刷题
导入试题
【单选题】
下列物质重,___为最典型的未完全燃烧产物。
A. 一氧化碳
B. 二氧化碳
C. 氢氰酸
D. 水
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
生产.储存.经营___的场所不得与居住场所设置在同一建筑物内,并应当与居住场所保持安全距离。
A. 易燃易爆危险品
B. 易燃易爆物品
C. 化学物品
D. 化学危险品
【单选题】
气体灭火系统起动后人员的撤离时间是___。
A. 10——20s
B. 20——30s
C. 30——40s
D. 1min
【单选题】
当火场温度达到800℃时,烟气体积膨胀为常温下的___倍。
A. 1——2
B. 2——3
C. 3——4
D. 4——5
【单选题】
扑救带电火灾时,尽量采用喷雾水流,喷雾水枪可以不接地线,要根据电压大小选好与带电体的安全距离,消防车泵压力保持___MPA。
A. 0.3-0.5
B. 0.4-0.6
C. 0.5-0.7
D. 0.6-0.8
【多选题】
凡是与火灾有关的留有痕迹物证的场所均应列入现场保护范围,遇有下列哪些情况时应适当扩大保护区:___。
A. 起火点位置未确定
B. 电气故障引起的火灾
C. 起火点位置确定
D. 爆炸现场
【多选题】
火灾发生后,保护现场的方法,属于勘查的现场保护的是:___。
A. 露天现场
B. 室内现场
C. 大型火灾现场
D. 火灾第一现场
【多选题】
车辆到达现场时,应当根据现场情况选择适当的停车位置。___
A. 严禁在松软或者路基薄弱的地带停靠
B. 必须与建筑物保持距离
C. 举高消防车必须停靠在空中无障碍物、地面平坦坚实的地段
D. 扑救高危场所火灾时,车辆应当停在便于展开、便于转移的位置,车头应朝撤离方向。
【多选题】
安全疏散设施包括___。
A. 电梯
B. 安全出口
C. 应急照明灯
D. 疏散指示标志
【多选题】
灭火中应采取___战术措施?
A. 注意观察,防止爆炸及飞火
B. 筑堤堵漏,防止蔓延
C. 充分准备,集中灭火
D. 注意防护,防止伤害
E. 加强冷却,防止复燃
【多选题】
车辆到达现场时,应当根据现场情况选择适当的停车位置。严禁停靠在___上方及其附近。
A. 地沟
B. 阴井
C. 管道
D. 光缆
【多选题】
处置危险性较大的灾害事故,必须预先确定___。
A. 疏散信号
B. 传递方式
C. 撤离的方向
D. 撤离的路线
【多选题】
战斗力量部署图中用指北针和风玫瑰图表示该单位的___。
A. 方位
B. 常年主导风向
C. 地形地物
D. 总体布局
E. 风的频率
【多选题】
起重破拆必须根据现场情况,采取合理的安全措施.___
A. 使用牵引设备时,钢丝绳两端连接必须牢固,作业区域内严禁站人
B. 使用起吊设备时,设备起吊荷载必须大于被起吊物体重量
C. 吊臂下方严禁站人
D. 在有燃烧爆炸危险的场所进行破拆时,必须使用无火花工具,并使用喷雾(开花)水枪进行掩护
【多选题】
使用绳索进行救人、自救训练时,下列说法正确的是___。
A. 操作人员和安全员必须在检查结绳方法无误后,方可继续操作
B. 承载的绳索必须在接触建(构)筑物的转角处设置护垫、护具
C. 利用绳索下滑训练时,必须控制下滑速度,严禁急降、急停
D. 下抛绳索时,应当使用绳包,防止绳索打结
【多选题】
倒塌现场施救时,应当选择___的路线进入,及时对不牢固建筑构件实施破拆或者加固。
A. 建筑构件牢固
B. 受破坏程度小
C. 建筑安全
D. 距离近
【多选题】
二级防护标准为___。
A. 全身
B. 内置式重型防化服
C. 全棉防静电内外衣
D. 封闭式防化服
E. 正压式空气呼吸器或全防型滤毒罐
【多选题】
泡沫灭火系统按发泡倍数分为___。
A. 低倍数泡沫灭火系统
B. 中倍数泡沫灭火系统
C. 中高倍数灭火系统
D. 高倍数泡沫灭火系统
【多选题】
造成训练事故的主观原因主要有___。
A. 放松警惕,侥幸麻痹
B. 场地器材检查不细致
C. 忽视保护,盲目蛮干
D. 训练器材质量问题
【多选题】
在开展体能和业务训练前,要对___必须进行检查、测试。
A. 训练场地
B. 天气情况
C. 设施
D. 器材
【多选题】
实施二级防护的区域为___。
A. 中毒重度危险区
B. 中毒中度危险区
C. 中毒轻度危险区
D. 中毒安全区
E. 安全区
【多选题】
扑救建筑物火灾防止倒塌伤人的措施有___。
A. 将防止建筑物倒塌作为灭火救援决策的重要内容,切实做好指战员的安全防护工作
B. 安排有经验的人员负责观察受灾建筑的细微变化,及时向参战官兵通报情况
C. 在建筑受火灾长时间作用的情况下,尽量不要安排人员深入内部进攻
D. 必须进入建筑内部扑救火灾时,要尽量减少人员
E. 在建筑火灾扑救初期,尽量不要安排人员内攻灭火
【多选题】
一级防护标准为___。
A. 全身
B. 内置式重型防化服
C. 全棉防静电内外衣
D. 封闭式防化服
E. 正压式空气呼吸器或全防型滤毒罐
【多选题】
实施三级防护的区域为___。
A. 低毒中度危险区
B. 微毒中度危险区
C. 微毒轻度危险区
D. 低毒轻度危险区
E. 剧毒中度危险区
【多选题】
高层建筑火灾供水方法主要有。___。
A. 启动固定消防水泵供水
B. 利用水泵接合器向室内管网补充供水
C. 通过移动式消防水泵直接向火场供水
D. 通过消防车直接向火场供水
【多选题】
灭火救援中被火围困或在浓烟中迷失方向时如何自救___
A. 淋湿全身
B. 到处走动
C. 利用落水管
D. 绳索自救
【多选题】
高层建筑火灾的特点是___。
A. 烟火蔓延途径多,易形成立体火灾
B. 人员疏散困难,灭火救援难度大
C. 玻璃幕墙破,易造成碎人员伤亡
D. 火灾荷载大,易发生坍塌
【多选题】
发光照明线具有___等特点。
A. 耐高温
B. 轻质
C. 防水
D. 便于携带
E. 便于铺设
【多选题】
使用救生照明线必须注意:___。
A. 水中使用时,防止触电
B. 不得超出极限负荷
C. 使用后应冷却
D. 边使用边冷却
E. 一处破损,整条线路自动断电
【多选题】
不属于干粉灭火剂灭火机理是___。
A. 降低氧浓度
B. 降低温度
C. 化学抑制
D. 降低氧浓度和冷却
【多选题】
不属于泡沫灭火剂灭火机理是___。
A. 冷却、窒息
B. 抑制燃烧链式反应
C. 降低氧浓度
D. 降低温度
【多选题】
扑救高层建筑火灾,实施外部进攻的主要途径有___。
A. 利用室外楼梯、建筑物平台
B. 利用举高消防车
C. 利用直升飞机
D. 利用建筑装有的塔吊、升降机、擦窗机
E. 利用相邻建筑设置上下滑行绳索
【多选题】
高层建筑火灾排烟方法有___。
A. 利用固定机械排烟系统排烟
B. 利用排烟窗排烟
C. 利用喷雾水流排烟
D. 利用移动排烟设备排烟
E. 破拆建筑结构排烟
【多选题】
扑救高层建筑火灾时,灭火救援难度大的主要表现是___。
A. 浓烟、毒气等燃烧产物易造成被困人员窒息中毒
B. 内部温度高、烟气浓、能见度低,灭火救援人员难以深入内部
C. 楼层高,消防移动作战装备器材难以发挥作用
D. 被困人员易惊慌失措,可供疏散逃生的通道少,容易造成大量人员伤亡
E. 易产生“烟囱”效应,烟火流动速度快
【多选题】
在扑救高层建筑火灾中,玻璃幕墙破碎会导致___等事故。
A. 地面人员伤亡
B. 破坏地面消防车辆
C. 破坏供水器材
D. 新鲜空气进入,火势扩大
E. 烟雾流动,火势四处蔓延
【多选题】
扑救砖木结构建筑火灾的灭火战术措施有。___。
A. 强攻近战
B. 内外夹攻
C. 上下合击
D. 重点突破
E. 分割围歼
【多选题】
砖木结构建筑发生火灾后,___最容易出现垮塌。
A. 墙
B. 柱
C. 楼板
D. 吊顶
E. 屋盖
【多选题】
灾害事故类型包括:___恐怖袭击和破坏事件、其它灾害事故.
A. 化学灾害事故
B. 自然灾害
C. 市政公共设施事
D. 建筑物坍塌事故
E. 交通工具事故
【多选题】
一般交通事故抢险救援警时中队可出动的车辆是___。
A. 水罐消防车
B. 干粉消防车
C. 泡沫消防车
D. 抢险救援消防车
E. 举高消防车
【多选题】
消防救援队伍除参加的建筑物倒塌事处置外,还要参加___等的处置。
A. 化学灾害事故
B. 自然灾害
C. 市政公共设施
D. 恐怖袭击和破坏事件
E. 交通工具事
【多选题】
灭火器材的检查主要包括___。
A. 手提式灭火器
B. 手推式灭火器
C. 生产日期
D. 消防栓
推荐试题
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用