刷题
导入试题
【多选题】
依据《云南电网有限责任公司安全监督管理办法》,安全风险分层指按照___层级对风险进行管控。
A. 公司
B. 地市级单位
C. 所队(分局)
D. 班组
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCD
解析
暂无解析
相关试题
【多选题】
依据《云南电网有限责任公司安全监督管理办法》,安全检查分为___三类。
A. 专项巡查
B. 例行检查
C. 专项检查
D. 安全督查
【多选题】
依据《道路交通安全法》,当事人逾期不履行行政处罚决定的,作出行政处罚决定的行政机关可以采取下列措施:___。
A. 到期不缴纳罚款的,每日按罚款数额的百分之三加处罚款
B. 申请人民法院强制执行
C. 收缴当事人的机动车
【多选题】
依据《中央企业安全生产禁令》,严禁___组织生产。
A. 超能力
B. 超强度
C. 超工期
D. 超定员
【多选题】
依据《云南电网有限责任公司安全监督管理办法》,现场检查发现的各类违章现象必须立即制止和纠正,现场暂不能整改的,应向受检单位(部门)反馈检查情况,监督其制定整改计划并报送检查组织部门。检查发现的问题由各责任单位(部门)负责按照“五落实”的原则进行整改并定期报送检查组织部门备案。“五落实”是指落实___。
A. 整改措施
B. 资金物资
C. 责任部门和人员
D. 完成期限
E. 控制措施
F. 应急预案
【多选题】
有效预防机动车发生制动失效的措施是___?
A. 行车前检查制动液是否有滴漏
B. 定期维护制动系统
C. 行车前检查制动踏板的自由行程
D. 正确使用制动,防止热衰退
【多选题】
驾驶汽车在道路上临时停车怎样选择停车路段和地点?___
A. 不妨碍交通
B. 路面平坦坚实
C. 无禁止停车标志
D. 可以随意停放
【多选题】
依据《云南电网有限责任公司安全监督管理办法》,各单位生产所队(分局)是各自职责范围内安全监督管理工作的实施主体,负责按照上级安全管理要求,根据本单位安全监督管理机制,结合自身实际开展安全监督管理工作,确保安全风险“___”。
A. 可控
B. 可行
C. 可调
D. 在控
E. 在查
【多选题】
依据《道路交通安全法》,对道路交通安全违法行为的处罚种类包括:___。
A. 警告
B. 罚款
C. 暂扣机动车驾驶证
D. 吊销机动车驾驶证
E. 拘留
【多选题】
依据《中国南方电网有限责任公司安全生产禁令》,严禁___、(B )、( C )和调度纪律。
A. 违章指挥
B. 违章作业
C. 违反劳动纪律
D. 违反政治纪律
【多选题】
依据《中国南方电网有限责任公司安全生产令》,按定员配备生产人员,严禁___、( B )、( C)的人员从事作业。
A. 未经培训
B. 未经考试合格
C. 未按规定持证
D. 未进行注册
E. 未经体检
【多选题】
依据《中央企业安全生产禁令》,严禁___。
A. 违章指挥
B. 违章作业
C. 违反政治纪律
D. 违反劳动纪律
【多选题】
依据《中国南方电网有限责任公司电力安全工作规程》,工作现场,工作负责人安排作业人员使用已损坏的安全带或安排冒险作业此时作业人员应该怎么办才是正确的:___
A. 拒绝违章作业,拒绝强令冒险作业
B. 任何现场的员工都可以制止违章行为
C. 听工作负责人的安排
D. 有权停止作业或采取可行的应急措施后撤离作业场所,并立即报告。
【多选题】
依据《中华人民共和国安全生产法》,安全生产工作应当以人为本,坚持安全发展,坚持___的方针。
A. 安全第一
B. 预防为主
C. 综合治理
D. 平安健康
【多选题】
依据《中国南方电网有限责任公司电力安全工作规程》,作业人员应接受相应的___,经考试合格上岗。
A. 安全生产教育
B. 岗位技能培训
C. 财务知识教育
D. 驾驶技能培训
【多选题】
依据《中国南方电网有限责任公司安全生产令》,加强作业过程安全管控,严禁___、( C )和(D ),杜绝人身死亡事故。
A. 无票工作
B. 违章指挥
C. 违章作业
D. 违反劳动纪律
【多选题】
依据《中央企业安全生产禁令》,严禁___生产安全事故。
A. 迟报
B. 漏报
C. 谎报
D. 瞒报
E. 越级上报
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,不应采用缠绕的方法进行接地或短路。接地线应使用专用的线夹固定在导体上
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,起重作业时,作业人员可以利用吊钩来上升或下降
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,单人操作时,可以进行登高或登杆操作
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,起重作业使用开门滑车时,应将开门勾环扣紧,防止绳索自动跑出
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,在封闭压力钢管、蜗壳、尾水管人孔前,检修工作负责人应先检查里面确无人员和物件遗留在内。在封闭蜗壳人孔时还需再进行一次检查后,立即封闭
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,工作票面上,在某设备左侧装设一组三项短路接地线,到现场才发现,左侧装会影响工作。工作负责人随即让装设在右侧
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,登杆塔、台架作业时,应核对线路名称、杆塔号及位置
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,换流站内换流变压器高压试验前,应通知阀厅内换流变压器套管侧试验无关人员撤离,并派专人监护
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,放线、紧线与撤线时,应采取措施,防止导(地)线由于摆(跳)动或其他原因而与带电导线间的距离不符合安全距离
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,施工机具应按出厂说明书、铭牌和相关标准的规定测试、试运转和使用,在特殊情况下可以超负荷使用
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,对高压直流线路和330kV及以上的交流线路,可使用合格的带金属部分的绝缘棒或专用的绝缘绳验电。验电时,绝缘棒的验电部分应逐渐接近导线,根据有无放电声和火花的方式,判断线路是否有电
A. 对
B. 错
【判断题】
依据《中国南方电网有限责任公司电力安全工作规程》,飞车行驶中遇有接续管时应减速
A. 对
B. 错
【判断题】
依据《道路交通安全法》,交通信号灯由红灯、绿灯、黄灯组成。红灯表示禁止通行,绿灯表示准许通行,黄灯表示须快速通行
A. 对
B. 错
【判断题】
在道路上跟车行驶时,跟车距离不是主要的,只须保持与前车相等的速度,即可防止发生追尾事故
A. 对
B. 错
【判断题】
初次申领的机动车驾驶证的有效期为4年
A. 对
B. 错
【判断题】
行车中要文明驾驶,礼让行车,做到不开英雄车、冒险车、赌气车和带病车
A. 对
B. 错
【判断题】
依据《道路交通安全法》,遇有自然灾害、恶劣气象条件或者重大交通事故等严重影响交通安全的情形,采取其他措施难以保证交通安全时,公安机关交通管理部门可以实行交通管制
A. 对
B. 错
【判断题】
依据《道路交通安全法》,达到报废标准的机动车不得上道路行驶。报废的大型客、货车及其他营运车辆应当在公安机关交通管理部门的监督下解体
A. 对
B. 错
【判断题】
依据《道路交通安全法》,机动车驾驶人不在现场或者虽在现场但拒绝立即驶离,妨碍其他车辆、行人通行的,处二十元以上二百元以下罚款,并可以将该机动车拖移至不妨碍交通的地点或者公安机关交通管理部门指定的地点停放
A. 对
B. 错
【判断题】
依据《道路交通安全法》,机动车应当在规定地点停放。禁止在人行道上停放机动车;在道路上临时停车的,不得妨碍其他车辆和行人通行
A. 对
B. 错
【判断题】
依据《云南电网有限责任公司安全生产领域监督问责业务指导书》,对组织的问责形式包含“约谈”、“说清楚”、“通报批评”、“中断安全记录”、“调降安全生产风险管理体系认证等级”、“组织安全生产绩效考核”、“黄牌”处罚、“红牌”处罚、生产安全状态预警
A. 对
B. 错
【判断题】
依据《道路交通安全法》,非机动车应当在规定地点停放。未设停放地点的,非机动车停放可以妨碍其他车辆和行人通行
A. 对
B. 错
【判断题】
依据《云南电网有限责任公司安全监督管理办法》,安全监督管理工作应遵循“闭环管理”原则。安全监督管理工作要覆盖安全生产全过程,围绕“事前、事中、事后”三个环节全面开展,实现PDCA闭环管理,促进安全生产工作持续改进
A. 对
B. 错
【判断题】
依据《云南电网有限责任公司安全监督管理办法》,各级专业部门是本专业范围内安全监督管理工作的责任主体,按照“管业务必须管安全”的原则,按照各级安全监督管理机制,结合本单位实际开展本专业安全监督管理工作,确保本专业安全生产管理要求和决策部署的有效执行
A. 对
B. 错
推荐试题
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用