫生许可证》
A. 对
B. 错
【判断题】
采集餐饮食品时,对于散装液体(如饮料等)样品应先充分混合后,再取中间部位的样品,采样时可使用玻璃吸管或倾倒方式
A. 对
B. 错
【判断题】
航空食品分为航空配餐和外购即食食品两类
A. 对
B. 错
【判断题】
潜在风险食品是指蛋白质或碳水化合物含量较高,通常pH大于4.6且水分活度(Aw)大于0.85,易于微生物生长或产生毒素,需时间-温度控制方可安全食用的食品
A. 对
B. 错
【判断题】
航空配餐第一质量控制期是指航空配餐从加工到航班飞机实际起飞时间的时间限制
A. 对
B. 错
【判断题】
航空配餐的食品生产区应设置专用的初加工、冷加工、热加工、封装、装配、储存及餐饮用具清洗消毒场所
A. 对
B. 错
【判断题】
航空配餐的冷食加工及分装、热食加工及分装应分别设置相应专间
A. 对
B. 错
【判断题】
航空配餐加工场所工作面的照度不得低于110 lx
A. 对
B. 错
【判断题】
航空配餐生产企业和航空运输承运人应建立有效的管理机制,根据采购产品的安全风险程度及供应量,对供应商进行准入管理和持续管理
A. 对
B. 错
【判断题】
航空配餐采购环节,对潜在风险食品应进行温度查验,冷藏食品的合格标准为食品表面温度≤10℃
A. 对
B. 错
【判断题】
航空配餐中用于制作冷食食品的生食果蔬,可以在一般初加工间进行清洗消毒,洗净后可以于室温环境下临时摆放
A. 对
B. 错
【判断题】
航空配餐冷链食品热加工后,应进行速冷处理,经速冷处理的食品应立即进行冷藏或冷冻,并做好防护,防止交叉污染
A. 对
B. 错
【判断题】
航空配餐冷链食品分装、装配时,如果操作间环境温度处于5℃-15℃(含)的,食品出冷藏库到操作完毕入冷藏库的时间不作限制
A. 对
B. 错
【判断题】
航空配餐属于非预包装食品,航空配餐生产企业应在每套航空配餐的外包装上标识仅供本次航班食用或采用其他方式告知旅客该批餐食仅限本次航班食用
A. 对
B. 错
【判断题】
航空食品装机交接时,客舱乘务员应查验食品安全信息,验收合格后方可装机
A. 对
B. 错
【判断题】
受航班延误影响,已装机的冷链食品表面温度高于或等于15℃,且航班延误时间超4h的,应撤回该航空配餐
A. 对
B. 错
【判断题】
食品安全风险评估结果是制定、修订食品安全标准和实施食品安全监督管理的科学依据
A. 对
B. 错
【判断题】
食品安全标准包括强制性执行标准和推荐性执行标准
A. 对
B. 错
【判断题】
食品生产企业进货查验记录和凭证保存期限不得少于产品保质期满后六个月;没有明确保质期的,保存期限不得少于二年
A. 对
B. 错
【判断题】
食品经营者销售散装食品,在散装食品的容器、外包装上标明食品的名称、生产日期或者生产批号、保质期即可
A. 对
B. 错
【判断题】
进出境交通工具上的货舱、行李舱、货车车厢在装货前或者卸货后应当进行彻底清扫,有毒物品和食品不得混装,防止污染
A. 对
B. 错
【判断题】
每个具有独立固定经营场所的国境口岸食品生产、食品销售、餐饮服务经营单位应当作为一个卫生许可证发证单元,单独申请卫生许可
A. 对
B. 错
【判断题】
国境口岸食品生产、食品流通、餐饮服务经营者提供虚假材料或者隐瞒真实情况的,海关不予受理或者不予许可,并给予警告,申请人在半年内不得再次申请卫生许可
A. 对
B. 错
【判断题】
海关对B级食品生产经营单位监督频次每3个月不少于1次
A. 对
B. 错
【判断题】
在对入境船舶开展病媒生物监测时,一般在生活区内重点监测蚊类和蝇类,在生活区外重点监测鼠类和蜚蠊类
A. 对
B. 错
【判断题】
在入境船舶上使用吸蚊器法开展蚊类监测时,应先开启吸蚊器,再打开前盖;捕获蚊类后,应先关闭吸蚊器电源开关,再盖上前盖
A. 对
B. 错
【判断题】
在入境船舶上开展成蚊监测,可用电动吸蚊器采集并计数,每次15min,计算成蚊密度
A. 对
B. 错
【判断题】
入境列车输入性病媒生物现场监测程序:监测人员登车后,关闭车门,按照不同监测方法的要求从每节车厢的一端查至另一端
A. 对
B. 错
【判断题】
输入性病媒生物监测蜚蠊阳性指征:蜚蠊成虫、若虫及卵鞘和空卵鞘、蟑尸、残肢、蜕皮、粪便等
A. 对
B. 错
推荐试题
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS