刷题
导入试题
【判断题】
《中华人民共和国安全生产法》第二十七条规定:生产经营单位的特种作业人员必须按照国家有关规定经专门的安全作业培训,取得相应资格,方可上岗作业
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
企业、事业单位的职工无特种作业操作证从事特种作业,属违章作业
A. 对
B. 错
【判断题】
特种作业操作证每1年由考核发证部门复审一次
A. 对
B. 错
【判断题】
“止步,高压危险”的标志牌的式样是白底、红边,有红色箭头
A. 对
B. 错
【判断题】
试验对地电压为50V以上的带电设备时,氖泡式低压验电器就应显示有电
A. 对
B. 错
【判断题】
常用绝缘安全防护用具有绝缘手套、绝缘靴、绝缘隔板、绝缘垫、绝缘站台等
A. 对
B. 错
【判断题】
在安全色标中用绿色表示安全、通过、允许、工作
A. 对
B. 错
【判断题】
幼儿园及小学等儿童活动场所插座安装高度不宜小于1.8m
A. 对
B. 错
【判断题】
在带电维修线路时,应站在绝缘垫上
A. 对
B. 错
【判断题】
为了安全可靠,所有开关均应同时控制相线和零线
A. 对
B. 错
【判断题】
漏电开关跳闸后,允许采用分路停电再送电的方式检查线路
A. 对
B. 错
【判断题】
为了有明显区别,并列安装的同型号开关应不同高度,错落有致
A. 对
B. 错
【判断题】
民用住宅严禁装设床头开关
A. 对
B. 错
【判断题】
使用手持式电动工具应当检查电源开关是否失灵、是否破损、是否牢固、接线是否松动
A. 对
B. 错
【判断题】
移动电气设备可以参考手持电动工具的有关要求进行使用
A. 对
B. 错
【判断题】
手持式电动工具接线可以随意加长
A. 对
B. 错
【判断题】
一号电工刀比二号电工刀的刀柄长度长
A. 对
B. 错
【判断题】
导线接头位置应尽量在绝缘子固定处,以方便统一扎线
A. 对
B. 错
【判断题】
吸收比是用兆欧表测定
A. 对
B. 错
【判断题】
在我国,超高压送电线路基本上是架空敷设
A. 对
B. 错
【判断题】
电缆保护层的作用是保护电缆
A. 对
B. 错
【判断题】
为了安全,高压线路通常采用绝缘导线
A. 对
B. 错
【判断题】
10kV以下运行的阀型避雷器的绝缘电阻应每年测量一次
A. 对
B. 错
【判断题】
对于容易产生静电的场所,应保持地面潮湿,或者铺设导电性能较好的地板
A. 对
B. 错
【判断题】
除独立避雷针之外,在接地电阻满足要求的前提下,防雷接地装置可以和其他接地装置共用
A. 对
B. 错
【判断题】
雷电时,应禁止在屋外高空检修、试验和屋内验电等作业
A. 对
B. 错
【判断题】
正弦交流电的周期与角频率的关系互为倒数的
A. 对
B. 错
【判断题】
二极管只要工作在反向击穿区,一定会被击穿
A. 对
B. 错
【判断题】
电流和磁场密不可分,磁场总是伴随着电流而存在,而电流永远被磁场所包围
A. 对
B. 错
【判断题】
在三相交流电路中,负载为三角形接法时,其相电压等于三相电源的线电压
A. 对
B. 错
【判断题】
并联电路的总电压等于各支路电压之和
A. 对
B. 错
【判断题】
在串联电路中,电流处处相等
A. 对
B. 错
【判断题】
对绕线型异步电机应经常检查电刷与集电环的接触及电刷的磨损,压力,火花等情况
A. 对
B. 错
【判断题】
改变转子电阻调速这种方法只适用于绕线式异步电动机
A. 对
B. 错
【判断题】
能耗制动这种方法是将转子的动能转化为电能,并消耗在转子回路的电阻上
A. 对
B. 错
【判断题】
转子串频敏变阻器启动的转矩大,适合重载启动
A. 对
B. 错
【判断题】
交流电动机铭牌上的频率是此电机使用的交流电源的频率
A. 对
B. 错
【判断题】
电气控制系统图包括电气原理图和电气安装图
A. 对
B. 错
【判断题】
使用改变磁极对数来调速的电机一般都是绕线型转子电动机
A. 对
B. 错
【判断题】
剩余动作电流小于或等于0.3A的RCD属于高灵敏度RCD
A. 对
B. 错
【判断题】
RCD的选择,必须考虑用电设备和电路正常泄漏电流的影响
A. 对
B. 错
推荐试题
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用