【判断题】
食品生产经营单位在取得《卫生许可证》前,可以进行试营业
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
凉菜间的室内温度应不得高于20℃
A. 对
B. 错
【判断题】
食品冷冻指将食品或原料置于冰点温度以下,以保持冰冻状态的贮存过程,冷冻温度的范围应在-20℃~0℃之间
A. 对
B. 错
【判断题】
冷链热食从进入成品冷库后至航班计划起飞时间,宜≤24h
A. 对
B. 错
【判断题】
专间内紫外线灯应分布均匀,距离地面2m以内
A. 对
B. 错
【判断题】
出厂水游离氯余量需≥0.3mg/L,不得超过4mg/L
A. 对
B. 错
【判断题】
管网末梢水游离氯余量需≥0.05mg/L
A. 对
B. 错
【判断题】
饮用水供应单位的《卫生许可证》的有效期是4年
A. 对
B. 错
【判断题】
接触食品的设备、工具、容器、包装材料等应符合食品安全标准或要求
A. 对
B. 错
【判断题】
凉菜、生食海产品、裱花蛋糕制作区域的卫生要求要高于热食制作区域
A. 对
B. 错
【判断题】
不会导致食品污染的食品容器、包装材料、工具等物品可以和食品共同存放在库房中
A. 对
B. 错
【判断题】
餐饮服务单位专间内的工具、空调、清洗消毒以及冷藏设施均应专用
A. 对
B. 错
【判断题】
食品冷库应有良好通风、排气设施
A. 对
B. 错
【判断题】
使用空调的场所应配备纱门、纱窗或者塑料门帘
A. 对
B. 错
【判断题】
有现场加工操作的熟食制品销售单位需要设置独立隔间,并在入口处设预进间或设更衣、洗手消毒设施
A. 对
B. 错
【判断题】
食品销售单位玻璃门下端应装有金属防鼠板
A. 对
B. 错
【判断题】
饮用水供应单位的供水设施周围 1000m以内不得有渗水坑和污染源
A. 对
B. 错
【判断题】
自备水源供水设施应与城镇公共供水管网连接
A. 对
B. 错
【判断题】
与生活饮用水直接接触的供水设备及用品应具有卫生许可批件
A. 对
B. 错
【判断题】
食品加工人员如患有痢疾、伤寒、甲型病毒性肝炎、戊型病毒性肝炎等消化道传染病,以及患有活动性肺结核、化脓性或者渗出性皮肤病等有碍食品安全的疾病,或有明显皮肤损伤未愈合的,应当调整到其他不影响食品安全的工作岗位
A. 对
B. 错
【判断题】
在食品生产通用卫生规范中,污染是指在食品生产过程中发生的生物、化学污染因素传入的过程,但不包括物理污染
A. 对
B. 错
【判断题】
食品生产企业内设的卫生间,不得与食品生产区域直接连通,但可与包装、仓库等储存区域直接连通
A. 对
B. 错
【判断题】
消毒餐(饮)具洗消剂残留量的评价指标,游离性余氯和阴离子合成洗涤剂(以十二烷基苯磺酸钠计)的计算单位为mg/100c㎡
A. 对
B. 错
【判断题】
大肠菌群发酵法和纸片法的限量值为不得检出
A. 对
B. 错
【判断题】
对于餐(饮)具的大肠菌群检验,采用发酵法和纸片法均可。以纸片法为仲裁方法
A. 对
B. 错
【判断题】
熟肉制品中大肠埃希氏菌O157·H7的检出限量为100MPN/g—1000MPN/g
A. 对
B. 错
【判断题】
即食生制水产品中金黄色葡萄球菌的检出限量为100MPN/g—1000MPN/g
A. 对
B. 错
【判断题】
即食果蔬制品中沙门氏菌的检出限量为100MPN/g—1000MPN/g
A. 对
B. 错
【判断题】
食品安全国家标准中污染物是指食品在生产(包括农作物种植、动物饲养和兽医用药)、加工、包装、贮存、运输、销售、直至食用等等过程中产生的,非有意加入的化学性危害物质,环境污染因素除外
A. 对
B. 错
【判断题】
未开展量化分级管理的食品生产经营单位监督频次每3个月不少于1次
A. 对
B. 错
【判断题】
《国境口岸食品卫生监督管理规定》适用于对在国境口岸从事食品生产经营单位以及为出入境交通工具提供食品、饮用水服务的口岸食品生产经营单位的卫生监督管理
A. 对
B. 错
【判断题】
从业人员每年必须进行健康检查,取得健康证明。临时参加工作的从业人员可暂不进行健康检查
A. 对
B. 错
【判断题】
取得《卫生许可证》的食品生产经营单位在向异地食品生产经营单位提供食品及食品用产品时,可到该地的海关备案
A. 对
B. 错
【判断题】
食品生产经营单位在停业时,应当到作出卫生许可决定的海关办理注销手续,缴销《卫生许可证》
A. 对
B. 错
【判断题】
采集餐饮食品时,对于散装液体(如饮料等)样品应先充分混合后,再取中间部位的样品,采样时可使用玻璃吸管或倾倒方式
A. 对
B. 错
【判断题】
航空食品分为航空配餐和外购即食食品两类
A. 对
B. 错
【判断题】
潜在风险食品是指蛋白质或碳水化合物含量较高,通常pH大于4.6且水分活度(Aw)大于0.85,易于微生物生长或产生毒素,需时间-温度控制方可安全食用的食品
A. 对
B. 错
【判断题】
航空配餐第一质量控制期是指航空配餐从加工到航班飞机实际起飞时间的时间限制
A. 对
B. 错
【判断题】
航空配餐的食品生产区应设置专用的初加工、冷加工、热加工、封装、装配、储存及餐饮用具清洗消毒场所
A. 对
B. 错
【判断题】
航空配餐的冷食加工及分装、热食加工及分装应分别设置相应专间
A. 对
B. 错
【判断题】
航空配餐加工场所工作面的照度不得低于110 lx
A. 对
B. 错
推荐试题
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.