【多选题】
依据检验检疫法律法规规定,进口____必须事先办理动植物检疫审批手续。
A. 冷冻水果
B. 木材
C. 种苗
D. 新鲜水果
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
CD
解析
暂无解析
相关试题
【多选题】
进境水果____,海关总署将视情况暂停该种水果进口或暂停从相关水果产区、果园、包装厂进口:_____。
A. 果园、加工厂地区或周边地区爆发严重植物疫情的
B. 经检验检疫发现中方关注的进境检疫性有害生物的
C. 经检验检疫发现有毒有害物质含量超过中国相关安全卫生标准规定的
D. 不符合中国有关检验检疫法律法规、双边协定或相关国际标准的
【多选题】
进境____等竹木草制品可以不提供输出国植物检疫证书。
A. 柳条筐
B. 胶合板
C. 草席
D. 实木复合地板
【多选题】
白蜡枯梢病疫区白蜡木属木制品,____。
A. 板材或木制品去皮
B. 厚度不超过30mm
C. 植物检疫证书上注明经过66℃以上持续24小时处理
D. 含水度低于20%
【多选题】
现场查验进境竹木草制品发现有____的,须出具《检验检疫处理通知书》。
A. 检疫性有害生物
B. 禁止进境物
C. 一般性有害生物
D. 双边协议中列明的有害生物
【多选题】
进口白蜡木薄板检疫发现白蜡枯梢病,口岸应采取____。
A. 消毒处理
B. 销毁处理
C. 退运处理
D. 溴甲烷熏蒸处理
【多选题】
关于出境竹木草制品现场检疫抽样检查比例,表述正确的为:_____。
A. 10件以下全部检验
B. 11-50件抽查3-5件,51-100件抽查6-10件
C. 101件以上,每增加100件,抽查数量递增1
D. 1000件以上,每增加500件,抽查数量递增1件
【多选题】
输往印度的木材/竹制品,应在植物检疫证书标注____等信息。
A. 不含检疫性害虫
B. 不含树皮
C. 含土壤污染
D. 不含任何其它植物碎片
【多选题】
海关可以根据需要在____等生产、加工、存放进出境动植物、动植物产品和其他检疫物的场所实施动植物疫情监测。
A. 机场
B. 港口
C. 车站、仓库
D. 加工厂、农场
【多选题】
我国国门生物安全监测的监测对象至少包括____等害虫。
A. 检疫性实蝇、斑翅果蝇
B. 口岸林木害虫
C. 舞毒蛾、苹果蠹蛾
D. 马铃薯甲虫、葡萄花翅小卷蛾
【多选题】
我国国门生物安全监测的监测对象至少包括____等病原。
A. 油菜茎基溃疡病菌
B. 向日葵黑茎病菌
C. 苹果枝枯病菌
D. 马铃薯斑纹片病菌
【多选题】
检疫性实蝇重点监测区域至少包括:_____。
A. 入境口岸及周边地区
B. 国际机场周边地区
C. 水果集散地及周边地区
D. 出口果蔬种植基地
【多选题】
传带有害杂草高风险的货物包括:_____。
A. 大豆
B. 玉米、高粱
C. 小麦、大麦
D. 油菜籽
【多选题】
有害杂草重点监测区域包括:_____。
A. 传带杂草高风险货物的进境港口
B. 传带杂草高风险货物的接卸码头、运输沿线
C. 传带杂草高风险货物的指定加工厂、仓库等周边地区
D. 进口矿砂堆场附近
【多选题】
苹果蠹蛾重点监测区域是:_____。
A. 苹果出口种植基地
B. 梨出口种植基地
C. 水果批发市场
D. 果汁加工厂周边地区
【多选题】
林木害虫重点监测区域包括:_____。
A. 具有进境木材的口岸
B. 大型进口木材集聚区
C. 大型进口木材集加工厂
D. 国际机场
【多选题】
针对来自亚洲型舞毒蛾疫区的船舶,____等国家发布了植物检疫措施法规。
A. 智利
B. 加拿大
C. 美国
D. 新西兰
【多选题】
____工作应在集装箱熏蒸前进行确认。
A. 箱体有无明显的破损或漏洞
B. 箱内货物是否适合熏蒸
C. 箱内货物有无不透气的包装材料
D. 集装箱门是否密封
【多选题】
集装箱熏蒸浓度检测点应位于____。
A. 箱门内上部
B. 箱中部
C. 箱内底部
D. 箱门口
【多选题】
集装箱熏蒸通风散气时,熏蒸人员戴好防毒面具,将集装箱门打开,并将通风孔的胶条去掉,应____。
A. 持续自然通风10h以上
B. 持续自然通风12h~24h
C. 采用机械通风4h以上
D. 采用机械通风6h以上
【多选题】
____属于热处理方式。
A. 蒸热处理
B. 干热处理
C. 微波处理
D. 电子束处理
【多选题】
冷处理导致昆虫死亡的具体原因有____。
A. 酶活性受到抑制
B. 代谢和生理失调
C. 细胞损伤
D. 窒息
【多选题】
冷处理主要包括____,处理方法的实施均需要先进的制冷设备。
A. 冷藏处理
B. 冷冻处理
C. 冷水处理
D. 冰水处理
【多选题】
《国际植物保护公约》认可的木质包装除害处理方式包括:_____。
A. HT-热处理
B. MB-溴甲烷熏蒸处理
C. DH-介电加热处理
D. SF-硫酰氟熏蒸处理
【多选题】
中国作为IPPC成员国可以:_____。
A. 推荐和建议中国关注的新标准题目或建议修订的标准及附件
B. 对国际植物检疫标准框架向IPPC反馈评议意见
C. 向IPPC提名专家参与专家工作组(EWG)和技术工作组(TP),具体起草标准
D. 参与ISPM标准草案的评议
【多选题】
IPPC制定一项国际植物检疫措施标准(ISPMs)的程序包括:_____。
A. 征集题目并制定 IPPC标准工作计划
B. 起草植物检疫措施标准草案
C. 标准草案征求成员国评议意见
D. 采纳、通过
【多选题】
IPPC各成员国向国际植物保护组织推荐植物检疫措施标准(ISPMs)议题可以包括:_____。
A. ISPMs新题目
B. 已有 ISPMs的附件修改
C. 新的植物检疫处理措施
D. 有害生物的新诊断技术
【多选题】
IPPC的工作包括:_____。
A. 制订国际植物检疫标准(ISPMs)
B. 向IPPC提供信息,并促进各成员间的信息交流
C. 通过FAO与各成员政府和其他组织合作提供技术援助
D. 促进国际植物检疫发展
【多选题】
中国对IPPC秘书处出台的国际标准,转化成中国标准采取的形式:_____。
A. 直接采用国际植物检疫措施标准
B. 等效采用国际植物检疫措施标准
C. 间接采用国际植物检疫措施标准
D. 国际植物检疫措施标准是自愿的,中国目前暂不采用国际标准
【多选题】
签证植物检疫官应具备相应的资质要求,至少包括____。
A. 专业背景
B. 工作经历
C. 工作能力
D. 行政职务
【多选题】
签证植物检疫官可签发____证书。
A. 植物源性饲料入境检验检疫证明
B. 出口木家具植物检疫证书
C. 进境水果熏蒸/消毒证书
D. 出口粮食植物检疫证书
【多选题】
出口美国栽培盆景,必须至少符合____。
A. 盆景必须在注册的温室或苗圃中生长两年
B. 培育盆景的温室或网室的所有通风口要有遮蔽物,且开口不超过1.6mm,所有入口必须安装双重自掩门
C. 栽培在只含无菌介质土的盆中
D. 栽培在高出地面至少50cm的工作台上
【多选题】
根据欧盟(2002/89/EC)法规,____植物出口欧盟,植物检疫证书的附加声明中必须声明特别条款。
A. 木瓜属Chaenomeles Lindl
B. 棕榈科Palmae
C. 苹果属Malus Mill
D. 菊属Dendranthema(DC.)Des Moul
【多选题】
_____属于输秘鲁苹果关注的检疫性有害生物。
A. 桃小食心虫(Carposina sasakii)
B. 李小食心虫(Grapholita funebrana)
C. 苹果小食心虫(Grapholita inopinata)
D. 梨小食心虫(Grapholitha molesta)
【多选题】
输阿根廷苹果包装箱标签上,应包括以下内容:_____。
A. Production place (province)
B. Orchard name or it's registered number
C. Packinghouse name or it's registered number
D. For the Argentine Republic
【多选题】
输澳货物的熏蒸/消毒证书,必须根据实际情况在证书的附加声明上注明____之一。
A. 该批货物中未使用塑料包裹
B. 该批货物在使用塑料包裹前实施熏蒸处理
C. 该批货物中使用的塑料包裹符合AQIS溴甲烷熏蒸标准中关于包裹和穿孔的规定
D. 该批货物不带有木质包装
【多选题】
植物检疫证书类型有:_____。
A. Phytosanitary Certificate
B. Phytosanitary Certificate for Re-export
C. Phytosanitary Certificate for Transit
D. Phytosanitary Certificate For Plant
【多选题】
对从事进出境植物检疫现场检查、植物检疫证书签发进行规定,签发植物检疫证书的人员应____。
A. 具备专业技能
B. 具备专业知识
C. 经过适当的培训
D. 无任何利益相关性
【多选题】
____,可以判断植物检疫证书无效。
A. 信息不完整或不正确的
B. 信息虚假或者误导的
C. 措辞或信息与标准植物检疫证书不一致
D. 信息由未经授权的人员填写的
【多选题】
海关可以在_____的旅客通道、行李提取处等现场进行检查。
A. 港口
B. 机场
C. 车站
D. 国内航班出口
【多选题】
对动植物性包装物、铺垫材料实施现场检疫,主要检查是否______,并按照规定采取样品。
A. 携带病虫害
B. 混藏杂草种子
C. 粘带土壤
D. 带有塑料薄膜
推荐试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.