【多选题】
商务座车选用非油炸类点心、蜜饯类、坚果类等___的休闲小食品,品种不少于6种,独立小包装。
A. 无壳
B. 无核
C. 无皮
D. 无骨
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCD
解析
暂无解析
相关试题
【多选题】
“G”字头跨局动车组特、一等座车提供___等服务,全程提供送水服务。
A. 盒饭
B. 方便面
C. 饮品
D. 小食品
【多选题】
受理旅客咨询、求助、投诉,___。
A. 及时回应
B. 热情处置
C. 有问必答
D. 回答准确
【多选题】
对重点旅客做到“三知三有”(ABCD知座席、___、有交接)。
A. 知到站
B. 知困难
C. 有登记
D. 有服务
【多选题】
为有需求的特殊重点旅客联系到站提供___等辅助器具,及时办理站车交接。
A. 担架
B. 电动车
C. 小推车
D. 轮椅
【多选题】
日常组织培训,定期组织演练,培训演练___。
A. 有记录
B. 有结果
C. 有考试
D. 有考核
【多选题】
火灾爆炸、___和列车大面积晚点、停运、变更径路、启用热备车底等非正常情况下的应急处置预案健全有效,预案内容分工明确,流程清晰。
A. 重大疫情
B. 食物中毒
C. 空调失效
D. 设备故障
【多选题】
配备___等应急物品,(ABD ),性能良好。
A. 照明灯
B. 扩音器
C. 保证使用
D. 电量充足
【多选题】
___明显位置、(ABCD )内有商品价目表。
A. 餐车
B. 车厢
C. 售货车
D. 服务指南
【多选题】
发生烟火报警时,___根据司机通知立即到报警车厢查实确认,查看指定车厢的客室、卫生间,随车机械师重点查看电气设备。
A. 乘务员
B. 随车机械师
C. 列车长
D. 乘警
【多选题】
若发生客室或设备火情,___或(AB )立即通知司机按规定实施制动停车,并启动应急预案进行处理。
A. 列车长
B. 随车机械师
C. 乘警
D. 乘务员
【多选题】
餐车___不随意放置私人物品(ABCD乘务员随乘携带的餐食等定位存放)。
A. 商品柜
B. 冰箱
C. 吧台
D. 橱柜
【多选题】
餐车配置的___等厨房电器符合规定数量、规格和额定功率,保持洁净。
A. 微波炉
B. 电烤箱
C. 咖啡机
D. 啤酒机
【多选题】
不出售无___、(BCD )、(BCD )和过期、变质,以及口香糖、方便面等严重影响列车环境卫生的食品。
A. 生产部门
B. 生产单位
C. 生产日期
D. 保质期
【多选题】
高铁快件码放在车厢内___座椅后的空档处时,不影响座椅(AC ),高度不超过座椅。
A. 最后一排
B. 大件行李处
C. 前倾
D. 后倾
【多选题】
利用高铁确认列车运输时,可使用纸箱、集装袋等集装容器;集装件可码放在___等位置,但不码放在座椅上。
A. 大件行李处
B. 通过台
C. 车厢过道
D. 座椅间隔处
【多选题】
列车乘务人员在运行途中巡视、检查高铁快件集装件___等状况。
A. 码放
B. 外包装
C. 施封
D. 破封
【多选题】
具备___及以上文化程度,保洁人员可适当调整。
A. 高中
B. 职高
C. 中专
D. 初中
【多选题】
动车组列车管理制度健全,___。定期分析安全和服务质量状况,有针对性具体整改措施。
A. 有检查
B. 有考核
C. 有记载
D. 有分析
【多选题】
按规定配置业务资料,内容修改及时、正确。除携带___外,车上不携带其他纸质资料台账。
A. 防火档案
B. 铁路电报
C. 客运记录
D. 车内补票移交报告
【多选题】
各工种在列车长的领导下,按岗位责任各负其责,相互协作,落实作业标准,___。
A. 有监督
B. 有检查
C. 有考核
D. 有考试
【多选题】
业务办理符合规定,___填写规范、内容准确、完整清晰。
A. 数据
B. 票据
C. 台账
D. 报表
【多选题】
动车组___应严格执行作业标准和乘务纪律,工作中不准在旅客车厢和餐车占用座位休息,非就餐时间不得在餐车逗留、会客。
A. 客运
B. 车辆
C. 餐饮
D. 乘警
【多选题】
动车组列车班组出乘前列车长要收缴列车员___。
A. 上岗证
B. 手机
C. 烟火
D. 健康证
【多选题】
动车组列车班组出乘前列车长要检查列车员___。
A. 仪容
B. 仪表
C. 标志
D. 证件
【多选题】
班组接车后,与___办理业务交接,做到交接清楚全面。
A. 质检员
B. 交班列车长
C. 保洁
D. 随车机械师
【多选题】
班组接车后,检查餐售等人员___情况,收缴烟火,统一保管并做好登记。
A. 着装
B. 证件
C. 手机收缴
D. 备品
【多选题】
班组接车后,检查列车出库卫生保洁质量及___定位情况;确认列车满水情况。
A. 易耗品
B. 清扫工具
C. 商品
D. 备品
【多选题】
列车长要与___车厢的列车员确认饮品、休闲食品和专项服务备品领取数量,与餐车长签字交接。
A. 商务
B. 特
C. 一等座
D. 二等座
【多选题】
动车组列车开车后,列车长要确认___的播放及显示内容准确、音量适中、播放及时。
A. 视频
B. 广播
C. 广告
D. 电子屏
【多选题】
检查车门、翻板、各柜门锁闭状态;检查行李架、衣帽钩、大件物品摆放及商品、高铁快件堆码情况;巡视电茶炉、卫生间等部位,做到设备良好,___。
A. 通道畅通
B. 卫生整洁
C. 备品充足
D. 温度适宜
【多选题】
列车长要规范列车员作业行为, 发现问题及时___,并在列车长工作手册内填记,签字确认。
A. 纠正
B. 批评
C. 指导
D. 考核
【多选题】
遇自动播报故障时,及时___。
A. 重启设备
B. 人工广播
C. 人工宣传
D. 通知机械师
【多选题】
动车组列车员接车后,检查___情况。
A. 设备设施
B. 卫生质量
C. 易耗品、清扫工具定位
D. 上水
【多选题】
动车组列车员途中核对席位,统计乘车人数,对持电子票旅客乘车信息进行核实,发现___的人员,及时引导,并报告列车长。
A. 无票
B. 挂失补
C. 乘车条件不符
D. 越站
【多选题】
动车组列车员要加强运行途中车内整容,对空余座位的小桌板、___等及时复位
A. 遮光帘(幕)
B. 杂志
C. 座椅扶手
D. 脚蹬
【多选题】
动车组列车员要主动为商务座旅客介绍商务座设备设施,免费提供___。
A. 餐食
B. 饮品
C. 休闲食品
D. 专项服务备品
【多选题】
动车组列车员要为特、一等座旅客免费提供___。
A. 餐食
B. 饮品
C. 休闲食品
D. 专项服务备品
【多选题】
动车组列车员要为___旅客全程提供送水服务。
A. 商务座
B. 特等座
C. 一等座
D. 二等座
【多选题】
动车组列车员要加强爱车宣传,及时制止旅客车厢内___等不文明乘车行为。
A. 大声喧哗
B. 脚搭桌板
C. 穿鞋躺在座席上
D. 睡觉
【多选题】
列车员___到站前、后对车厢水位进行检查确认并报告列车长。
A. 中途站
B. 上水站
C. 终到站
D. 停车站
推荐试题
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
【单选题】
1.三相刀开关的图形符号与交流接触器的主触点符号是___。
A. 一样的
B. 可以互换
C. 有区别的
D. 没有区别
【单选题】
2.刀开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
3.行程开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM