【单选题】
新开通高速应在开通( )前将复合通行卡需用计划报省中心审核后自行采购。___
A. 三个月
B. 四个月
C. 五个月
D. 六个月
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
省中心应根据系统掌握的数据和经营单位上报的库存信息,对通行卡的流动情况进行监测、分析。当全省复合通行卡保有量低于管理基数( )以上或无法满足路网使用需求,应及时联系部联网中心申请调入。___
A. 5万
B. 6万
C. 7万
D. 8万
【单选题】
( )负责坏卡检测、送修、核销、无害化处理___
A. 省中心
B. 省公路管理局
C. 各收费站
D. 省交通运输厅
【单选题】
纸质通行券使用前应经()同意,省中心应同步通过通行介质管理平台向部联网中心报备启用和停用情况,部联网中心告知相关参与方。___
A. 所长
B. 省中心
C. 值班人员
D. 省交通运输厅
【单选题】
ETC 车辆采取“分段计费,通过车载单元(OBU)和后台记账形式自动完成扣费”,非 ETC 车辆采取“分段计费,_________”。___
A. 即时收费
B. 分段收费
C. 入口收费
D. 出口收费
【单选题】
新政策规定货车共分为几类货车?___
A. 4
B. 5
C. 6
D. 7
【单选题】
如发现收费员短卡,应按照( )批准的标准收取复合通行卡工本费。___
A. 省物价局
B. 省交通局
C. 省公路局
D. 交通管理机构
【单选题】
1类客车车辆类型( )?___
A. 微型小型
B. 中型
C. 大型
D. 0
【单选题】
收费公路车辆通行费专项作业车车型分类有几类( )?___
A. 5
B. 6
C. 7
D. 0
【单选题】
静态库存是指每日公办结束时各级卡管理单位的复合通行卡结存数量,统计时间以每天( )结束时间为准___
A. 晚班
B. 中班
C. 早班
D. 0
【单选题】
库存盘点:指各级卡管理单位对()内的复合通行卡进行清点,并与系统数据进行核对,核对不符的应进行盘盈盘亏登记。___
A. 仓库
B. 缴款室
C. 存放点
D. 0
【单选题】
收费站多卡超过()倍的卡必须及时回收,点卡入箱。达到卡箱封存数量时,及时封箱归还收费站库房仓,以方便调拨。卡明细和实物卡必须一一对应,必须通过平台进行调拨,___
A. 1
B. 1.1
C. 1.2
D. 1.3
【单选题】
省中心确认为本省责任的丢卡情况,下发相关高速公路经营管理单位进行核查。在规定期(___个工作日内,遇法定节假日顺延)内及时提交无责证据,逾期未提交或证据不(足,)
A. 1
B. 2
C. 3
D. 4
【单选题】
超过六轴的货车,根据()按照超限运输车辆执行___
A. 车货总质量
B. 车辆总轴数
C. 超限部分
D. 合法装载部分
【单选题】
通行卡票管理实行部级、省级、区域中心、高速公路经营管理单位和收费站()级管理模式。___
A. 三
B. 四
C. 五
D. 六
【单选题】
各级卡管理机构应以卡箱为单位进行复合通行卡管理(车道应用除外),每个卡箱容量不宜超过()张且为整百数。___
A. 100
B. 300
C. 500
D. 700
【单选题】
静态库存是指每日公办结束时各级卡管理单位的复合通行卡结存数量,统计时间以()结束时间为准。___
A. 每天晚班
B. 每天中班
C. 每天早班
D. 当班
【单选题】
新开通高速应在开通()个月前将复合通行卡需用计划报省中心审核后自行采购___
A. 一
B. 三
C. 六
D. 十二
【单选题】
新开通高速公路(路段)采购数量按()确定。___
A. 单公里配卡数
B. 当日出入出总车辆数
C. 当日入口非ETC车辆总数
D. 入口车道数
【单选题】
复合通行卡调配时以配备基数为依据,同时综合考虑调拨距离、数量、时间等因素,按照()原则开展。___
A. 高效省耗
B. 高效低耗
C. 就近调拨
