【单选题】
成年育龄妇女流动到外地务工,应当自到达现居住地之日起____日内提交婚育证明。___
A. 5
B. 10
C. 20
D. 30
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
D
解析
暂无解析
相关试题
【单选题】
关于主动公开的政府信息,行政机关的下列做法符合《政府信息公开条例》的规定的是____。___
A. 甲县规定,乡、镇政府制作的政府信息,统一由县政府负责公开
B. 乙市一项行政事业性收费的标准发生变动,在标准变动以后第30日予以公开
C. 丙区规定,行政机关应当编制、公布政府信息公开指南或政府信息公开目录,并及时更新
D. 丁市政府在市图书馆设置政府信息查阅场所,并配备相应的设备,为公民、法人或者其他组织获取政府信息提供便利
【单选题】
关于核医学诊疗产生的放射性固体废物、废液及患者的放射性排出物,下列说法正确的是____。___
A. 应当单独收集,与其他废物、废液分开存放
B. 应当单独收集,与医疗废弃物一同处理
C. 应当单独收集,定期深埋处理
D. 应当单独收集,待自然降解后作为生活垃圾处理
【单选题】
人民法院应当在立案之日起____内,将起诉状副本发送被告。被告应当在收到起诉状副本之日起____内向人民法院提交作出行政行为的证据和所依据的规范性文件,并提出答辩状。___
A. 5日,15日
B. 5日,10日
C. 10日,15日
D. 10日,20日
【单选题】
以下表述不正确的是____。___
A. 省级人民政府卫生行政部门负责划定血站采供血服务区域
B. 采供血服务区域受行政区域的限制
C. 同一行政区域内不得重复设置血液中心、中心血站
D. 血站与单采血浆站不得在同一县级行政区域内设置
【单选题】
公民、法人和其他组织认为行政执法机关及其工作人员的行政执法行为违法或者不当的,可以依法向____以上人民政府和有关部门投诉、举报。___
A. 市级
B. 县级
C. 乡级
D. 省级
【单选题】
行使国家立法权的机关是____。___
A. 全国人民代表大会
B. 全国人民代表大会常务委员会
C. 全国人民代表大会和全国人民代表大会常务委员会
D. 全国人民代表大会、全国人民代表大会常务委员会和国务院
【单选题】
卫生局根据王某的申请依法举行了听证会,并制作了听证笔录。关于听证笔录的约束力,下列说法正确的是____。___
A. 卫生局既可以根据听证笔录,也可以不根据听证笔录作出行政许可决定
B. 听证笔录可以作为卫生局作出行政许可决定的参考
C. 卫生局可以根据听证笔录以外的事实为依据作出行政许可决定
D. 卫生局应当根据听证笔录作出行政许可决定
【单选题】
日供水在____立方米以上(或供水人口在____万人以上)的农村集中式供水,供水单位应当设立水质检验室,并配备专业检验人员和仪器设备,负责供水水质的日常检验工作。___
A. 1000,2
B. 5000,51
C. 1000,1
D. 500,1
【单选题】
《行政强制法》规定,查封、扣押的期限不得超过____日,情况复杂的,经行政机关负责人批准,可以延长,但是延长期限不得超过____日。___
A. 30日,30日
B. 30日,40日
C. 20日,20日
D. 20日,30日
【单选题】
行政复议期间,下列哪种情形不属于行政行为可以停止执行的。___
A. 被申请人认为需要停止执行的
B. 行政复议机关认为需要停止执行的
C. 申请人申请停止执行,行政复议机关认为其要求合理,决定停止执行的
D. 其他相关人员认为需要停止执行的
【单选题】
国家对放射源和射线装置实行分类管理。根据放射源、射线装置对人体健康和环境的潜在危害程度,从高到低将放射源分为____。___
A. Ⅰ类、Ⅱ类、Ⅲ类、Ⅳ类、Ⅴ类
B. Ⅰ类、Ⅱ类、Ⅲ类、Ⅳ类
C. Ⅰ类、Ⅱ类、Ⅲ类
D. Ⅰ类、Ⅱ类
【单选题】
某市卫生监督人员在对一家正在菅业的医院进行监督检查时发现,该医院《医疗机构执业许可证》未按期校验,卫生行政部门应____ 。___
A. 责令其限期补办校验手续
B. 予以3000元以下罚款
C. 警告
D. 吊销其《医疗机构执业许可证》
【单选题】
供水单位的供水范围超出其所在省、自治区、直辖市的,由该供水单位所在____卫生行政部门负责其饮用水卫生监督监测工作。___
A. 省、自治区、直辖市人民政府
B. 设区的市级人民政府
C. 县级人民政府
D. 设区的市、县两级人民政府
【单选题】
医师变更执业地点、执业类别、执业范围等注册事项的,应当到什么部门办理变更注册手续。___
A. 本单位人事部门
B. 县级以上卫生行政部门
C. 省级以上卫生行政部门
D. 准予注册的卫生行政部门
【单选题】
刘某因不服甲县卫生局的行政处罚决定向乙市卫生计生委申请行政复议,复议期间刘某因病去世,若其子刘三自刘某去世满____日仍未决定是否参加行政复议,乙市卫生计生委可以终止本案审理。___
A. 15
B. 30
C. 60
D. 90
【单选题】
艾滋病病毒感染者是指____。___
A. 感染了艾滋病病毒而且已经出现临床症状和体征的人
B. 接触过艾滋病病人的人
C. 接触过艾滋病病毒的人
D. 感染了艾滋病病毒但还没出现临床症状和体征的人
【单选题】
医疗卫生机构违反《医疗废物管理条例》规定,将未达到国家规定标准的污水、传染病病人或者疑似传染病病人的排泄物排入城市排水管网的,有权对其实施处罚的部门是____。___
A. 县级以上地方人民政府城市供水行政主管部门
B. 县级以上地方人民政府卫生行政主管部门
C. 县级以上地方人民政府环境保护行政主管部门
D. 县级以上地方人民政府建设行政主管部门
【单选题】
依据母婴保健法及其实施办法规定,从事____母婴保健技术服务的人员,须经设区的市人民政府卫生行政部门许可。___
A. 婚前医学检查
B. 遗传病诊断
C. 助产技术服务
D. 产前诊断
【多选题】
医疗机构应当按照《国家突发公共卫生事件相关信息报告管理工作规范(试行)》的要求进行报告的情形是____。___
A. 10例以上的医院感染暴发事件
B. 发生特殊病原体或者新发病原体的医院感染
C. 可能造成重大公共影响或者严重后果的医院感染
D. 30例以上的医院感染暴发事件
【多选题】
在以下哪些情形下,行政机关应当依法对公民的人身自由实施暂时性限制,或者对公民、法人或者其他组织的财物实施暂时性控制的行为。___
A. 制止违法行为
B. 防止证据损毁
C. 避免危害发生
D. 控制危险扩大
【多选题】
2010年5月7日,山东省政府第72次常务会议通过《山东省政府信息公开办法》,公民、法人或者其他组织可以根据自身生产、生活、科研等特殊需要,向行政机关申请获取相关政府信息。该办法的公布____。___
A. 增强了国家机关办事的透明度
B. 保证了人民群众的知情权.参与权和监督权
C. 体现了社会主义民主的真实性
D. 扩大了公民的政治权利
【多选题】
按照《消毒管理办法》,医疗机构应当严格执行医疗器械、器具的消毒工作技术规范,并达到以下哪些要求?___
A. 进入人体组织、无菌器官的医疗器械、器具和物品必须达到灭菌水平
B. 接触皮肤、粘膜的医疗器械、器具和物品必须达到消毒水平
C. 各种用于注射、穿刺、采血等有创操作的医疗器具必须一用一灭菌
D. 医疗机构使用的消毒药械、一次性医疗器械和器具应当符合国家有关规定。一次性使用的医疗器械、器具不得重复使用
推荐试题
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.