【单选题】
绿色通道整车装载的含义___。
A. 鲜活农产品占车辆核载质量且车厢容积80%以上
B. 鲜活农产品占车辆核载质量或车厢容积80%以上
C. 运输货物占车辆核载质量且车厢容积80%以上
D. 运输货物占车辆核载质量或车厢容积80%以上
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
收费班长在检查一辆集装箱运输方式的绿通车辆时,根据车货总重计算鲜活农产品重量,应减去集装箱的空箱重量。根据集装箱知识,___代表空箱重量。
A. MAX GROSS
B. TARE
C. CU.CAP
【单选题】
为有效地开展国际集装箱多式联运,必须强化集装箱标准化,高速公路根据___判断是否属于国际标准集装箱。
A. ISO 668:1995
B. 欧洲国际铁路联盟(VIC)所制订的集装箱标准
C. 集装箱船级社标准
D. 中国中集集团集装箱制造标准
【多选题】
《超限运输车辆行驶公路管理规定》中所指的超限车辆为:___
A. 车货总高度从地面算起超过4米;
B. 车货总长度超过18.1米;
C. 车货总宽度超过2.55米;
D. 五轴汽车列车,其车货总质量超过43000千克
【多选题】
根据《收费公路管理条例》第七条规定,哪些车辆免交车辆通行费___
A. 军队车辆、武警部队车辆
B. 浙江省公安机关在辖区内执行正常巡逻任务和处置突发事件的统一标志的制式警车
C. 经国务院交通主管部门批准执行抢险救灾任务的车辆
D. 省、自治区、直辖市人民政府批准执行抢险救灾任务的车辆
E. 进行跨区作业的联合收割机、运输联合收割机(包括插秧机)的车辆
【多选题】
以下关于ETC车道设备及交易说法正确的有 ___
A. ETC车道入口处第一个线圈为交易线圈
B. ETC车道不停车收费是利用天线RSU扫描车载OBU实现交易
C. ETC车道安装的流量线圈是为实现车辆车牌抓拍
D. 对持有ETC卡的车辆,如卡内车牌与实际车牌不符按规定要求支付现金
【多选题】
以下客车车辆通行费车型分类描述正确的是___
A. 20座客车按三类车收费,40座客车按四类车收费。
B. 四类客车的车次费为15元/车次,车公里费用为1.4元/车公里。
C. 全省高速公路客车车辆通行费车型分类调整,按照交通部发布的《收费公路车辆通行费车型分类》(JT/T489-2003)执行。
D. 20座客车为0.8元/车公里,车次费10元/车次。
【多选题】
下列关于ETC车辆至MTC车道操作处理说法正确的是___
A. 收费员等待车辆驶近,输入客车车型
B. 收费员刷CPU卡后,核对入口车牌(CPU 卡内的发行车牌)与出口车牌是否一致
C. 若车牌一致,选择“CPU 卡支付”,再次刷CPU 卡,选择“CPU付款”。支付成功后,确认放行车辆
D. 车牌不符,选择现金付费,付款后,确认放行车辆
【多选题】
实习生实习期间补助标准:大专___元人民币/工作日;本科()元人民币/工作日;硕士80元人民币/工作日;博士( )元人民币/工作日。
A. 40
B. 50
C. 90
D. 120
【多选题】
年度内累计申请病假( )或连续请病假( )以上的员工续请病假,原则上须出具三级甲等医院出具的疾病(医疗)证明书等相关诊治材料方可续请。 ___
A. 50天
B. 60天
C. 5次
D. 6次
【多选题】
考勤审批处理权限及流程中基层单位普通员工公出___加班、调休()由本人提出申请,基层单位负责人签署意见,报人力资源部审批、归档。
A. 2-3天
B. 1.5-3天
C. ≥1天
D. >1天
【多选题】
出现以下情况之一的,经公司研究后,进行降级、降薪处理___
A. 员工工作能力和管理水平无法胜任本职工作
B. 个人月度绩效考核或年度绩效考核多次排名靠后,经组织约谈后,仍无改善的
C. 员工违反公司规章制度或受到公司行政处分的
D. 因公司外部经营环境变化或内部机构调整、岗位设置变动
【多选题】
《浙江温州甬台温高速公路有限公司绩效考核管理规定》的绩效管理原则包括什么___
A. 实事求是、 公平公正原则
B. 奖惩挂钩、 有效激励原则
C. 分层分类、逐级考核原则
D. 突出重点, 便于操作原则
【多选题】
根据《浙江温州甬台温高速公路有限公司员工考勤和假期管理规定》,以下内容正确的是?___
A. 收费所负责人在各自的审批权限范围内, 每月批准的事假天数累计不得超过管辖人数的1/5
B. 各直属单位管辖范围内每月批准的事假累计天数不得超过管辖人数的1/6。
C. 员工当月每迟到(早退)3次者,按事假1天处理
D. 因私事外出的, 经批准离开工作岗位一个工作日内超过30分钟但不超过4小时的, 按事假 0. 5天处理; 超过4小时的, 按事假1天处理
【多选题】
关于探亲假以下正确的有: ___
A. 员工探望配偶,每年给予探亲假一次,合计15天
B. 员工探望父母,每年给假一次,合计10天
C. 探亲假不包括公休假日和法定节假日在内。
D. 探亲假期是指员工与配偶、 父母团聚的时间,原则上探亲假期外,不再给予路程假,确因路程极远或地点偏僻,经公司领导批准可给予路程假
【多选题】
根据《浙江温州甬台温高速公路有限公司员工考勤和假期管理规定》,以下内容正确的是?___
A. 员工达到法定结婚年龄结婚者(男满25周岁,女满23 周岁)可持结婚证申请15天婚假
B. 员工直系亲属(配偶、父母、公婆、岳父母、祖父母、外祖父母亡故、子女及其配偶)以及直系血缘兄弟姐妹亡故, 可请丧假不超过3 天。
C. 员工在非本省的直系亲属死亡需要员工本人到外料理丧事的, 可根据路程远近,适当给予路程假,路程假最长不得超过3天
D. 员工申请丧假, 未及时办理电子或书面请假手续的, 须在丧假后3个工作日内补办有关的丧假申请手续。
【多选题】
员工绩效考核管理下列说法正确的:___
A. 员工绩效考核对象为全体与公司建立劳动合同关系并考核周期结束之日在册的员工;
B. 全月产假期或工伤假期的员工不参加当月考核;
C. 员工在入职试用期内不参加月度和年度绩效考核;
D. 借用员工在原单位参加考核。
【多选题】
凡有以下情况者,公司将不与其建立劳动关系,已建立劳动关系的员工出现以下情况的___,立即解除劳动合同。___
A. 年龄未满十八周岁或超过法定退休年龄者。
B. 曾被开除公职。
C. 曾因犯罪受过刑事处罚的。
D. 经公司指定医院体检合格者。
E. 患有精神病或传染病者和酗酒、吸毒者。
【多选题】
辞退员工流程正确的是___
A. 试用期考核不合格员工在收到人力资源部下发的《试用期不合格通知书》后,在通知书规定的时间内到所在单位办理离职手续
B. 正式员工所在单位根据公司规定的辞退条件,实事求是地对照员工的现实能力、表现或某些特定的事实提出辞退建议,填写《员工辞退建议及评审报告单》,上报人力资源部
C. 人力资源部接到《报告单》后,调查了解相关情况,进行条件审查,根据实际情况确认是否需要辞退。如确认需辞退的,签署意见,逐级上报领导审批
D. 《报告单》审批通过后,人力资源部在7个工作日内向辞退员工下发《解除劳动合同通知书》,通知其办理离职手续
【多选题】
下列说法正确的有___
A. 新员工入职1个月内,按国家相关规定,公司将与其签订《劳动合同》
B. 新员工入职15个工作日内,应按照人力资源部要求提供银行卡卡号(银行卡复印件应由本人签名),作为发放薪酬的工资卡使用
C. 员工试用期转正后,人力资源部根据有关规定为其办理公积金相关手续。入职满一年,根据公司企业年金相关管理规定办理企业年金相关手续
D. 员工入职1个月内,人力资源部为其申请公司内部办公自动化(OA)及集团HR信息系统帐号,分别由办公室和人力资源部发放相应帐号和密码,新员工应及时登录并修改密码
【多选题】
员工出现以下严重违反企业规章制度的行为,公司视情节给予通报批评、警告、记过、记大过、降级、撤职的处分。 ___
A. 不服从公司管理
B. 虚报瞒报考勤数据、伪造或涂改考勤相关证明、代刷卡等考勤弄虚作假的行为
C. 在工作单位携带与工作无关物品,给公司造成不良影响或经济损失的
D. 因个人主责使公司形象、声誉遭受不良影响,包括上级公司通报批评、媒体负面报导等。
E. 所负责的组织安全考核评定为不合格单位
【多选题】
员工休假结束,必须按时到所在单位报到上班,因以下情况无法上班的可酌情续假: ___
A. 患病尚未康复,且能出具医院证明的(相关材料同申请病假手续)
B. 妊娠假未超过60天的
C. 女员工流产后因个人身体特殊原因确实需要休养并能出具医院证明的(计划生育假)
推荐试题
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode