刷题
导入试题
【判断题】
电影院内吸烟室应设有火灾自动报警装置
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
电影院内吸烟室不应设有机械排风设施
A. 对
B. 错
【判断题】
电影院室内消火栓不宜设在门厅主要出入口和楼梯间附近以及放映机房入口处等明显位置
A. 对
B. 错
【判断题】
电影院室内消火栓宜设在休息厅主要出入口和楼梯间附近以及放映机房入口处等明显位置
A. 对
B. 错
【判断题】
电影院室内消火栓不宜设在观众厅主要出入口和楼梯间附近以及放映机房入口处等明显位置
A. 对
B. 错
【判断题】
《纺织工业企业安全管理规范》(AQ 7002—2007)规定,化纤专用生产设备现场应严格落实二硫化碳防火防爆的安全管理
A. 对
B. 错
【判断题】
《纺织工业企业安全管理规范》(AQ 7002—2007)规定,浆纱设备上的安全阀、压力表等安全附件,必须齐全、有效,定期检测,合格使用
A. 对
B. 错
【判断题】
纺织工业企业浆纱和浆纱烘箱设备内及潮湿处的电气装置、工作照明等不可采用防水灯具
A. 对
B. 错
【判断题】
纺织工业企业贮存腐蚀性管道的管口必须防腐、加盖、上锁,安全标志应齐全、醒目
A. 对
B. 错
【判断题】
纺织工业企业绢纺织的烘燥机烘房照明、浆纱机烘房照明等都应采用安全电压及防水防潮灯具
A. 对
B. 错
【判断题】
纺织工业企业各剪切工、冲压工和其他有关从业人员工作时不得穿拖鞋
A. 对
B. 错
【判断题】
《纺织工业企业安全管理规范》(AQ 7002—2007)规定,通用设备操作工和其他有关从业人员必须自觉遵守防火、禁烟规章制度
A. 对
B. 错
【判断题】
高层旅馆的客房内应配备应急手电筒、防烟面具等逃生器材及相应使用说明
A. 对
B. 错
【判断题】
北京市餐饮经营单位应当设置能够覆盖全部营业区域的应急广播,并能够使用中英文两种语言播放
A. 对
B. 错
【判断题】
集体用餐配送单位不纳入餐饮服务许可管理的范围
A. 对
B. 错
【判断题】
北京市家具企业产生粉尘、毒物的生产设备,应优先采用机械化和自动化,加强密闭,避免直接操作
A. 对
B. 错
【判断题】
北京市木制家具企业应在涂胶、擦色、调漆、手工涂漆、晾漆等作业场所设置通风装置,不用划定作业区域
A. 对
B. 错
【判断题】
北京市家具企业涂装作业开始时应先开风机,后启动涂装设备,作业结束时应先关闭风机,后关闭涂装设备
A. 对
B. 错
【判断题】
家具生产企业应定期对安全生产目标和指标的执行情况进行监测和考核
A. 对
B. 错
【判断题】
北京市利用地下空间从事商业、文化娱乐业、旅店业以及其他生产经营活动的,应当具有防汛、防雨水倒灌设施
A. 对
B. 错
【判断题】
北京市生产经营单位实施有限空间作业前和作业过程中,可以用纯氧进行通风换气
A. 对
B. 错
【判断题】
北京市地下有限空间作业现场监护人员必须经专门的安全技术培训,取得特种作业操作资格证书,方可上岗作业
A. 对
B. 错
【判断题】
北京市生产经营单位应在污水井(池)、化粪池、电力井、燃气井、热力井、电信井、地下室、沼气池、密闭垃圾站等有限空间作业现场设置警示标志
A. 对
B. 错
【判断题】
《地下有限空间作业安全技术规范 第1部分:通则》(DB11/ 852.1—2012)规定,北京市地下有限空间作业负责人应确认作业环境、作业程序、安全防护设备、个体防护装备及应急救援设备符合要求后,方可安排作业者进入地下有限空间作业
A. 对
B. 错
【判断题】
根据《地下有限空间作业安全技术规范 第1部分:通则》(DB11/ 852.1—2012),地下有限空间作业完成后,作业者应将重要工具带离地下有限空间
A. 对
B. 错
【判断题】
“当心缺氧、注意通风”警示语句可用于冷藏箱、管道等有限空间
A. 对
B. 错
【判断题】
“当心缺氧、注意通风”警示语句不可用于储藏室、温室、冷库等有限空间
A. 对
B. 错
【判断题】
北京市锅炉使用单位安全运行操作规程包括设备的主要额定参数及运行参数、正常运行中运行参数的控制、设备的正常及紧急停车步骤与方法等,不包括事故判断与处理
A. 对
B. 错
【判断题】
北京市锅炉使用单位定期检修制度包括锅炉检修规程、水泵检修规程、风机检修规程和水处理设备检修规程
A. 对
B. 错
【判断题】
北京市锅炉使用单位锅炉安全技术档案不包括检验机构的内部检验、外部检验及水压试验检验报告
A. 对
B. 错
【判断题】
根据《锅炉房设计规范》(GB 50041—2008),地下水位高或年降雨量较大的情况下不宜采用架空敷设
A. 对
B. 错
【判断题】
根据《锅炉房设计规范》(GB 50041—2008),地形复杂或有河沟、岩层、溶洞等特殊障碍的情况下不宜采用架空敷设
A. 对
B. 错
【判断题】
燃气锅炉的选择,应根据气体燃料的物性、布置特点等因素确定
A. 对
B. 错
【判断题】
火车运煤时,锅炉房煤场应采用机械化方式卸煤
A. 对
B. 错
【判断题】
船舶运煤时,锅炉房煤场应采用自卸汽车或人工卸煤
A. 对
B. 错
【判断题】
汽车运煤时,锅炉房煤场应采用机械抓取设备卸煤
A. 对
B. 错
【判断题】
《锅炉房设计规范》(GB 50041—2008)规定,减压减温装置不宜设置蒸汽压力自动调节装置
A. 对
B. 错
【判断题】
城镇燃气加臭剂和燃气混合在一起后不应带有特殊的臭味
A. 对
B. 错
【判断题】
《城镇燃气设计规范》(GB 50028—2006)规定,每四座焦炉宜设置1个焦台
A. 对
B. 错
【判断题】
在燃气的供应与使用过程中,禁止倒灌瓶装液化石油气
A. 对
B. 错
【判断题】
在燃气的供应与使用过程中,可以将燃气管道作为负重支架或者电器设备的接地导线
A. 对
B. 错
推荐试题
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用