D. 本省优先
【单选题】
各级管理单位应在日常做好清点装箱工作,在调出时按箱调出,调拨应以( )张/箱为单位开展。___
A. 100
B. 300
C. 500
D. 700
【单选题】
跨省调拨接收方应及时到达调出方省际库房,进行现场实物卡交接,指令发布后()小时内完成出库交接。___
A. 12
B. 24
C. 36
D. 48
【单选题】
省内调拨时,调入方应及时到达调出方指定的调出地点,进行现场实物卡交接,指令发布后()小时内完成出库交接。___
A. 12
B. 24
C. 36
D. 48
【单选题】
高速公路经营单位的配备基数,原则上按照各单位管辖的收费站入口车道复合通行卡发卡量的()倍配备。___
A. 1.0-1.1
B. 1.0-1.2
C. 1.1-1.2
D. 1.0-1.5
【单选题】
在库房存放的复合通行卡应定期流通,存放时间不得超过()个月。___
A. 1
B. 2
C. 3
D. 6
【单选题】
静态库存:指每日办公结束时各级卡管理单位的复合通行卡结存数量,统计时间以( )结束时间为准。___
A. 每天早班
B. 每天中班
C. 每天晚班
D. 0
【单选题】
跨省调拨指令发出后( )小时内,双方完成联系沟通,落实调拨工作事宜。___
A. 2
B. 4
C. 6
D. 8
【单选题】
下列哪些属于大型客车___
A. 大于20座,且车长大于6米
B. 39座以下且车长大于6米
C. 40座以上且车长大于6米
D. 19座以上
【单选题】
动态库存是指当前时间各级卡管理机构的复合通行卡数量。是以()静态库存为基数,根据发放、回收和调拨数据进行增减。___
A. 当天
B. 前一日
C. 前二日
D. 后一日
【单选题】
如发现收费员短卡,应按照()批准的标准收取复合通行卡工本费___
A. 省公路管理局
B. 省物价局
C. 省交通运输厅
D. 省中心
【单选题】
一类二类货车如何区分___
A. 车长小于六米且允许总质量小于4500kg为一类。车长大于六米或允许总质量不小于4500kg为二类
B. 蓝牌一类黄牌二类
C. 车长小于六米且允许总质量小于5000kg为一类。车长大于六米或允许总质量不小于5000kg为二类
D. 总质量小于4500kg为一类。总质量不小于4500kg为二类
【单选题】
收费站多卡超过()的卡必须及时回收,点卡入箱。___
A. 1.5倍
B. 1.2倍
C. 1.3倍
D. 1.1倍
【单选题】
收费站每日在()在平台上完成前一日复合通行卡的日盘点,形成前一日库存数据___
A. 8点前
B. 9点前
C. 10点前
D. 12点前
【单选题】
最大允许总质量12500kg的114轴货车属于几类车___
A. 1
B. 2
C. 3
D. 4
【单选题】
8座小型客车属于几类车___
A. 一类
B. 二类
C. 三类
【单选题】
ETC车辆采取“分段计费,通过车载OBU和后台记账形式自动完成扣分”,非ETC撤了采取“___”?___
A. 现金缴费和支付宝
B. 分段计费,出口收费
C. 混合车道缴费
D. 0
【单选题】
摩托车通行收费公路,按()分类___
A. 一类客车
B. 二类客车
C. 三类客车
D. 四类客车
【单选题】
客车包括载客汽车和()___
A. 乘用车列车
B. 小型客车
C. 中型客车
D. 大型客车
【单选题】
投诉处理及时率应达到()___
A. 0.9
B. 0.95
C. 0.99
D. 0
【单选题】
专项作业车分类依据总轴数以及车长和( )___
A. 最大允许总质量
B. 核载质量
C. 核载人数
D. 货物重量
【单选题】
货车包括载货汽车、货车列车和()___
A. 半挂货车列车
B. 黄牌货车
C. 蓝牌货车
D. 集装箱半挂车
推荐试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management