【单选题】
根据《进出口商品检验法实施条例》的规定,海关商品检验的范围包括:___
A. 锅炉压力容器的安全监督检验
B. 进出口药品的质量检验
C. 出口危险货物包装容器的性能鉴定
D. 计量器具的量值检定
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
除紧急情况外,必须实施检验的进出口商品目录应当至少在实施之日______前公布。___
A. 5日
B. 10日
C. 15日
D. 30日
【单选题】
除紧急情况外,进出口商品检验依照或者参照的技术规范、标准以及检验方法的技术规范和标准,应当至少在实施之日______前公布。___
A. 1个月
B. 3个月
C. 6个月
D. 12个月
【单选题】
根据《进出口商品检验法实施条例》的规定,对海关作出的检验结果有异议的,可以自收到检验结果之日起______内提出申请复验。___
A. 5日
B. 10日
C. 15日
D. 30日
【单选题】
根据《进出口商品检验法实施条例》的规定,对海关作出的检验结果有异议的,可以依法申请复验,受理海关自收到复验申请之日起最多可以在______内作出复验结论。___
A. 15日
B. 30日
C. 60日
D. 90日
【单选题】
根据《进出口商品检验法实施条例》的规定,擅自调换海关抽取的样品或者海关检验合格的进出口商品的,责令改正,给予警告;情节严重的,并处______10%以上50%以下罚款。___
A. 违法所得
B. 货值金额
C. 样品金额
D. 拍卖金额
【单选题】
______主管全国进出口商品检验工作。___
A. 商务部
B. 国家市场监管总局
C. 国家发改委
D. 海关总署
【单选题】
法定检验的进出口商品符合国家规定的免予检验条件的,经______对申请进行审查批准后免予检验。___
A. 海关总署
B. 商务部
C. 国家市场监管总局
D. 国家发改委
【单选题】
进口可用作原料的固体废物的国外供货商、国内收货人在______,应当取得注册登记。___
A. 签订对外贸易合同前
B. 签订对外贸易合同后
C. 报关前
D. 报关后
【单选题】
法定检验以外的进口商品,经抽查检验不合格的,《进出口商品检验法实施条例》规定的处理措施不包括:___
A. 销毁
B. 没收
C. 技术处理
D. 退运
【单选题】
_____________不需要实施动植物检疫。___
A. 来自动植物疫区的运输工具
B. 外交官携带的自用动植物产品
C. 出口玻璃制品
D. 进出境援助动植物产品
【单选题】
办理进境检疫审批手续后,_____________,货主、物主或者其代理人无须重新申请办理检疫审批手续。___
A. 变更进境物的品种或者数量的
B. 变更输出国家或者地区的
C. 变更包装的
D. 超过检疫审批有效期的
【单选题】
国家对向中国输出动植物产品的国外生产、加工、存放单位,实行_______制度。___
A. 注册登记
B. 认可
C. 备案
D. 现场检疫
【单选题】
输入的动植物、动植物产品和其他检疫物运达口岸时,检疫人员可以到运输工具上和货场实施_______,核对货、证是否相符,并可以按照规定_______。___
A. 现场检疫;采取样品
B. 检疫监督;消毒
C. 除害处理;封存
D. 现场检疫;销毁
【单选题】
装载动物的运输工具抵达口岸时,上下运输工具或者接近动物的人员,应当接受口岸动植物检疫机关实施的_______,并执行其采取的其他现场预防措施。___
A. 除害处理
B. 隔离
C. 留验
D. 防疫消毒
【单选题】
输入种用大中家畜的,应当在动植物检疫机关设立的动物隔离检疫场所隔离检疫____;输入其他动物的,应当在口岸动植物检疫机关指定的动物隔离检疫场所隔离检疫____。___
A. 30日;45日
B. 45日;30日
C. 15日;30日
D. 30日;15日
【单选题】
根据《进出境动植物检疫法》及其实施条例的规定,进境的同一批动植物产品分港卸货时,口岸动植物检疫机关_______。___
A. 对船上全部货物进行检疫
B. 对本港卸下的货物进行检疫
C. 对未卸货物进行检疫
D. 可不进行检疫
【单选题】
_______不属于对输入的动植物、动植物产品和其他检疫物实施检疫的依据。___
A. 我国国家标准
B. 我国行业标准
C. 海关总署有关动植物检疫规定
D. 贸易合同订明的检疫要求
【单选题】
根据检疫需要,并商输出动植物、动植物产品国家或者地区政府有关机关同意,海关总署可以派检疫人员赴外进行的工作不包括_____。___
A. 预检
B. 监装
C. 产地疫情调查
D. 除害
【单选题】
经启运地口岸动植物检疫机关检疫合格的动植物、动植物产品和其他检疫物,运达出境口岸时,植物、动植物产品和其他检疫物从启运地随原运输工具出境的,由出境口岸动植物检疫机关_______。___
A. 备案放行
B. 验证放行
