【单选题】
大型集装箱检查设备操作人员应持《__________》上岗。___
A. 操作人员上岗证
B. 放射人员工作证
C. 特种作业操作证
D. 辐射安全许可证
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
大型集装箱检查设备工作人员应当佩戴个人辐射剂量计,实时监测工作环境的辐射剂量情况,每()送专业部门检测辐射剂量。___
A. 1个月
B. 3个月
C. 6个月
D. 12个月
【单选题】
下列关于总署相关部门在联网集中图像改革中职责分工的表述,错误的是:___
A. 监管司负责指导全国海关开展联网集中审像工作
B. 督审司负责全国海关开展联网集中审像的运行监控和绩效评估
C. 关务保障司负责联网集中审像系统相关的政府采购、设备配发等工作
D. 科技司负责指导、组织全国海关开展联网集中审像网络建设、系统开发工作
【单选题】
H986设备跨隶属海关集中模式中,须建立()层面的联网集中审像专业人员队伍和机构,来开展联网集中审像工作。___
A. 海关总署
B. 直属海关
C. 隶属海关
D. 机检科室
【单选题】
抽查分为()三种类型,分别适用于不同的选箱、掏箱、核对货物比例或数量等查验作业要求。___
A. 简易抽查、常规抽查、重点抽查
B. 彻底抽查、常规抽查、重点抽查
C. 简易抽查、彻底抽查、重点抽查
D. 简易抽查、常规抽查、彻底抽查
【单选题】
大型集装箱检查设备联网集中审图像的任务管理岗位,可根据()情况对任务分派进行人工干预,对已派发的任务进行调整回收和重新分派。___
A. 机检单量
B. 经营单位
C. 人员上岗
D. 货物属性
【单选题】
下列工具箱中,()适用于检查是否存在夹藏。___
A. D1工具箱(射线计量仪、探针组合、卡尺等)
B. D2工具箱(汽车底盘检查仪)
C. D3工具箱(γ射线探测仪)
D. D4工具箱(内窥镜)
【单选题】
()适用于判断货物有无放射性。___
A. D1工具箱(射线计量仪、探针组合、卡尺等)
B. D2工具箱(汽车底盘检查仪)
C. D3工具箱(γ射线探测仪)
D. D4工具箱(内窥镜)
【单选题】
下列工具箱中,适用于对隐蔽部位实施检查的查验工具箱是:___
A. D1工具箱(射线计量仪、探针组合、卡尺等)
B. D2工具箱(汽车底盘检查仪)
C. D3工具箱(γ射线探测仪)
D. D4工具箱(内窥镜)
【单选题】
录证设备采集的图像及影音资料,未经()批准,不得向海关以外单位提供。___
A. 直属海关关领导或经授权的处级领导
B. 直属海关监管部门处级领导
C. 现场海关分管处级领导
D. 现场海关处级领导或经授权的科级领导
【单选题】
进出口货物收发货人或其代理人拒不签名的,查验人员应当在《海关货物查验记录单》中注明情况,并由()签名证明。___
A. 进出口货物收发货人或其代理人
B. 货物所在监管场所的经营人
C. 海关查验人员
D. 带班科长
【多选题】
对于危险品或者鲜活、()等不宜长期保存的货物,以及因其他特殊情况需要紧急验放的货物,经进出口货物收发货人或者其代理人申请,海关可以优先安排查验。___
A. 易腐
B. 易烂
C. 易失效
D. 易变质
【多选题】
适宜外形查验的货物包括:()___
A. 危险品
B. 真空包装、防尘包装、易腐烂的货物
C. 采用槽罐类运输工具或管道等方式运输的液态、气态化工品
D. 矿石、煤炭、粮食、木材等散装、裸装货物及大型机械设备
【多选题】
查验人员根据待查货物及盛装货物的集装箱等容器或承载货物的运输工具、查验场地等基本情况,使用的防护装备包括()。___
A. 防护服
B. 防毒面具
C. 辐射报警仪
D. 有害气体检测报警仪
【多选题】
实施查验人员根据不同货物及盛装货物的集装箱等容器或承载货物的运输工具查验的具体需要使用不同的设备,这些设备包括:___
A. 毒品检测仪
B. 爆炸物检测仪
C. 小型查验工具
D. 监管物项识别仪
【多选题】
对无相应报关单的()等实施查验时,现场海关应当使用选择查验系统非报关单查验功能进行自动派单查验,并录入查验结果。___
A. 转运货物
B. 过境货物
C. 转关运输货物
D. 径行查验货物
【多选题】
查验人员完成查验后,带班科长对《海关货物查验记录单》提出审批意见并签名确认时,应核对的内容有()。___
A. 《海关货物查验记录单》填写是否完整、清晰
B. 查验过程描写是否清楚准确
C. 查验程序和内容是否符合查验指令要求
D. 查验处理意见是否恰当
【多选题】
实施人工查验前,查验人员应当做好的准备工作包括()。___
A. 核实陪同查验的收发货人或其代理人的货主身份或代理身份
B. 通过审核报关单及随附单证、询问进出口货物收发货人,全面了解所查验货物的基本情况,初步确定现场查验应当采取的方法和步骤
C. 货物的自然属性对查验有特殊要求,可能导致查验时造成损坏的,收发货人或其代理人事先应向海关提供书面声明,由科长核定查验方式
D. 备齐查验所需的相关单证、查验工具、取样容器、海关封志、个人安全防护用品等
推荐试题
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT