【单选题】
工作票由设备运维管理单位签发,也可由经设备运维管理单位审核合格且经批准的___签发。
A. 调度部门;
B. 设计单位;
C. 检修及基建单位;
D. 设备厂商
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
承发包工程中,工作票可实行“双签发”形式。签发工作票时,___工作票签发人在工作票上分别签名,各自承担《安规》工作票签发人相应的安全责任。
A. 设备运维管理单位与发包单位;
B. 双方;
C. 承包单位;
D. 发包单位
【单选题】
同一电压等级、同类型、相同安全措施且依次进行的___上的不停电工作,可使用一张配电第二种工作票。
A. 不同配电线路或不同工作地点
B. 不同配电线路
C. 不同工作地点
D. 相邻配电线路
【单选题】
专责监护人应由具有相关专业工作经验,熟悉工作范围内的___情况和本规程的人员担任。
A. 设备;
B. 现场;
C. 接线;
D. 运行
【单选题】
工作负责人应由有本专业工作经验、熟悉工作范围内的设备情况、熟悉本规程,并经___批准的人员担任,名单应公布。
A. 工区(车间);
B. 单位;
C. 上级单位;
D. 公司
【单选题】
总、分工作票在格式上与___工作票一致。
A. 第一种;
B. 带电作业;
C. 第二种;
D. 事故紧急抢救单
【单选题】
分工作票应一式两份,由___和分工作票负责人分别收执。
A. 工作许可人;
B. 总工作票负责人;
C. 运维管理单位负责人;
D. 施工单位负责人
【单选题】
供电单位或施工单位到用户变电站内施工时,工作票应由有权签发工作票的___签发。
A. 供电单位;
B. 用户单位、施工单位或供电单位;
C. 供电单位、施工单位或用户单位;
D. 施工单位或用户单位
【单选题】
若至预定时间,一部分工作尚未完成,需继续工作而不妨碍送电者,在送电前,应按照___,办理新的工作票。
A. 原工作票;
B. 送电后现场设备带电情况;
C. 当前现场设备带电情况;
D. 运维值班员要求
【单选题】
工作负责人允许变更___次。原、现工作负责人应对工作任务和安全措施进行交接。
【单选题】
工作票制度规定,需要变更工作班成员时,应经___同意。
A. 工作许可人;
B. 工作负责人;
C. 工作许可人与工作负责人;
D. 工作票签发人与工作负责人
【单选题】
电缆及电容器接地前应___充分放电。
A. 逐相;
B. 保证一点;
C. 单相;
D. 三相
【单选题】
非连续进行的故障修复工作,应使用___。
A. 故障紧急抢修单;
B. 工作票;
C. 施工作业票;
D. 口头、电话命令
【单选题】
工作票只能延期___。
A. 一次;
B. 两次;
C. 三次;
D. 四次
【单选题】
带电作业需要停用重合闸(含已处于停用状态的重合闸),应向___申请并履行工作许可手续。
A. 运行人员;
B. 设备运维管理单位;
C. 调控人员;
D. 运行值班负责人
【单选题】
禁止___停、送电。
A. 同时;
B. 约时;
C. 分时;
D. 按时
【单选题】
专责监护人的安全责任包含:明确被监护人员和___。
A. 许可工作的命令正确;
B. 工作必要性;
C. 监护范围;
D. 安全注意事项
【单选题】
第一、二种工作票和带电作业工作票的有效时间,以___为限。
A. 周计划指定的检修期;
B. 申请的检修期;
C. 批准的检修期;
D. 月度计划指定的检修期
【单选题】
带电作业工作票___。
A. 不准延期;
B. 可延期一次;
C. 可延期两次;D.可延期三次
【单选题】
用户变、配电站的工作许可人应是___工作人员。
A. 用户的专业管理部门;
B. 用户变电站;
C. 用户的生产部门;
D. 持有效证书的高压电气
【单选题】
许可工作前,工作许可人应会同工作负责人到现场___安全措施,对具体的设备指明实际的隔离措施,证明检修设备确无电压。
A. 分别做;
B. 再次检查所做的;
C. 共同做;
D. 了解
【单选题】
工作负责人、___应始终在工作现场,对工作班人员的安全认真监护,及时纠正不安全的行为。
A. 工作票签发人;
B. 专责监护人;
C. 工作许可人;
D. 安全监督人员
【单选题】
若专责监护人必须长时间离开工作现场时,应由___变更专责监护人,履行变更手续,并告知全体被监护人员。
A. 工作票签发人;
B. 工作负责人;
C. 工作许可人;
D. 工作票签发人与工作负责人
【单选题】
已终结的工作票、事故紧急抢救单应保存___。
A. 3个月;
B. 半年;
C. 100天;
D. 1年
【单选题】
任何运行中的星形接线设备的中性点,应视为___设备。
A. 电流接地;
B. 不带电;
C. 带电;
D. 停电
【单选题】
检修设备停电,应拉开隔离开关(刀闸),___应拉至试验或检修位置,应使各方面有一个明显的断开点。
A. 隔离开关(刀闸);
B. 断路器;
C. 手车开关;
D. 保护切换开关
【单选题】
在一经合闸即可送电到工作地点的断路器(开关)和隔离开关(刀闸)的操作把手上,均应悬挂___的标示牌。
A. “禁止合闸,有人工作!”;
B. “禁止合闸,线路有人工作!”;
C. “禁止分闸!”;
D. “禁止攀登,高压危险!”
【单选题】
___kV及以下设备可用与带电部分直接接触的绝缘隔板代替临时遮栏。
A. 10;
B. 35;
C. 110;
D. 20
【单选题】
在室外高压设备上工作,工作地点四周围栏上悬挂适当数量的___标示牌,标示牌应朝向围栏里面。
A. “从此进出!”;
B. “在此工作!”;
C. “止步,高压危险!”;
D. “禁止攀登,高压危险!”
【单选题】
在室外构架上工作,在邻近其他可能误登的带电架构上,应悬挂___的标示牌。
A. “止步,高压危险!”;
B. “禁止攀登,高压危险!”;
C. “从此上下!”;
D. “有电危险!”
【单选题】
因工作原因必须短时移动或拆除遮栏(围栏)、标示牌,应征得___同意,并在工作负责人的监护下进行。
A. 工作负责人;
B. 监护人;
C. 签发人;
D. 工作许可人
【单选题】
线路停电检修工作结束时,应得到___的工作结束报告。确认所有工作班组均已竣工,接地线已拆除,作业人员已全部撤离线路,与记录核对无误并做好记录后,方可下令拆除变电站或发电厂内的安全措施,向线路送电。
A. 工作负责人(包括用户);
B. 线路工作许可人;
C. 工作票签发人;
D. 线路工区主任
【单选题】
值班调控人员或线路工作许可人应将线路停电检修的___和工作任务做好记录。
A. 工作班组数目、工作负责人姓名;
B. 工作地点;
C. 工作班组数目、工作负责人姓名、工作地点;
D. 工作负责人姓名、工作地点
【单选题】
带电作业规定,保护间隙的接地线应用多股软铜线。其截面应满足接地短路容量的要求,但不得小于___m㎡。
A. 50;
B. 25;
C. 16;
D. 8
【单选题】
进行直接接触20kV及以下电压等级带电设备的作业时,应穿合格的绝缘防护用具;使用的___、安全帽应有良好的绝缘性能,必要时戴护目镜。
A. 安全带;
B. 工具;
C. 腰带;
D. 登高板
【单选题】
高压试验装置的电源开关,应使用明显断开的双极刀闸。为了防止误合刀闸,可在___上加绝缘罩。
A. 手柄;
B. 开关;
C. 刀闸;
D. 刀刃或刀座
【单选题】
在电缆隧(沟)道内巡视时,作业人员应携带便携式气体测试仪,通风不良时还应携带___。
A. 正压式空气呼吸器;
B. 防毒面具;
C. 口罩;
D. 湿毛巾;
【单选题】
变电站(生产厂房)内外工作场所的井、坑、孔、洞或沟道,应覆以与地面齐平而坚固的___。
A. 地砖;
B. 地板;
C. 盖板;
D. 围栏
【单选题】
工作场所的照明,应该保证足够的亮度。照明灯具的悬挂高度应不低于___m,并不得任意挪动。
A. 1.5;
B. 2.0;
C. 2.5;
D. 3.0
【单选题】
使用工具前应进行检查,机具应按其___的规定使用,不准使用已变形、已破损或有故障的机具。
A. 出厂说明书;
B. 铭牌;
C. 出厂说明书和铭牌;
D. 出厂说明书和铭牌与限额
【单选题】
电气工具和用具应由专人保管,___应由电气试验单位进行定期检查。
A. 每3个月;
B. 每6个月;
C. 每年
D. 每两年
推荐试题
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy