【单选题】
当国外发生重大动植物疫情并可能传入中国时,受动植物疫情威胁地区的地方人民政府和海关应当____。
A. 立即采取紧急措施
B. 向上级人民政府和海关总署报告
C. 等候上级人民政府和海关总署指令
D. 立即采取紧急措施,同时向上级人民政府和海关总署报告
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
D
解析
暂无解析
相关试题
【单选题】
在动物/动物产品检疫风险分析过程中,"危害识别"中的"危害"指的是______。
A. 动物/动物产品
B. 动物/动物产品可能携带的疫病
C. 带病动物/动物产品可能产生的负面影响
D. 动物/动物产品的数量
【单选题】
在进境食用水生动物安全风险监控中发现检出生物毒素、食源性致病菌和禁用药物超标的,应在____向海关总署上报不合格信息。
A. 4小时内
B. 6小时内
C. 12小时内
D. 24小时内
【单选题】
中国相关法律法规规定,输入属于《进境动植物检疫审批目录》中的动物,应在____,由进口商提出申请,办理检疫审批手续,获得《进境动植物检疫许可证》。
A. 签订贸易合同或协议之前
B. 签订贸易合同或协议之后
C. 报关时
D. 现场查验时
【单选题】
根据有关法律法规规定,进出境动植物检疫审批机构自受理申请之日起____作出准予许可或不予许可的决定。
A. 10个工作日内
B. 20个工作日内
C. 30个工作日内
D. 40个工作日内
【单选题】
隔离检疫期间,怀疑或疑似发生动物重大动物疫情的,应严格按____执行。
A. 部门领导的要求
B. 《进境动物重大动物疫情应急处置预案》
C. 进口商的要求
D. 出口商的要求
【单选题】
供港澳食用陆生动物(牛羊猪禽)注册饲养场(育肥场、中转场)饲喂或存放国家禁止使用的药物和动物促生长剂的,海关____其注册登记。
A. 注销
B. 吊销
C. 撤销
D. 撤回
【单选题】
____是指按照海关总署进境食用水生动物安全风险预警要求,在检验检疫合格放行前,用于对进境食用水生动物暂时扣留的场所。
A. 查验场所
B. 海关作业场所
C. 隔离场
D. 扣检场所
【单选题】
进境食用水生动物指定口岸所在地海关应配备与进境食用水生动物进口贸易量相适应、具备相应的岗位资质条件的检验检疫专业人员,数量不得少于____。
A. 1名
B. 2名
C. 3名
D. 5名
【单选题】
下列有关进境水生动物现场查验规定的表述,错误的是:_______。
A. 核对货证是否相符
B. 包装容器上是否有牢固、清晰易辨的中文或者英文标识
C. 检查水生动物的健康状况
D. 进境食用水生动物,开箱比例不高于10%,最低不少于5件
推荐试题
【填空题】
27.20世纪80年代末、90年代初,随着东欧剧变和苏联解体,持续近半个世纪的冷战格局被打破。 “___ ” 是当前乃至今后相当长时期内世界主要战略力量对比的总体态势和总体特征。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode