【判断题】
伤人事故可以由当事人自行协商处理,但法律法规及本规定另有规定的除外。( )
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
处理伤人事故,应当由具有道路交通事故处理中级以上资格的交通警察主办。( )
A. 对
B. 错
【判断题】
处理道路交通事故,可以按照规定使用执法记录设备。( )
A. 对
B. 错
【判断题】
道路交通事故发生在两个以上管辖区域的,由共同的上一级公安机关交通管理部门指定管辖。( )
A. 对
B. 错
【判断题】
案件管辖发生转移的,处理时限从移送案件之日起计算。( )
A. 对
B. 错
【判断题】
适用简易程序的交通事故,可以由一名交通警察处理。( )
A. 对
B. 错
【判断题】
对交通肇事嫌疑人可以依法传唤。( )
A. 对
B. 错
【判断题】
对肇事嫌疑人照片进行辨认的,不得少于五人的照片。辨认嫌疑车辆时,同类车辆不得少于十辆。( )
A. 对
B. 错
【判断题】
车辆驾驶人员当场死亡的,应当及时抽血检验。不具备抽血条件的,应当由医疗机构或者鉴定机构出具证明。( )
A. 对
B. 错
【判断题】
报警人不报姓名的,应当记录在案。报警人不愿意公开姓名的,应当为其保密。( )
A. 对
B. 错
【判断题】
车辆在道路以外通行时发生的事故,公安机关交通管理部门接到报案的,不予受理。( )
A. 对
B. 错
【判断题】
投保机动车第三者责任强制保险的机动车发生交通事故,因抢救受伤人员需要保险公司支付抢救费用的,由驾驶人负责通知保险公司。( )
A. 对
B. 错
【判断题】
适用简易程序处理的交通事故,公安机关交通管理部门不得以检验、鉴定为由扣留肇事车辆。( )
A. 对
B. 错
【判断题】
无人看护、牵拉、牵引的宠物、牲畜,在道路上被车辆致伤或者致死引起纠纷的,由公安机关治安部门处理。( )
A. 对
B. 错
【判断题】
公安机关交通管理部门及其交通警察接到肇事逃逸协查通报不配合协查并造成严重后果的,追究有关人员和单位主管领导的责任。( )
A. 对
B. 错
【判断题】
全国扫黑除恶专项斗争为期3年( )
A. 对
B. 错
【判断题】
不满十四周岁的人有违法行为的,不予行政处罚,但是应当责令其监护人严加管教,并在不予行政处罚决定书中载明。( )
A. 对
B. 错
【判断题】
机动车在道路上发生故障需要停车排除故障时,驾驶人应当立即开启危险报警闪光灯,将机动车移至不妨碍交通的地方停放,难以移动的,应当持续开启危险报警闪光灯,并在来车方向设置警告标志等措施扩大示警距离,必要时迅速报警。( )
A. 对
B. 错
【判断题】
摩托车后座可以乘坐未满12周岁的未成年人( )
A. 对
B. 错
【判断题】
“E”类驾驶证可以驾驶轻便摩托车、普通二轮摩托车、普通三轮摩托车( )
A. 对
B. 错
【判断题】
“C1”类驾驶证可以驾驶小型汽车的同时还可以驾驶摩托车( )
A. 对
B. 错
【判断题】
快满十八岁就可以报考机动车驾驶证( )
A. 对
B. 错
【判断题】
在不可以停车的路段只要机动车停下来就可以抓拍( )
A. 对
B. 错
【判断题】
机动车在勇罕路违法停车,既可以处罚违法停车也可以处罚违反禁令标志( )
A. 对
B. 错
【判断题】
自行车不准安装机械动力装置,但三轮车可以( )
A. 对
B. 错
【单选题】
《中华人民共和国道路交通安全法》规定,国家实行机动车强制报废制度,根据机动车的___和不同用途,规定不同的报废标准。
A. 尾气排放状况
B. 安全技术状况
C. 车辆类型
D. 车辆使用年限
【单选题】
《中华人民共和国道路交通安全法》规定,达到报废标准的机动车不得上道路行驶。报废的大型客、货车及其他营运车辆应当有___部门的监督下解体。
A. 公安机关交通管理
B. 市场监督管理
C. 道路交通管理
D. 环保执法
【单选题】
《中华人民共和国道路交通安全法》第九十四条规定,机动车安全技术检验机构不按照机动车国家安全技术标准进行检验,出具虚假检验结果的,由公安机关交通管理部门处所收检验费用___罚款,并依法撤销其检验资格;构成犯罪的,依法追究刑事责任。
A. 两倍以上五倍以下
B. 五倍以上十倍以下
C. 五倍以下
D. 十倍以下
【单选题】
《中华人民共和国道路交通安全法》规定,非法安装警报器、标志灯具的,由公安机关交通管理部门强制拆除,予以收缴,并处二百元以上___以下罚款。
A. 五百元
B. 一千元
C. 二千元
D. 五千元
【单选题】
《中华人民共和国道路交通安全法》自2004年___起施行。
A. 1月1日
B. 5月1日
C. 10月1日
D. 12月1日
【单选题】
机动车生产企业经国家机动车产品主管部门许可生产的机动车型,不执行机动车国家安全技术标准或者不严格进行机动车成品质量检验,致使质量不合格的机动车出厂销售的,由质量技术监督部门依照___的有关规定给予处罚。
A. 《中华人民共和国标准化法》
B. 《中华人民共和国计量法》
C. 《中华人民共和国产品质量法》
D. 《中华人民共和国安全生产法》
【单选题】
《中华人民共和国计量法》规定,国际单位制计量单位和国家选定的其他计量单位,为国家法定计量单位。国家法定计量单位的名称、符号由___公布。
A. 市场监管总局
B. 中国计量院
C. 省级质量技术监督部门
D. 国务院
【单选题】
《中华人民共和国计量法》规定,计量检定必须按照国家计量检定系统表进行。国家计量检定系统表由___计量行政部门制定。
A. 国务院
B. 省级
C. 市级
D. 县级
【单选题】
《中华人民共和国计量法》规定,为社会提供公证数据的产品质量检验机构,必须经___以上人民政府计量行政部门对其计量检定、测试的能力和可靠性考核合格。
A. 省级
B. 市级
C. 区县级
D. 乡镇
【单选题】
《中华人民共和国价格法》第四十二条规定,经营者违反明码标价规定的,责令改正,没收违法所得,可以并处___以下的罚款。
A. 一千元
B. 两千元
C. 五千元
D. 一万元
【单选题】
《中华人民共和国价格法》第十七条规定,行业组织应当遵守价格法律、法规,加强价格自律,接受政府价格主管部门的___。
A. 监督管理
B. 工作指导
C. 指定价格
D. 指导价格
【单选题】
《中华人民共和国道路交通安全法实施条例》第八条规定,机动车所有人将机动车作为抵押物抵押的,机动车所有人应当向登记该机动车的公安机关交通管理部门申请___。
A. 注册登记
B. 变更登记
C. 转移登记
D. 抵押登记
【单选题】
《中华人民共和国道路交通安全法实施条例》第十一条规定,机动车登记证书、号牌、行驶证丢失或者损毁,机动车所有人申请补发的,应当向公安机关交通管理部门提交本人身份证明和申请材料。公安机关交通管理部门经与机动车登记档案核实后,在收到申请之日起___内补发。
A. 5 日
B. 10 日
C. 15日
D. 30 日
【单选题】
《中华人民共和国道路交通安全法实施条例》第十三条规定,___、中型载货汽车及其挂车、拖拉机及其挂车的车身或者车厢后部应当喷涂放大的牌号,字样应当端正并保持清晰。
A. 重型
B. 轻型
C. 小型
D. 大型
【单选题】
《中华人民共和国道路交通安全法实施条例》规定,小型、微型非营运载客汽车6年以内每2年检验1次;超过6年的,每年检验1次;超过___年的,每6个月检验1 次。
A. 10
B. 15
C. 20
D. 25
【单选题】
《中华人民共和国道路交通安全法实施条例》第十五条规定,机动车安全技术检验由机动车安全技术检验机构实施。机动车安全技术检验机构应当按照国家机动车安全技术检验标准对机动车进行检验,对检验结果承担___。
A. 刑事责任
B. 法律责任
C. 民事责任
D. 行政责任
推荐试题
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers