【判断题】
公安派出所承办的案情重大、复杂的案件,需要延长办案期限的,应当报所属县级以上公安机关负责人批准。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
甲晚上看到一老人手上提一个包(内有现金1500元)独自行走,冲上去一把夺过包就跑,由于用力过猛,将老人带倒在地,老人摔成重伤。对甲应当以故意伤害罪从重处罚。
A. 对
B. 错
【判断题】
张某、王某二人发现刘某一人独自行走,拿一手提包(内有现金等贵重物品,价值5000余元),遂尾随其后,蓄谋行抢。当刘某走到一无人拐角处时,张某乘刘某不备从刘某背后用双手将其抱住,王某乘机将刘某手中提包抢走。张某、王某构成抢夺罪。
A. 对
B. 错
【判断题】
广告主、广告经营者、广告发布者违反国家规定,利用广告对保健食品或者其他食品作虚假宣传,情节严重的,以虚假广告罪定罪处罚。
A. 对
B. 错
【判断题】
追诉期限从犯罪之日起计算;犯罪行为有连续或者继续状态的,从犯罪行为终了之日起计算。
A. 对
B. 错
【判断题】
李某3月29日受到罚款处罚,3月31日收到治安管理处罚决定书。李某应在4月13日前到指定的银行缴纳罚款。
A. 对
B. 错
【判断题】
400、对于办理刑事案件中扣押的财物、文件,经查明确实与案件无关的,应当在5日以内解除扣押,退还原主。
A. 对
B. 错
【判断题】
甲知道乙租用自己的房子是生产假药而将房屋出租给乙使用,甲与乙构成生产假药罪的共犯。
A. 对
B. 错
【判断题】
(17年新增试题)只要行为人以言语宣称系军警人员,即使未携带枪支、未出示军警证件而实施抢劫,也应当认定为"冒充军警人员抢劫"。
A. 对
B. 错
【判断题】
紧急情况下,公安机关的人民警察可以优先使用公共交通工具,但使用私人交通工具必须事先征得个人同意。
A. 对
B. 错
【判断题】
甲男与乙女发生纠纷,乙将脏物泼在甲的身上,甲便揪住乙的上衣,并向乙的下身猛击几拳;乙骂声不止,甲便唤来自家豢养的大公狗,在有许多村民围观的情况下,扒下乙的裤子,使其当众赤裸身体,并叫狗扑在乙的身上。甲的行为构成侮辱罪。
A. 对
B. 错
【判断题】
甲因与乙有矛盾,看到对方的白色宝马轿车停靠在路边,将其轿车右侧后视镜踢坏(车辆损失价值1万元左右),甲的行为构成故意毁坏财物罪。
A. 对
B. 错
【判断题】
治安案件有被侵害人的,公安机关应当将行政处罚决定书原件送达被侵害人。
A. 对
B. 错
【判断题】
民警小王将违法嫌疑人甲传唤至公安机关,由于甲才15周岁,小王通知甲的父亲到场后才开始对甲进行询问。
A. 对
B. 错
【判断题】
某区公安分局依法对李某作出行政拘留5日的行政处罚,该行政处罚决定书应当由作出处罚决定的人民警察签名并盖章。
A. 对
B. 错
【判断题】
某加油站内,一名情绪激动的男子一手拖拽着一名女子,一手挥舞着打火机,欲与女子同归于尽,现场民警反复劝说,缓解男子的情绪,最终,使用高压水枪将男子控制住。男子以危险物品相威胁实施犯罪,属于严重危害公共安全的紧急情形,民警应立即开枪击毙该男子,不应用高压水枪。
A. 对
B. 错
【判断题】
公平正义是社会主义法治的价值追求。
A. 对
B. 错
【判断题】
对适用调解程序达成协议并已履行的行政案件,应当予以结案。
A. 对
B. 错
【判断题】
李某因涉嫌盗窃被传唤至公安机关接受询问,李某拒不承认实施了盗窃行为,办案民警A对李某说:"如果不承认就拘留你,如果承认了态度好,可以不处理你。"李某听到此话后,承认了自己的盗窃行为。由于该案只有对李某的一份询问笔录,无其他证据,该笔录可以作为处罚的根据。
A. 对
B. 错
【判断题】
根据《公安机关办理行政案件程序规定》的规定,公安机关询问违法嫌疑人李某,可以到李某所在的单位进行。
A. 对
B. 错
【判断题】
买卖居民身份证的,构成买卖身份证件罪。
A. 对
B. 错
【判断题】
只要犯罪嫌疑人在取保候审期间擅自外出或毁灭、伪造证据的,一律没收其全部保证金。
A. 对
B. 错
【判断题】
李某与王某因宅基地一事发生纠纷,李某将王某建房所用的20余块红砖损毁,公安机关接到报案后,经双方当事人同意,公安机关进行了调解处理。
A. 对
B. 错
【判断题】
甲在某银行营业厅趁顾客乙不备,抓起乙放在柜台上装有现金的信封后逃跑,被保安当场抓住,审查中发现甲腰间别有匕首一把。甲的行为构成抢劫罪。
A. 对
B. 错
【判断题】
对与犯罪有关的人身进行检查,只能由侦查人员进行。检查的情况应当写成笔录,由参加检查的人和被检查人签名或者盖章。
A. 对
B. 错
【判断题】
暂缓执行行政拘留的担保人在暂缓执行行政拘留期间,不愿继续担保或者丧失担保条件的,应当责令被处罚人重新提出担保人或者交纳保证金。
A. 对
B. 错
【判断题】
甲被判处有期徒刑和管制,有期徒刑执行完毕后,管制无须再执行。
A. 对
B. 错
【判断题】
在办理行政案件中,查封、扣押的期间不包括检测、检验、检疫或者技术鉴定的期间。
A. 对
B. 错
【判断题】
刘某因殴打他人被甲县公安局处罚款500元。刘某逾期未交纳罚款,加处罚款30日后经催告仍不履行,经甲县公安局长批准,甲县公安局可以强制执行。
A. 对
B. 错
【判断题】
控告人甲对A地公安机关不予立案决定不服,可以在收到不予立案通知书后7日以内向A地公安机关申请复议。
A. 对
B. 错
【判断题】
管理国籍事务,是公安机关人民警察的法定职责。
A. 对
B. 错
【判断题】
被处罚人确有经济困难,经被处罚人申请和作出行政处罚决定的公安机关批准,可以免缴罚款。
A. 对
B. 错
【判断题】
某农户非法种植大麻近1亩,被村民举报,公安机关在强制铲除时该农户抗拒铲除,对该农户应以非法种植毒品原植物罪和妨害公务罪数罪并罚。
A. 对
B. 错
【判断题】
法定最高刑为无期徒刑的,经过15年不再追诉。
A. 对
B. 错
【判断题】
为了防止被监视居住的犯罪嫌疑人甲脱逃,办案部门可以直接扣押其持有的身份证件和驾驶证件。
A. 对
B. 错
【判断题】
人民警察抓获违法犯罪分子或者犯罪重大嫌疑人时,可以使用警棍、手铐、脚镣等约束性警械。
A. 对
B. 错
【判断题】
甲经乙(17周岁)同意,以5万元的价格摘取了乙的肾脏1只。甲的行为构成组织出卖人体器官罪。
A. 对
B. 错
【判断题】
15周岁的刘某教唆17周岁的胡某对其邻居实施强奸,结果胡某到其邻居家后没有实施强奸行为,但实施了盗窃行为,则刘某不构成犯罪。
A. 对
B. 错
【判断题】
在道路上驾驶机动车追逐竞驶,情节恶劣的,构成危险驾驶罪。
A. 对
B. 错
【判断题】
依法治国的核心是确立和实现以宪法和法律为治国的最具权威的标准。
A. 对
B. 错
【判断题】
甲意图杀死其妻,某日误将碱面当砒霜投放在其妻将要吃的饭中,其妻吃后安然无事。甲的行为属于犯罪未遂。
A. 对
B. 错
推荐试题
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5