刷题
导入试题
【多选题】
扑救钢结构建筑火灾,内攻作战行动困难重重原因___。
A. 室内通信联络不畅
B. 浓烟积聚,辐射热强
C. 钢构件易变形倒塌的潜在威胁
D. 火场环境较为复杂
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCD
解析
暂无解析
相关试题
【多选题】
由于公共危机具有突发性和紧急性、高度不确定性、影响的社会性和决策的非程序化等特点,相应的应急救援也具有哪些特点?___
A. 反应快速、处置高效
B. 处置难度大、技术要求高
C. 全力减少社会影响
D. 决策果断,处置准确
【多选题】
火灾情况下建筑倒塌事故特点?___
A. 事故发生突然,难以预防。
B. 事故危害加剧。
C. 救援行动艰难。
D. 事故发生突然,正在紧张施工的人员难以预防瞬间发生的灾害。
【多选题】
危险化学品泄漏事故,对泄漏的气体进行检测包括?___
A. 检测的内容主要检测气体泄漏的物质,什么物品泄漏;
B. 泄漏的数量
C. 泄露的部位。
D. 泄漏的范围。
【多选题】
交通事故救援主要采用的器材装备主要有?___
A. 玻璃破碎器、
B. 绝缘剪短钳
C. 机动链锯
D. 液压扩张器
【多选题】
一般列车相撞事故,应按出动计划迅速调派___进行救援。
A. 辖区中队
B. 特勤中队
C. 城市特勤大队
D. 跨区域特勤力量
【多选题】
公路、铁路隧道事故包括?___
A. 火灾
B. 脱轨
C. 相撞
D. 隧道垮塌
【多选题】
地质灾害主要以什么形式出现?___
A. 堰塞湖
B. 泥石流
C. 山体滑坡
D. 塌方
【多选题】
山体滑坡成因复杂,一般是由环境恶化、___等因素造成的。
A. 地壳运动
B. 水土流失
C. 大量降雨
D. 人为破坏
【多选题】
遇___的高空救援,首先通知待救者的亲人和相关人员及时到达现场,协同救援人员,说服待救者放弃轻生的念头。
A. 自杀倾向
B. 精神不正常
C. 债务纠纷人员
D. 高空作业人员
【多选题】
处置沼气事故时,要查明沼气池的___等情况。
A. 挖掘时间
B. 形状、
C. 大小、
D. 深度
【多选题】
恐怖袭击事件主要表现方式是___,还有纵火、绑架、暗杀、破坏等。
A. 投毒
B. 枪击
C. 爆炸
D. 飞行器撞击
【多选题】
我国在化学品___、废弃等过程中,发生的化学灾害事故突出。
A. 生产
B. 运输
C. 储存
D. 使用
【多选题】
与地震灾害事故救援的基本相同,建筑物坍塌救援的方法则更加具体化,主要包括___
A. 隧道救助法
B. 战壕救助法
C. 穿墙救助法
D. 支架救助法
【多选题】
地面建筑物坍塌事故发生时,按照出动计划和预案迅速调出___,并根据现场情况和上级消防部门指示调派增援力量。
A. 辖区中队
B. 特勤中队
C. 邻近中队
D. 特勤大队
【多选题】
处置地下建筑物坍塌时,需要了解___
A. 坍塌建筑的布局、层数、面积、使用性质
B. 坍塌部位的结构情况
C. 是否有燃气或水管断裂泄漏
D. 地面道路交通情况
【多选题】
危险化学品泄漏事故主要有___
A. 易燃易爆气体泄漏
B. 毒害性气体泄漏
C. 易燃可燃液体泄漏
D. 毒害性、腐蚀性液体泄漏
【多选题】
易燃液体泄露的事故特点___
A. 易发生爆炸燃烧事故
B. 扩散范围广
C. 造成人员中毒伤亡
D. 污染环境,不易洗消
【多选题】
对氯气进行稀释,不宜采用___。
A. 水雾
B. 惰性气体
C. 水幕
D. 直流水
【多选题】
液化石油气泄露处置程序和措施包括___
A. 稀释防爆
B. 关阀堵漏
C. 输转倒罐
D. 主动点燃
【多选题】
地震灾害发生时,进行生命救助,通过问、判、测、___等方法,利用生命探测仪、搜救犬等装备,确定被埋人员数量和具体位置。
A. 听
B. 喊
C. 嗅
D. 寻
【多选题】
预案制定的范围包括___
A. 人员密集场所
B. 危险化学品单位
C. 高层公共建筑
D. 重要机关和单位
【多选题】
抢险救援预案的主要内容包括:灾情设定、危害特性、___等。
A. 力量调集
B. 处置程序和方法
C. 注意事项
D. 战斗保障
【多选题】
数字化预案编制的原则包括___
A. 详尽具体,结构完整
B. 信息准确,数据标准
C. 易于操作,规范有序
D. 高效实用,便于更新
【多选题】
通常火场供水消防车主要___。
A. 火场供水战斗车
B. 火场运水车
C. 火场串联(接力)供水车
D. 火场机动(备用)供水车
【多选题】
泡沫枪(炮)是扑救可燃液体火灾最常用的灭火剂喷射器具,主要包括___等。
A. 空气泡沫管枪
B. 泡沫钩枪
C. 泡沫炮
D. 泡沫产生器
【单选题】
哲学的基本问题是___
A. 社会和自然的关系问题
B. 思维与存在的关系问题
C. 政治和经济的关系问题
D. 实践和理论的关系问题
【单选题】
下列观点属于主观唯心主义的是___
A. 心外无物,心外无理
B. 理在气中,理随事变
C. 富贵在天,死生由命
D. 理在事先,事随理变
【单选题】
时间和空间___
A. 同物质运动无关
B. 是一种先验的形式
C. 是运动着的物质本身
D. 是运动着的物质的存在方式
【单选题】
清政府正式废除科举考试是在___年
A. 1898
B. 1900
C. 1906
D. 1908
【单选题】
灭火防护服使用年限一般为15年。___
A. 正确
B. 错误
【单选题】
灭火防护服洗涤过程中水温不可高于35℃。___
A. 正确
B. 错误
【单选题】
空气呼吸器使用前气瓶压力不能低于15 Mpa。___
A. 正确
B. 错误
【单选题】
空气呼吸器使用前气瓶压力不能低于25Mpa。___
A. 正确
B. 错误
【单选题】
空气呼吸器最高工作压力为60MPa。___
A. 正确
B. 错误
【单选题】
空气呼吸器警报器报警压力为15MPa。___
A. 正确
B. 错误
【单选题】
在狭小空间长时间作业,当无法使用个人携带式空气呼吸器时,应使用移动式供气源。___
A. 正确
B. 错误
【单选题】
正压式空气呼吸器工作时整机内部压力高于大气压。___
A. 正确
B. 错误
【单选题】
抢险救援事故现场有易燃易爆气体或有毒有害物质扩散时,消防车要选择上风方向或侧上风方向的适当位置停靠,使用下风方向的水源;在扩散区上风、侧上风方向选择进攻路线接近扩散区。___
A. 正确
B. 错误
【单选题】
高层建筑火灾对密闭房间进行排烟时,应迅速开启排烟口,并用大量开花水枪掩护,防止发生轰燃。___
A. 正确
B. 错误
【单选题】
室外消火栓应沿着道路布置,宽度超过60m的道路,为避免水带穿越道路影响交通或被车辆轧压,宜将消火栓在道路两侧布置,为方便使用,十字路口应设有消火栓。___
A. 正确
B. 错误
推荐试题
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用