【判断题】
滑动门故障修复后,须提前告知行调并利用下一运营列车进行一次相应侧的站台门开关测试 试验
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
TVM/BOM废票指车站TVM/BOM发售不成功的单程票。
A. 对
B. 错
【判断题】
合肥轨道交通专用票卡包括单程票(含普通单程票、预赋值单程票和优惠单程票)、储值票、合肥通、公务票、纪念票、计次票、纸票、测试票,以及后期根据市场及乘客需要,发行的旅游票等预留票种。
A. 对
B. 错
【判断题】
遗失编码单程票按照票卡的成本费3元进行补款或者补还相应数量的票卡。
A. 对
B. 错
【判断题】
遗失未编码单程票按照票卡的成本费3元进行补款。
A. 对
B. 错
【判断题】
单程票、废票不能零散存放,应用票盒存放于规定区域或文件柜中。
A. 对
B. 错
【判断题】
对票卡实施加封时,应双人按本规定加封要求,进行加封(其中一人须为客运值班员及以上)。
A. 对
B. 错
【判断题】
车站票卡盘点于每月25日前完成。
A. 对
B. 错
【判断题】
SC全称为车站计算机系统。
A. 对
B. 错
【判断题】
PCA指便携式验票机。
A. 对
B. 错
【判断题】
本站进出卡适用于需要进出车站的生产厂家驻点人员、委外维保人员及合作单位等。
A. 对
B. 错
【判断题】
普通乘客使用“合肥通”卡乘坐合肥市轨道交通可享受单程票票价9折优惠。
A. 对
B. 错
【判断题】
残疾军人、伤残人民警察、现役军人、军队离休退休人员、残疾人(盲人、二级以上聋哑人、三级以上肢体残疾人、农村五保供养的残疾人及六十周岁以上残疾人)可免费乘车。
A. 对
B. 错
【判断题】
70周岁(含)以上老年人凭有效身份证或《安徽省老年人优待证》--可免费乘车。
A. 对
B. 错
【判断题】
普通单程票和优惠单程票在发售当站、当日运营期间使用有效。
A. 对
B. 错
【判断题】
本站进出闸按相应票种的最低票价收取费用。
A. 对
B. 错
【判断题】
票卡遗失、折损车票的,出站时须按出闸线网最高单程票价补票出站。
A. 对
B. 错
【判断题】
纪念票、储值票、计次票等票卡需在购买(充值)时一次性向乘客提供相应金额的定额发票。
A. 对
B. 错
【判断题】
正常情况下,普通单程票可在TVM上出售,BOM出售优惠单程票和用于乘客事务处理的单程票。
A. 对
B. 错
【判断题】
优惠单程票包括半价优惠单程票和免费优惠单程票。
A. 对
B. 错
【判断题】
纸票发售时须加当日日期章、车站名章。
A. 对
B. 错
【判断题】
乘客乘车即超时又超程时,须按超程处理。
A. 对
B. 错
【判断题】
储值票不记名、不挂失、不可退换。
A. 对
B. 错
【判断题】
乘客在付费区内携带违禁物品未乘车或未赶上末班车,经车站客运值班员批准后给予退票。
A. 对
B. 错
【判断题】
因轨道交通原因无法完成运输服务的,乘客可在5日内(含当日)持有效车票到任意车站办理单程票退票。
A. 对
B. 错
【判断题】
AFC系统设备大面积故障时,以服务优先、快速处理、避免纠纷为原则进行票务处理。
A. 对
B. 错
【判断题】
现金安全区域内严禁存放私人钱财、票卡。
A. 对
B. 错
【判断题】
票务室和客服中心应随时处于锁闭状态。
A. 对
B. 错
【判断题】
运营期间任何非当班人员进入客服中心,需由值班站长陪同。
A. 对
B. 错
【判断题】
当值人员离开车站客服中心或票务室时,其他人员(包含跟岗学习人员)必须随同离开,不得逗留。
A. 对
B. 错
【判断题】
乘客交付的现金均需经过人工及验钞设备的识别,客服中心岗发现非标准币应交还乘客,请乘客另行更换。
A. 对
B. 错
【判断题】
报表必须用黑色或蓝色笔填写,字迹清晰、工整,金额数字的填写精确到角。
A. 对
B. 错
【判断题】
纸质报表填写发生错误时,按“划线更正法”进行更正。
A. 对
B. 错
【判断题】
操作人员使用点钞机、硬币清点机、纸币清分机前后,无须检查是否有遗留现金。
A. 对
B. 错
【判断题】
车站边门设在付费区和非付费区之间,运营时间内应设为常闭状态。
A. 对
B. 错
【判断题】
根据票务违章所导致的直接或间接损失大小,或由此造成对票务收益安全的危害程度,由低至高划分为一级至二级票务违章。
A. 对
B. 错
【判断题】
违反边门管理办法,私自放行人员从边门出入为二级票务违章。
A. 对
B. 错
【判断题】
伪造账目、报表或用其他虚假行为填平账目,被查处有个人或集体违规获利事实的行为为四类票务事故。
A. 对
B. 错
【判断题】
丢失自动售票机维修门钥匙、钱箱钥匙、补币箱钥匙等涉及票务收益安全的钥匙为四类票务事故。
A. 对
B. 错
【判断题】
稽查对象分为内部稽查和外部稽查。
A. 对
B. 错
【判断题】
本站进出卡由行车值班员负责交接、保管及办理借用手续。
A. 对
B. 错
推荐试题
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack