【多选题】
以下哪些操作可采用即时销票(更改车型或预销票)予以修正?___
A. 客货误判
B. 免费绿通车打印发票
C. 军车持卡打印发票
D. 一车持正常卡和已赔卡均刷卡打印发票
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AB
解析
暂无解析
相关试题
【多选题】
入口冲卡车,收费员应记录哪些信息以备出口站点核查___
A. 车牌
B. 车型
C. 车辆外观特征
D. 冲卡时间
【多选题】
进出缴款室规定说法正确的是_________
A. 管理岗可单独进出
B. 业务岗可单独进出
C. 班长可单独进出
D. 收费员可单独进出
【多选题】
备用金领用说法正确的是______ ___
A. 每个小班下班后,收费员归还备用金给班长
B. 一个大班下班后,收费员归还备用金给班长
C. 前一小班的备用金不能给下一小班的同一个收费员使用
D. 前一小班的备用金可以给下一小班的同一个收费员使用
【多选题】
下列关于集装箱尺寸和箱型代码描述正确的是___
A. 集装箱尺寸代码第 1 位:用数字或拉丁字母表示箱长,常见的有 2 和 4;
B. 集装箱尺寸代码第 2 位:用数字或拉丁字母表示箱宽和箱高,常见的有 0、2、5。
C. 集装箱箱型代码第 1 位:由 1 个拉丁字母表示箱型,常见的为 G、T;
D. 集装箱箱型代码第 2 位:由 1 个数字表示该箱型的特征。
【多选题】
通行卡内记录的信息有。___
A. 入口站码
B. 入口时间
C. 入口车型
D. 入口收费员工号
E. 入口车道
【多选题】
集装箱运输车辆从下列哪个站点进出时,可享受通行费优惠?___
A. 霞浦
B. 北仑
C. 宁波东
D. 柴桥
E. 小港
【多选题】
下述描述正确的是。___
A. 对有两个冗余路标缺失其一时,系统自动容错并唯一确定行驶路径的,仍按实际路径收费
B. 持纸质缴费凭证按最短路径收费
C. 涉及杭州湾跨海大桥二义性路径的,通行费按就低原则收取
D. 路径标识系统不准确,识别结果不唯一的,系统提供多条参考路径和最短路径,供收费员确定路径后收费
【多选题】
集装箱的判定规则有。___
A. 国际标准集装箱车辆的认定按有否装运国际标准集装箱箱体判定
B. 1只30英尺的国际标准集装箱判6类
C. 1只40英尺、或2只20英尺的国际标准集装箱判7类;1只20英尺的集装箱判6类
D. 未装箱体的集装箱挂车按普通车判别车型
【多选题】
出现打印机打出的发票损坏或卡纸原因造成发票损坏,收费员未按 模拟通过键且车辆未驶离后线圈时重新打印发票,此时,前一张发票应做。 ___
A. 销票处理
B. 空票处理
C. 盖空票章
D. 预销票处理
【多选题】
以下农产品品种属绿色通道免费品种的是___。
A. 青豆
B. 粮食
C. 小麦
D. 马铃薯
【多选题】
收费员收回缴费凭证,需输入。___
A. 车型
B. 收费站号
C. 缴费凭证号
D. 车辆厂牌型号
【多选题】
以下哪几种车辆可按免费车放行?___
A. 安装有固定警报装置并在执行任务的制式“120”救护车
B. 挂“宁演33009”牌照的车
C. 挂南M55645牌照的车
D. 无固定警报装置的警车
E. 挂NA36002车牌的车辆
【多选题】
一张完整有效的销票应注明哪些内容?___
A. 销票时间
B. 销票原因
C. 车牌号
D. 收费员签名
E. 班长签名
【多选题】
集装箱箱体必备标志包括。___
A. 重量
B. 箱号
C. 海运公司标志
D. 箱高
E. 运输物品
【多选题】
号牌由武警标志、警徽标志、核发机构代号、警种标志、直属单位代号和序号组成,下面对应的为在正确的是。___
A. 黄金部队为H
B. 森林部队为S
C. 水电部队为D
D. 交通部队为T
E. 边防部队为B
F. 消防部队为X
【多选题】
关于ETC黑、白名单的说法正确的是。___
A. 白名单下载有误,将影响车道对外省支付卡的信息读取
B. 黑名单下载有误,将对支付卡使用后的结算有影响
C. 收费员应在上班时检查收费界面黑名单版本信息
D. 出现黑名单信息未更新时,应及时进行下载
【多选题】
由收费系统软件自动计算出来的数据是。___
A. 轴超限量
B. 总重超限量
C. 收费金额
D. 通行费
【多选题】
收费碰到出口恶意冲卡的车辆,下列处理方法正确的是。___
A. 确保自身安全,提高安全防范意识
B. 收费班长及时上报车辆的相关信息
C. 收费班长将处理结果记录在班长日志里
D. 通行费由管理人员事后进行追缴
【多选题】
绿农产品目录中甘薯类主要包括以下哪几种?___
A. 白薯
B. 红薯
C. 山药
D. 芋头
E. 紫薯
【多选题】
目前收费道口发现的ETC违规车辆分两类,一是办理环节,二是使用环节。具体违规分以下那几种情况?___
A. 违规办理ETC
B. ETC车型不符
C. 车牌不符
D. 假冒集装箱使用ETC
【多选题】
关于ETC操作,下列描述正确的是。___
A. ETC专用车道有误闯车队列没有清除时,可能使后续的正常ETC车辆交易成功,但栏杆不抬
B. 司机提供CPU卡前,已刷复合卡,则重判车型,刷CPU卡;复合卡做已写未发卡,上交收费站销卡
C. 刷CPU卡后,发现车型误判:重判车型,再刷CPU卡
D. 如CPU卡故障、失效、入黑名单,则发放复合卡,并提醒驾驶员出口时走MTC车道(交复合卡),必要时,提醒驾驶员去服务点处理
【多选题】
国家高速公路网命名规则中联络线的编号为4位数,由组成。___
A. 主线编号
B. 数字“1”
C. 联络线顺序号
D. 英文字母
【多选题】
目前高速公路主要有哪几种偷逃通行费的行为?___
A. 调换通行卡
B. 扰乱计重数据
C. 伪造盗窃非法使用军警车辆号牌
D. 假冒绿色通道车
E. 冲卡
【多选题】
关于国际标准集装箱车辆,表述不正确的是。___
A. 集装箱车辆车货总重超限的按照超限车辆的收费方式收费
B. 出口收费员对装载二只20英尺或一只40英尺箱体的集装箱车应判七类车
C. 六类车、七类车分别与四类车、五类车的费率相对应
D. 以箱体为依据,未装载集装箱的挂车按普通货车收费
【多选题】
下列关于持CPU卡车辆从MTC车辆车道出口操作流程说法正确的是。___
A. 收费员等待车辆驶近,输入该车辆车型(含客车、货车)
B. 收费员刷CPU卡后,核对入口车牌(CPU 卡内的发行车牌)与出口车牌是否一致
C. 若车牌一致,选择“CPU 卡支付”,再次刷CPU 卡,选择“CPU付款”。支付成功后,确认放行车辆
D. 车牌不符,选择现金付费,付款后,确认放行车辆
【多选题】
公路按其在路网中的地位分为。___
A. 国道
B. 省道
C. 市道
D. 县道
E. 乡道
【多选题】
对绿色通道政策,以下描述正确的有。___
A. 从2010年12月1日起,全国所有收费公路(含收费的独立桥梁、隧道)全部纳入鲜活农产品运输“绿色通道”网络范围
B. 对整车合法装载运输鲜活农产品车辆免收车辆通行费
C. 对《目录》范围内的鲜活农产品与其他产品混装,且混装的其他产品不超过车辆核定载质量或车厢容积20%的车辆,比照整车装载鲜活农产品车辆执行
D. 考虑车辆计重设备可能出现的合理误差,对超限超载幅度不超过5%的鲜活农产品运输车辆,比照合法装载车辆执行
E. 运输的货物不属于农产品(含农产品装载比例低于10%的)属于绿农车严重恶意违规情况之一
【多选题】
以下哪些车道需要开启节假日免费模式。___
A. ETC入口专用车道
B. ETC出口专用车道
C. MTC入口车道
D. MTC出口车道
【多选题】
非ETC车辆或已列入黑名单车辆进入ETC车道后,收费员应。 ___
A. 阻止后面的车辆驶入本ETC车道
B. 要求误闯车倒车退出ETC专用车道,引导至MTC车道进行处理
C. 提醒驾驶员去服务点处理
D. ETC车道程序中,清车辆队列
【多选题】
假冒集装箱车持CPU卡在MTC车道出口时,操作正确的是。___
A. 核实相关证单,确定是假冒集装箱车的,按货车计重收费
B. 要求司机改为现金等其它方式支付通行费
C. 收缴CPU卡
D. 报ETC服务处,将此车辆列入黑名单
【多选题】
下列哪些规定不属于超限车辆。___
A. 集装箱车货总重45吨
B. 车货总高度从地面算起4米以上
C. 双联轴每侧双轮胎载质量14吨
D. 车货总宽度2.6米
【多选题】
若通行卡损坏(有明显痕迹),以下操作正确的是。 ___
A. 若卡中信息正常读出,则按通行卡入口站点打票收费,并收取通行卡工本费
B. 若卡中信息不能正常读出,则进行系统查询,信息相符,按正常车辆处理,并收取通行卡工本费
C. 若卡中信息不能正常读出,则进行系统查询,信息相符,按正常车辆处理,不收取通行卡工本费
D. 若确认无理由,按车辆可能行驶最远里程收费,并收取通行卡工本费
【多选题】
遇恶劣天气封道时,下列正确的是。___
A. 在广场放置告示牌
B. 允许收费员锁门后离开收费亭
C. 收费员应提前做好开通准备
D. 班长应加强广场巡逻
【多选题】
人民币真伪的识别方法有那些?___
A. 看
B. 摸
C. 听
D. 闻
E. 测
【多选题】
为确保高速公路行车安全而设置的交通标志设施有。___
A. 警告标志
B. 禁令标志
C. 指示标志
D. 指路标志
E. 公路情报板
【多选题】
假币的主要识别方法有。___
A. 纸张识别
B. 水印识别
C. 凹印技术识别
D. 荧光识别
E. 安全线识别
【多选题】
下列哪些情况不需要回收公务卡。___
A. 公务卡超出使用范围
B. 公务卡不可读且无效
C. 公务卡超过有效期
D. 卡内车牌与实际不符
【多选题】
出口车道收费员刷CPU卡操作步骤有。___
A. 输入客车车型
B. 输入车牌
C. 读卡
D. 收费员应核对入口车牌(CPU卡内的发行车牌)与出口车牌一致才允许按CPU卡支付
E. 收取通行费,系统显示付费方式选择的提示信息,操作员可按↑、↓键或数字键“7”选择CPU 卡付费
F. 放行车辆
【多选题】
联网路段对装有通风和监控设施且长度1000-2500米,2500-4000米,10000米以上的遂道,叠加通行费每次分别为几元?___
A. 1元
B. 2元
C. 5元
D. 10元
E. 15元
【多选题】
票据”键可用作以下哪些处理功能? ___
A. 更改发票号码
B. 发票重新打印
C. 预销票
D. 更改免费票号码
推荐试题
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN