相关试题
【多选题】
每次探水孔的位置由探水的___和巷道允许掘进的距离而定。
A. 高度
B. 宽度
C. 深度
D. 探水超前距
【多选题】
煤矿安全生产工作中人们常说的“三违”行为是指___。
A. 违章作业
B. 违反财经纪律
C. 违反劳动纪律
D. 违章指挥
【多选题】
事故调查处理中坚持的原则是___。
A. 事故原因没有查清不放过
B. 责任人员没有处理不放过
C. 广大职工没有受到教育不放过
D. 资金不到位不放过
【多选题】
钻机的维护保养应___。
A. 及时擦去泥浆污泥,需加油处定期加油
B. 及时检查更换卡瓦
C. 定期打开油箱盖板,进行清洗,更换液压油
D. 及时检查更换离合器摩擦片
【多选题】
雨季“三防”指的是___
A. 防洪
B. 防涝
C. 防雷电
D. 防排水
【多选题】
下列哪些图件属于矿井水文地质基本图件___
A. 综合水文地质图
B. 涌水量与相关因素分析曲线图
C. 主要含水层等水位线图
D. 采掘工程平面图
【多选题】
井巷出水点的位置及其水量,有积水的井巷及采空区的___,必须绘在采掘工程平面图上。
A. 积水范围
B. 标高
C. 水质
D. 积水量
【多选题】
废弃矿井闭坑淹没前,应当采用___等方法,探测矿井边界防隔水煤(岩)柱破坏状况及其可能的透水地段,采用注浆堵水工程隔断废弃矿井与相邻生产矿井的水力联系,避免矿井发生水害事故。
【多选题】
老空积水突水征兆主要有 ___ 等种。
A. 水量补给量较差
B. 岩缝中见到淤泥
C. 水为红色
D. 水味发涩
E. 发出臭鸡蛋味
【多选题】
矿井水文地质划分为 ___ 4种类型。
A. 极简单
B. 简单
C. 中等
D. 复杂
E. 极复杂
【多选题】
在___的情况下,应采用隔离式探水。
A. 高水压
B. 水量大
C. 煤层松软
D. 节理发育
【多选题】
钻机运转时,禁止探放水工用___制动运转部分。
【多选题】
探放老空水前,要选分析查明老空水体的___。
A. 水温
B. 老空水位置
C. 积水量和水压
D. 流量
【多选题】
"有严重水患,未采取有效措施",是指有下列___情形之一。
A. 未查明矿井水文地质条件和采空区、相邻矿井及废弃老窑积水等情况而组织生产
B. 矿井水文地质条件复杂没有配备防治水机构或人员,未按规定设置防治水设施和配备有关技术装备、仪器
C. 在有突水威胁区域进行采掘作业未按规定进行探放水
D. 擅自开采各种防隔水煤柱
【多选题】
在探水时,如果瓦斯或其他有害气体浓度超过规程规定时,必须立即___,及时处理。
A. 停止钻进
B. 切断电源
C. 撤出人员
D. 报告矿调度
【多选题】
每次降大到暴雨时和降雨后,必须派专人检查矿区及其附近地面有无___等现象。发现漏水情况,必须及时处理。
A. 裂缝
B. 老窑陷落
C. 岩溶塌陷
D. 褶曲
【多选题】
承压含水层不具备疏水降压条件时,必须采取___等防水措施。
A. 确定探水线
B. 建筑防水闸门
C. 留设防水煤柱
D. 增加抗灾强排能力
E. 注浆加固底板
【多选题】
水灾发生后,抢险救灾的主要任务是___。
A. 抢救伤员
B. 加强排水
C. 恢复通风
D. 加强支护
【多选题】
处理上山巷道透水事故时,应注意事项有___。
A. 防止二次透水
B. 透水点下方要有能存水及沉积物的足够有效空间,否则人员要撤到安全地点
C. 保证人员在作业中的通讯联系和安全退路
D. 防止积水和淤泥的冲击
【多选题】
煤矿企业必须定期收集、调查和核对相邻煤矿和废弃的老窑情况,并在井上、下工程对照图上标出其___。
A. 井田位置
B. 开采范围
C. 开采年限
D. 积水情况
【多选题】
煤矿防治水工作应当坚持___的原则
A. 预测预报
B. 有疑必探
C. 先探后掘
D. 先治后采
【多选题】
采用电法实施掘进工作面超前探测的,探测环境应当符合下列哪些要求___
A. 巷道断面、长度满足探测所需要的空间
B. 距探测点20m范围内不得有积水,且不得存放掘进机、铁轨、皮带机架、锚网、锚杆等金属物体
C. 巷道内动力电缆、大型机电设备必须停电
【多选题】
专门水文地质工程地质勘探应当包括下列内容:___
A. 查明与煤层开采有关的上覆岩层水文地质结构,包括含水层、隔水层的厚度和分布,含水层水位、水质、富水性,各含水层之间的水力联系及补给、径流、排泄条件,断层的导(含)水性
B. 采用钻探、物探等方法探明工作面上方基岩面的起伏和基岩厚度。在松散含水层下开采时,应当查明松散层底部隔水层的厚度、变化与分布情况
C. 通过岩芯工程地质编录和数字测井等,查明上覆岩土层的工程地质类型、覆岩组合及结构特征,采取岩土样进行物理力学性质测试
【多选题】
矿井工作水泵的能力应能___小时内排出矿井( )小时的正常涌水量。
【多选题】
严禁将___等杂物堆放在山洪,河流可能冲刷到的地段.
A. 矸石
B. 炉灰
C. 垃圾
D. ****
【多选题】
矿井充水的四种水源为___。
A. 地表水
B. 地下水
C. 老窑水
D. 大气降水
【多选题】
突水点突水量的等级标准分为___。
A. Q3≤60
B. 60<Q3≤600
C. 600<Q3≤1800
D. Q3>1800、
【多选题】
矿井防治水的综合防治措施是___。
A. 探、防
B. 疏、堵
C. 排
D. 截、监
【多选题】
《煤矿防治水细则》规定,矿井应当按照规定编制的防治水图件有___,其他有关防治水图件由矿井根据实际需要编制。
A. 矿井充水性图
B. 矿井涌水量与各种相关因素动态曲线图
C. 矿井综合水文地质图
D. 矿井综合水文地质柱状图 矿井水文地质剖面图
【多选题】
《煤矿防治水细则》提出,煤矿防治水工作应当坚持___的原则,采取综合治理措施。。
A. 预测预报
B. 有疑必探
C. 先探后掘
D. 先治后采
【多选题】
《煤矿防治水细则》规定,矿井水文地质类型划分的依据包括下列___内容。
A. 矿井受采掘破坏或者影响的含水层及水体 矿井及周边老空水分布状况
B. 矿井涌水量,矿井突水量
C. 开采受水害影响程度
D. 防治水工作难易程度
【多选题】
《煤矿防治水细则》规定,矿井水文地质类型划分为___。
【多选题】
矿井水文地质补充勘探包括___
A. 一般规定
B. 水文地质补充调查
C. 地面水文地质补充勘探
D. 井下水文地质补充勘探
【多选题】
煤炭企业、煤矿应当结合本单位实际情况建立健全水害防治岗位责任制、包含___重大水患停产撤人制度以及应急处置制度等。
A. 水害防治技术管理制度
B. 水害预测预报制度
C. 水害隐患排查治理制度
D. 探放水制度、
【多选题】
煤矿主要负责人必须赋予___等相关人员紧急撤人的权力,发现突水(透水、溃水,下同)征兆、极端天气可能导致淹井等重大险情,立即撤出所有受水患威胁地点的人员,在原因未查清、隐患未排除之前,不得进行任何采掘活动。
A. 调度员
B. 安检员
C. 井下带班人员
D. 班组长
【多选题】
受底板承压水威胁的水文地质类型___矿井,应当采用微震、微震与电法耦合等科学有效的监测技术,建立突水监测预警系统,探测水体及导水通道,评估注浆等工程治理效果,监测导水通道受采动影响变化情况。
【多选题】
矿井闭坑报告应当包括下列防治水相关内容:___
A. 闭坑前的矿井采掘空间分布情况,对可能存在的充水水源、通道、积水量和水位等情况的分析评价
B. 闭坑对邻近生产矿井安全的影响和采取的防治水措施
C. 矿井关闭时采取的水害隐患处置工作及关闭后淹没过程检测监控情况。
D. 损失量报告。
【多选题】
矿井应当对与充水含水层有水力联系的地表水体进行长期动态观测,掌握其动态规律,分析研究地表水与地下水的水力联系,掌握其___。
A. 补给
B. 排泄地下水的规律
C. 测算补给
D. 排泄量
【多选题】
矿井主要泵房至少有___个出口,一个出口用斜巷通到井筒,并高出泵房底板( )m以上,另一个出口通到井底车场,在此出口通路内,应当设置易于关闭的既能防水又能防火的密闭门。泵房和水仓的连接通道,应当设置控制闸门。
【判断题】
煤矿企业及所属矿井总工程师(或技术负责)具体负责煤矿地质工作的组织实施和技术管理。
推荐试题
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall