相关试题
【单选题】
灭火救援组织指挥的程序是搜集掌握现场情况,确定总体作战方案,下达作战指令,并根据现场情况变化,适时 ___。
A. 启动灭火救援应急预案
B. 调集社会救援力量
C. 调整力量部署
D. 调整灭火救援对策
【单选题】
各类人员在消防二级网中联络时,应自觉遵守通规通纪,坚持___的原则。
A. 主台优先
B. 先发后叫
C. 先听后发
D. 指挥员优先
【单选题】
氯气___,随温度升高而(A)。
A. 能溶解于水,但溶解度不大 减少
B. 能溶解于水,溶解度比较大 增大
C. 易溶解于水 增大
D. 易溶解于水 减少
【单选题】
Ф19mm水枪,当其有效射程为17m时,流量为多少L/s。___
A. 4.6
B. 5.7
C. 6.5
D. 7.5
【单选题】
Ф19mm水枪,当其有效射程为15m时,流量为多少L/s。___
A. 4.6
B. 5.7
C. 6.5
D. 7.5
【单选题】
灭火救援业务训练的指导思想是___
A. 练为战
B. 缺什么,练什么
C. 实事求是
D. 精益求精
【单选题】
扑救地铁火灾,应选择___出入口进行内攻,快速疏散救人和灭火。
A. 上风
B. 紧急疏散
C. 安全
D. 多处
【单选题】
在扑救地铁火灾的过程中,应适时组织特勤力量,运用___等战术措施,深入内部,消灭火灾。
A. 堵截包围、强攻近战
B. 堵截包围、重点突破
C. 重点突破、穿插分割
D. 重点突破、强攻近战
【单选题】
在扑救地铁火灾过程中,要做好对遇难人员现场位置的标识工作,事后有助于___。
A. 火灾原因调查
B. 事故善后处理
C. 火灾对人员的伤害方式研究
D. 分析研究地铁火灾中乘客的逃生意识行为
【单选题】
地铁发生火灾时,列车如停在___位置,最易造成大量人员伤亡。
A. 地下车站
B. 隧道出口
C. 隧道区间
D. 地面轨道
【单选题】
金属钠、氢化钙、保险粉、碳化钙中下列物质中___遇水发生剧烈的化学反应,不经点火也会燃烧?
A. 氢化钙
B. 保险粉
C. 碳化钙
D. 硫磺
【单选题】
在可能发生爆炸、易燃易爆和毒害物质泄漏、建筑物倒塌等危险情况下救援时,必须进行检测和监测,应当尽量减少一线作业人员,并设立___,加强安全防护,留有机动力量。
A. 监督员
B. 巡视员
C. 安全员
D. 战斗员
【单选题】
扑救附设式地下车库火灾时,可充分利用地上建筑内消火栓出枪,从___直接进入车库,展开灭火行动。
A. 采光窗
B. 出口
C. 入口
D. 疏散楼梯通道
【单选题】
扑救油罐火灾时,泡沫液的准备量通常应达到一次进攻灭火用量的___倍。
【单选题】
室内火灾,随着惰性物质的增加,就可相对___空气中的氧浓度。
A. 增加
B. 减少
C. 先减少后增加
D. 先增加后减少
【单选题】
下列物质燃烧火焰显光并伴有黑烟的是___
【单选题】
有毒物质是指凡___进入人、畜体内,能与机体组织发生作用,破坏正常生理功能,引起机体暂时或永久性病理状态,甚至死亡的物质。
A. 大剂量
B. 微小剂量
C. 小剂量
D. 中等剂量
【单选题】
储存轻质油品的内浮顶储罐,在火场高温作用下,会使罐内油品何种膨胀,并蒸发出大量可燃气体,当内部压力超过罐的耐压强度时,便会使储罐发生___。
A. 物理爆炸
B. 化学爆炸
C. 核爆炸
D. 爆燃
【单选题】
固体可燃物必须经过___,固体上方可燃气体浓度达到燃烧极限,才能持续不断地发生燃烧。
A. 加热、通风、蒸发
B. 受热、蒸发、热分解
C. 受热、热分解
D. 热分解、蒸发
【单选题】
在火灾过程中,___是造成烟气向上蔓延的主要因素。
A. 烟囱效应
B. 火风压
C. 孔洞蔓延
D. 水平蔓延
【单选题】
燃烧的充分条件有___。
A. 可燃物、助燃物、着火源
B. 可燃物、助燃物、着火源、三者相互作用。
C. 一定的可燃物浓度、一定的氧气浓度、一定的着火能量
D. 一定的可燃物浓度、一定的氧气浓度、一定的着火能量、三者相互作用
【单选题】
处置大型化工装置、设施、油罐等事故,首先应要求___到场协助?
A. 事发单位的消防安全负责人
B. 事发单位的技术人员
C. 事发单位的管理人员
D. 事发单位的保安人员
【单选题】
扑救钢结构建筑火灾,必须对___部位进行冷却保护。
A. 顶棚
B. 墙壁
C. 承重结构
D. 疏散通道
【单选题】
热辐射是以___形式传递热量的。
A. 光波
B. 电磁波
C. 介质流动
D. 物体接触
【单选题】
为排除室内可燃气体,须破拆门窗时,应选择___方向门窗破拆,并防止产生火花引起可燃气体爆炸。
A. 下风向
B. 上风向
C. 下风向或侧风向
D. 上风向或侧风向
【单选题】
两个和两个以上方位同时向燃烧区域进攻属何种战术方法?___ 。
【单选题】
消防水池一般设置在室外,且与建筑物外墙之间的间距不小于___米。
A. 10
B. 11
C. 12
D. 15
【单选题】
疏散通道上的防火卷帘,在感烟探测器动作后,应下降至距地(楼)面___m。
A. 1.2
B. 1.5
C. 1.8
D. 2.0
【单选题】
排烟风机应能在280℃的环境条件下连续工作___min。
A. 10
B. 20
C. 30
D. 40
【单选题】
根据易燃液体储运特点和火灾危险性的大小,易燃液体分为甲、乙、丙三类。乙类是指___。
A. 闪点<28℃的液体
B. 28℃≤闪点<60℃的液体
C. 闪点≥60℃的液体
D. 闪点≥40℃的液体
【单选题】
《公安消防部队执勤战斗条令》规定,交接班时听到出动信号,由___人员负责出动。
A. 接班
B. 交班
C. 全体
D. 接班或交班
【单选题】
消防控制室应设在建筑物的___消防控制室门的上方应设标志牌或标志灯,消防控制室的门应有一定的耐火能力(即为甲级防火门),并应向疏散方向开启,应有安全出口。
A. 地下二层
B. 首层
C. 第二层
D. 最顶层
【单选题】
处置高速公路事故时,应在事故区域前、后方___处设置明显的警戒和事故标志?
A. 200米
B. 300米
C. 400米
D. 500米。
【单选题】
液化石油气与空气混合后,形成爆炸性气体珠爆炸极限范围是___。
A. 1.5%~10%
B. 2.5%~10%
C. 3.5%~10%
D. 4.5%~10%
【单选题】
医院火灾的特点是___。
A. 建筑耐火等级低
B. 楼层层数多
C. 人员疏散任务重,难度大
D. 楼层之间相互贯通
【单选题】
扑救带电设备、线路火灾时,必须断电灭火,具体断电的方法是在切断用磁力开关启动的带电设备时,应先关闭___,然后再断开闸刀。
A. 磁力开关
B. 主开关
C. 设备电源
D. 闸阀开关
【单选题】
辖区执勤力量分布图除应标明辖区消防部队和企事业专职消防队的位置外,还应标明___情况。
A. 企事业单位概况
B. 执勤人数及消防装备
C. 道路情况
D. 建筑情况
【单选题】
爆炸品系指在外界作用下(如受热、撞击等),能发生剧烈的化学反应,瞬时产生大量气体和___,导致周围压力急剧上升,发生爆炸,从而对周围环境造成破坏的物品。
【单选题】
氰化钠、氰化钙、氢氰酸等,这类毒害品,本身都不燃,但遇高热、___或水蒸气时都能分解放出剧毒易燃的氰化氢气体。
A. 酸
B. 碱
C. 有机物
D. 二氧化碳
推荐试题
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection