刷题
导入试题
【单选题】
天然气管道线路“三桩”通常指()。___
A. 里程桩、加密桩、穿越桩
B. 里程桩、转角桩、标志桩
C. 转角桩、加密桩、穿越桩
D. 标志桩、里程桩、穿越桩
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【多选题】
运行人员可应根据作业实际情况,采取( )等方式,对作业进行监护、监督检查,并做好记录。___
A. 现场监护
B. 巡检巡察
C. 远程视频监控和系统
D. 随意查看
【多选题】
电机运行中,应观察运行情况及相关参数,发现有异常声响、( )等情况,应立即停运。___
A. 振动
B. 烟雾
C. 异味
D. 水雾
【多选题】
( )应由熟练的值班员操作,站场负责人监护。___
A. 特别重要操作
B. 简单操作
C. 复杂的操作
D. 一般操作
【多选题】
动火工作间断后,重新动火前动火( )必须重新检查安全措施的落实情况,并按要求再次填写《动火现场检查记录表》,检查内容确认完成后方可进入许可签字程序。___
A. 工作票签发人
B. 工作负责人
C. 动火监护人
D. 工作票许可人
【多选题】
工作过程所涉及的( )等设备的设定或技术参数,运行条件等发生变化的,应在工作完成情况及说明中详细说明,并由检修和运行双方签字确认。___
A. 仪表
B. 阀门
C. 控制系统
D. 精密空调
【多选题】
( )等恶劣条件下应尽可能避免和减少工艺操作。___
A. 雷雨
B. 暴雪
C. 台风
D. 雨天
【多选题】
编制调度运行方案和特殊运行方案时,应充分考虑管网运行压力( )等因素,并有专门的应急措施___
A. 上游气量
B. 用气负荷
C. 季节特点
D. 设备状况
【多选题】
当( )不能满足下游用户用气需求,严重影响管网安全运行时,当班调度应按有序用气有关规定及时采取限供气措施,并启动相应应急预案。___
A. 上游气源短缺
B. 管网发生故障
C. 设备故障
D. 通讯故障
【多选题】
进出站场( )、控制室等无关人员禁止入内的场所,应随手关门。___
A. 工艺区
B. 配电间
C. 发电机房
D. 水处理间
【多选题】
当班调度应根据( ),调控管网的压力和流量。___
A. 上游气源条件
B. 下游用户需求
C. 管存气量
D. 居民用户需求
【多选题】
识别危害因素时应充分考虑哪些方面( )、方法几个方面和正常、异常、紧急三种状态。___
A. 人员
B. 设备
C. 材料
D. 环境
【多选题】
下列关于球阀操作正确的是( )___
A. 操作阀门时,应缓开缓关
B. 同时操作多个阀门时,应注意操作顺序,并满足生产工艺要求
C. 开启有旁通阀门的较大口径阀门时,若两端压差较大,应先打开旁通阀调压,再开主阀;主阀打开后,应关闭旁通阀
D. 球阀只能全开或全关操作
【多选题】
穿跨越是指管道穿越或跨越铁路、公路、河流、鱼虾塘、水库、( )等___
A. 管线
B. 电力线
C. 通信线
D. 网线
【多选题】
应按照国家标准规定对起重机械进行( ),对在检查中发现有问题的起重机械,应进行检修,并保存检修档案。___
A. 日检
B. 月检
C. 强检
D. 年检
【多选题】
动火作业前应将隔离阀门( )。___
A. 断电
B. 上锁
C. 就地打STOP
D. 挂禁止操作牌
【多选题】
因工作需要临时增加三种人的,需按三种人资格审批程序履行相应的( )手续。___
A. 考试
B. 审核
C. 批准
D. 公布
【多选题】
高压电气试验中,下列说法正确的是( )___
A. 在同一电气连接部分进行高压试验前,必须暂停其他检修工作,试验结束、设备未充分放电前不得许可其他工作
B. 高压设备与其他设备断点符合安全距离要求,试验区范围内向外装设警示围栏,悬挂“禁止合闸,有人工作”标示牌
C. 试验装置外壳应可靠接地,低压回路中应有过载自动保护装置的开关并串用三极刀闸
D. 试验中断、变更接线或试验结束时应立即断开试验电源,将被试设备放电并短路接地
【多选题】
仪表检定中,下列说法正确的是( )___
A. 仪表检定人员经过上岗培训符合能力要求即可进行操作,保证量值传递准确、可靠、统一;
B. 对计量标准器具应定期进行维护保养,使其处于良好技术状态
C. 计量标准器具应按周期进行检定,特殊情况可超期使用但不得超期1个月
D. 检定人员在操作过程中,如发现异常应立即停止使用,查明原因,防止量值传递事故发生
【多选题】
压力容器(管道)及其附属设施检修维护中,下列说法正确的是( )___
A. 打开压力容器盲板、人孔门作业时,作业人员不得正对盲板、人孔门,盲板、人孔门打开后需进行固定,防止人员受伤
B. 不得擅自紧固带压容器上的螺栓或其它紧固件,经相关领导批准可带压拆卸紧固件
C. 作业人员进入压力容器(管道)作业前应确认安全措施完备,压力容器(管道)应通风顺畅
D. 附属安全阀作业前应关闭安全阀前隔离球阀,检查阀门的内漏情况,放空阀门及引压管内余压,压力降为0.1MPa后方可进行拆卸
【多选题】
通用阀门维护检修时,下列说法正确的是( )___
A. 维护前应确认阀门已退出运行,悬挂禁止操作牌,带执行机构的阀门应将阀门切换至远控状态
B. 拆卸阀门附属设施应先对阀腔进行排空,拆卸过程应缓慢,并观察螺纹口是否有气体冒出
C. 安全阀、ESD前手动球阀应保持常闭,并做好闭锁
D. 开启阀腔泄压口泄压时,作业人员不得正对阀腔泄放口
【多选题】
输气管道设备设施上工作保证安全的组织措施有( )___
A. 工作票制度、工作许可制度
B. 工作监护制度
C. 工作间断、延期、变更和终结制度
D. 特殊作业许可证制度
【多选题】
在输气管道设备设施上进行( )作业,必须办理动火作业许可证___
A. 焊接
B. 切割
C. 打磨
D. 刷漆
【多选题】
工作票按专业可分为工艺、电气、仪表、自控( )等___
A. 动火
B. 土建
C. 通信
D. 阴保
【多选题】
需要编制专项施工方案的特殊作业中,脚手架工程包含但不限于以下作业:( )___
A. 搭设高度20M及以上的落地式钢管脚手架工程
B. 附着式整体和分片提升脚手架工程
C. 悬挑式脚手架工程、吊篮脚手架工程
D. 自制卸料平台、异动操作平台工程;新型及异型脚手架工程
【多选题】
特殊作业许可证中应明确的内容有哪些?( )___
A. 作业时间、地点、作业内容
B. 签发人、工作负责人、监护人
C. 执行人、批准人、许可人
D. 风险控制措施
【多选题】
输气管道设备设施上工作的人员应具备必要的天然气知识,学会紧急救护法(心肺复苏及人工呼吸),特别要掌握( )等急救常识。___
A. 烧伤、烫伤
B. 冻伤
C. 窒息
D. 中毒
【多选题】
作业机具、安全工器具、个人防护用品、应急救援器材等应符合国家或行业标准的规定,并根据产品说明书、有关标准规范或实际情况定期进行( )或试验,对不符合要求的,应及时更换。___
A. 检测
B. 检验
C. 检查
D. 核对
【多选题】
相关方人员在输气管道设备设施上工作前,管道企业应对其进行( ),交底方和被交底方应在交底记录上签字确认后,方可允许其进入现场参加指定地点的工作。___
A. 设备设施状态
B. 运行隔离情况
C. 安全要求交底
D. 管理制度
【多选题】
( )工作许可人应得到调度部门操作指令后方可进行操作___
A. 一类
B. 二类
C. 应急类
D. 三类
【多选题】
在输气管道设备设施上进行( )喷火加热等动火作业,必须办理动火作业许可证。动火作业许可证作为工作票的补充,不能代替工作票。___
A. 焊接
B. 切割
C. 喷砂
D. 打磨
【多选题】
介质置换作业包括( )___
A. 氮气置换天然气
B. 天然气置换氮气
C. 氮气置换空气
D. 氮气置换空气
【多选题】
管道上方或管道两侧各一米范围内允许动土的,应分别按照下面三种情况进行处理( )。 ___
A. 动土深度没有到达管顶位置的,仅做光缆是否完好检查;
B. 动土深度到达或超过管顶位置的,先使用PCM+检查管道防腐层的情况,对于防腐层破损者进行开挖验证;
C. 对于光缆完好者,再检查防腐层是否完好。
D. 以上都是
【多选题】
管道经过哪些区域宜设置警示牌( )。___
A. 采石场、取土场、采矿区域
B. 易发生或已多次发生危及管道安全行为的区域
C. 山区、稻田、湖泊
D. 人口集中居住区、工业建设地段
【多选题】
安规中所称工作是指从事浙能集团所属输气管道调度( )等职务行为。___
A. 运行、维(检、抢)修
B. 检测、检验
C. 技术改造和改(扩)建工程施工
D. 试验
【多选题】
第三方施工是指管道企业及其相关方以外的单位所实施的影响管道安全的施工行为,包括( )以及清淤、爆破、土石方开挖等施工。___
A. 新建/扩建房屋
B. 市政道路
C. 桥梁、河(沟)道
D. 公路、铁路
【多选题】
特殊作业许可证中应明确( )等内容。___
A. 作业时间、地点、作业内容
B. 签发人、工作负责人
C. 风险控制措施
D. 监护人、批准人、许可人
【多选题】
专项施工方案应经管道企业分管技术领导组织作业部门、( )审查批准后,作为办理工作票、特殊作业许可证的依据。___
A. 工作许可部门
B. 技术管理部门
C. 安监部门
D. 监理部门
【多选题】
特殊作业许可证必须履行( )等程序。___
A. 审核
B. 批准
C. 许可
D. 延期
【多选题】
经管道企业批准允许单独巡视输气管道设备设施的( )在巡视时不得进行其他工作。___
A. 维修人员
B. 管道保护人员
C. 站场值班人员
D. 相关方人员
【多选题】
( )人员,必须经过安全教育培训 ,方可进入输气管道现场随同参加指定的工作,不得单独工作。___
A. 新参加工作
B. 实习人员
C. 临时工作
D. 外包人员
推荐试题
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用