C. 直接放行
D. 检验放行
【单选题】
来自动植物疫区的船舶、飞机、火车,经检疫发现有禁止进境的动植物、动植物产品和其他检疫物的,口岸动植物检疫机关必须进行_______。___
A. 退回
B. 熏蒸、消毒
C. 封存或销毁
D. 补办检疫审批手续
【单选题】
海关对进出境动植物、动植物产品的_______过程实施动植物检疫监督制度。___
A. 生产、运递、加工
B. 加工、存放、运递
C. 生产、存放、运递
D. 生产、加工、存放
【单选题】
《国境卫生检疫法》及其实施细则所称的“隔离”是指将染疫人收留在______,限制其活动并进行治疗,直到消除传染病传播的危险。___
A. 国境口岸
B. 医疗机构
C. 指定的处所
D. 染疫人住所
【单选题】
《国境卫生检疫法》及其实施细则所称的“就地诊验”是指一个人在__________期间,到就近的卫生检疫机关或者其他医疗卫生单位去接受诊察和检验;或者卫生检疫机关、其他医疗卫生单位到该人员的居留地,对其进行诊察和检验。___
A. 在卫生检疫机关指定的
B. 中国居留
C. 患某种监测传染病
D. 患某种检疫传染病
【单选题】
根据《国境卫生检疫法实施细则》的规定,在国境口岸发现有人非因意外伤害而死亡并死因不明的,国境口岸有关单位和交通工具的负责人,应当立即向________报告。___
A. 卫生行政部门
B. 公安机关
C. 国境卫生检疫机关
D. 港务监督部门
【单选题】
申请电讯检疫的船舶,应先向卫生检疫机关申请卫生检查,合格者发给卫生证书。该证书自签发之日起________内可以申请电讯检疫。___
A. 3个月
B. 6个月
C. 12个月
D. 24个月
【单选题】
持有效卫生证书的船舶在入境前________,应当向卫生检疫机关报告有关事项,经答复同意后,即可进港。___
A. 6小时
B. 12小时
C. 24小时
D. 48小时
【单选题】
国际航行船舶的船长,必须每隔________向卫生检疫机关申请一次鼠患检查。___
A. 3个月
B. 6个月
C. 9个月
D. 12个月
【单选题】
除鼠证书和免予除鼠证书自签发之日起________内有效。___
A. 3个月
B. 6个月
C. 12个月
D. 24个月
【单选题】
《国境卫生检疫法实施细则》规定的鼠疫、霍乱、黄热病三种检疫传染病潜伏期分别为__________。___
A. 6日、5日、6日
B. 6日、5日、10日
C. 5日、5日、6日
D. 6日、6日、10日
【单选题】
船舶到达时,船上啮齿动物有反常死亡,并且死因不明的,为染有_____嫌疑。___
A. 鼠疫
B. 霍乱
C. 黄热病
D. 艾滋病
【单选题】
对没有染疫的船舶、航空器,如果来自鼠疫疫区,卫生检疫机关认为必要时,可以对离船、离航空器的员工、旅客,从船舶、航空器离开疫区时算起,实施不超过6日的________。___
A. 隔离或者留验
B. 隔离
C. 隔离或者就地诊验
D. 就地诊验或者留验
【单选题】
对染有黄热病的船舶,在没有完成灭蚊以前,限制该船与陆地和其它船舶的距离不少于________。___
A. 50米
B. 200米
C. 400米
D. 1000米
【单选题】
卫生检疫机关应当阻止患有________的外国人入境。___
A. 传染性肺结核病
B. 艾滋病
C. 心脏病
D. 高血压病
【单选题】
医疗卫生单位遇到持有卫生检疫机关发给的就诊方便卡的人员请求医学检查时,应当视同________给予医学检查。___
A. 非传染病
B. 传染病
C. 门诊
D. 急诊
【单选题】
凡申请出境居住________以上的中国籍人员,必须持有卫生检疫机关签发的健康证明。___
A. 3个月
B. 6个月
C. 12个月
D. 24个月
【单选题】
国际通行交通工具上的中国籍员工,应当持有________出具的健康证明。___
A. 市级以上医院
B. 卫生检疫机关或者县级以上医院
C. 个体医疗诊所
D. 地方卫生防疫部门
【单选题】
国际通行交通工具上的中国籍员工持有的健康证明有效期为______。___
A. 6个月
B. 12个月
C. 18个月
D. 24个月
【单选题】
根据《国境卫生检疫法实施细则》规定,国境口岸内的涉外宾馆,以及向入境、出境的交通工具提供饮食服务的部门,营业前必须向卫生检疫机关申请________。___
A. 营业执照
B. 卫生许可证
C. 税务登记证
D. 食品流通许可证
【单选题】
向我国境内出口肉类的境外食品生产企业依照食品安全法的规定进行注册,其注册有效期为_____。___
A. 2年
B. 3年
C. 4年
D. 5年
【单选题】
食品生产经营许可的有效期为_____。___
A. 2年
B. 3年
C. 4年
D. 5年
推荐试题
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter