【判断题】
人民法院在对规范性文件审查过程中,发现规范性文件可能不合法的,应当听取规范性文件制定机关的意见。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
最高人民法院关于适用《中华人民共和国行政诉讼法》的解释.第一百四十七条 人民法院在对规范性文件审查过程中,发现规范性文件可能不合法的,应当听取规范性文件制定机关的意见。
相关试题
【判断题】
作出生效裁判的人民法院应当向规范性文件的制定机关提出处理建议,并可以抄送制定机关的同级人民政府或者上一级行政机关。
A. 对
B. 错
【判断题】
没有强制执行权的行政机关申请人民法院强制执行其行政行为,应当自被执行人的法定起诉期限届满之日起三个月内提出。逾期申请的,除有正当理由,人民法院不予受理。
A. 对
B. 错
【判断题】
海事局及其分支机构工作人员在从事公务活动时,滥用职权或玩忽职守,致使公共财产、国家和人民利益遭受重大损失的,以滥用职权或玩忽职守罪追究刑事责任。
A. 对
B. 错
【判断题】
在水转水运输货物的出港核销港建费过程中,执行联运船载运的货物总量超过申请转运分拨联运的数量,则超出的部分应向缴费人计征港口建设费。
A. 对
B. 错
【判断题】
海事非税收入票据应按票据适用范围及顺序号码填用,不得串用和混用。
A. 对
B. 错
【判断题】
持久性油类是指原油、燃料油、重柴油、润滑油等持久性烃类矿物油
A. 对
B. 错
【判断题】
国外进口卸船后未提离港口库场,又装船运往国内其它港口的货物(包括船过船作业的货物),在转运港按照国外进出口货物的征收标准向国内收货人(或其代理人)计征一次港口建设费。
A. 对
B. 错
【判断题】
国内出口货物港口建设费计费基数以运单记载的数量为准,没有运单的,以船长签发的装货单记载的数量为准。
A. 对
B. 错
【判断题】
出口国外货物港口建设费计费基数以运单记载的数量为准。
A. 对
B. 错
【判断题】
国内水转水运输的中转货物(包括船过船作业和代办中转的货物),凡未提离港口库场又直接办理装船转运,并且最终收货人不变的,则中转港口不再征收港口建设费。
A. 对
B. 错
【判断题】
每票货物港口建设费的最低收费额为1元,尾数不足1元的不予计算。
A. 对
B. 错
【判断题】
水泥、粮食、化肥、农药、盐、砂土、石灰粉、磷矿石按照《港口建设费征收使用管理办法》规定的征收标准减半征收。
A. 对
B. 错
【判断题】
煤渣、煤灰、磷矿粉、炉渣、石灰粉等低值货物均暂缓征收港口建设费。
A. 对
B. 错
【判断题】
黄沙、磷矿石、碎石等低值货物和空集装箱(商品箱除外)都属于免征港口建设费的货物。
A. 对
B. 错
【判断题】
邮件和按客运手续办理的行李、包裹可免征港口建设费。
A. 对
B. 错
【判断题】
某集装箱生产厂家为A航运公司生产了一批商品箱,该批商品箱从工厂完成了交付,由该厂家负责从工厂运至某码头,然后装载到A航运公司的船上作为该航运公司内部空箱调拨至香港,对于该批空集装箱应按照商品箱征收港建费。
A. 对
B. 错
【判断题】
外贸转关出口集装箱的港建费在报关港(即装船港)按照外贸的标准一次性收取,不在转运港补交差价。
A. 对
B. 错
【判断题】
国外进口货物缴费人在办理提货手续时缴纳港口建设费。
A. 对
B. 错
【判断题】
海事管理机构决定取消代收单位代收资格时,应收回港口建设费委托代收证明、专用票据、印章,无需对外公布。
A. 对
B. 错
【判断题】
建筑垃圾、生活垃圾等参照有关低值货物的征收规定,暂缓征收港口建设费。
A. 对
B. 错
【判断题】
各单位可以根据辖区实际情况扩大行政事业性收费征收范围。(× )
A. 对
B. 错
【判断题】
各类船员的实际操作考试均按理论考试的收费标准执行。(×)
A. 对
B. 错
【判断题】
凡在中华人民共和国管辖水域内接收从海上运输持久性油类物质(包括原油、燃料油、重柴油、润滑油、轻柴油等持久性烃类矿物油)的货物所有人或代理人应缴纳船舶油污损害赔偿基金。
A. 对
B. 错
【判断题】
对于在中华人民共和国管辖水域内接收从海上运输的非持久性油类物质,以及在中华人民共和国管辖水域内过境运输持久性油类物质,应征收船舶油污损害赔偿基金。
A. 对
B. 错
【判断题】
船舶油污损害赔偿基金征收标准为每吨持久性油类物质0.5元。
A. 对
B. 错
【判断题】
财政部可依据船舶油污损害赔偿需求、持久性油类物质的货物到港量以及积累的船舶油污损害赔偿基金规模等因素,并充分考虑货物所有人的承受能力,会同交通运输部确定、调整征收标准或者暂停征收。
A. 对
B. 错
【判断题】
对于在中国境内的同一货物所有人接收中转运输的持久性油类物质,只征收一次船舶油污损害赔偿基金。
A. 对
B. 错
【判断题】
对于未及时足额缴纳船舶油污损害赔偿基金的,自应缴纳之日起,按日加收未缴额万分之三的滞纳金,上缴中央国库,纳入船舶油污损害赔偿基金一并核算。
A. 对
B. 错
【判断题】
船舶油污损害赔偿基金的最低收费额为1元,尾数不足1元的按四舍五入取整。
A. 对
B. 错
【判断题】
海事管理机构在审批船载污染危害性货物适运申报时,应查验缴纳人是否缴讫船舶油污损害赔偿基金。
A. 对
B. 错
【判断题】
由于国家机关和国家工作人员侵犯公民权利而受到损失的人,有依照法律规定取得补偿的权利。
A. 对
B. 错
【判断题】
对污染环境、破坏生态,损害社会公共利益的行为,符合条件的社会组织可以向人民法院提起诉讼,可以通过诉讼收取适当经济利益。
A. 对
B. 错
【判断题】
依法应当给予行政处罚,而有关环境保护主管部门不给予行政处罚的,上级人民政府环境保护主管部门可以直接作出行政处罚的决定。
A. 对
B. 错
【判断题】
禁止溯及既往原则是立法原则,但不是司法原则。
A. 对
B. 错
【判断题】
根据《民事诉讼法》规定,证据包括鉴定意见和电子数据。
A. 对
B. 错
【判断题】
公众可以查阅发生法律效力的判决书、裁定书,但涉及国家秘密、商业秘密和个人隐私的内容除外。
A. 对
B. 错
【判断题】
当事人对已经发生法律效力的判决、裁定,认为有错误的,可以向上一级人民法院申请再审。
A. 对
B. 错
【判断题】
《行政诉讼法》和《行政复议法》都是实体法。
A. 对
B. 错
【判断题】
自由裁量行政执法行为是行政机关不受法律约束、自由作出决定的行为。
A. 对
B. 错
【判断题】
行政执法的依据主要是指实体法依据。
A. 对
B. 错
推荐试题
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group