【判断题】
国家安全生产监督管理总局负责全国危险化学品登记的监督管理工作。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
禁止在危险化学品储存区域内堆积可燃性废弃物。
【判断题】
为了有利于静电的泄露,可采用静电导电性工具。
【判断题】
压力容器的受压元件如果采用不合理的结构形状,局部地方会因应力集中或变形受到过分压束而产生很高的局部应力,严重时也会导致破坏。
【判断题】
可靠的水循环是锅炉安全监督的一个重要内容。
【判断题】
515《气瓶安全监察规程》规定,瓶装气体和气瓶经销单位必须经销有制造许可证企业的合格气瓶和气体。
【判断题】
用人单位发生分立、合并、解散、破产等情形时,应当对劳动者进行职业健康检查,并依照国家有关规定妥善安置职业病病人;其职业健康监护档案应当依照国家有关规定实施移交保管。
【判断题】
分期建设、分期投入生产或者使用的建设项目,其配套的职业病防护设施应当在建设项目全部完成后进行验收。
【判断题】
有火灾爆炸危险的厂房内,通风气体可以循环使用。
【判断题】
放射性物质放出的射线可分为四种:α射线β射线γ射线和中子流。
【判断题】
在危险品的管理中,干的或未浸湿的二硝基苯酚被列为易燃固体管理。
【判断题】
《危险化学品经营许可证管理办法》适用民用爆炸品、放射性物品、核能物质和城镇燃气等危险化学品经营销售活动。
【判断题】
通过道路运输危险化学品的,托运人应当委托依法取得危险货物道路运输许可的企业承运。
【判断题】
当某种化学品具有两种及两种以上的危险性时,用危险性最小的警示词。
【判断题】
危险化学品经营企业的经营场所应坐落在交通便利、便于疏散处。
【判断题】
参与演练单位不可对本单位的演练情况进行总结。
【判断题】
应急组织指挥体系或者职责已经调整的生产经营单位应急预案可三年后修订。
【判断题】
生产经营单位发生生产安全事故后,事故现场有关人员应当立即报告本单位负责人。单位负责人接到事故报告后,应当迅速采取有效措施,组织抢救,防止事故扩大,减少人员伤亡和财产损失,并按照国家有关规定立即如实报告当地负有安全生产监督管理职责的部门,不得隐瞒不报、谎报或者迟报,不得故意破坏事故现场、毁灭有关证据。
【判断题】
依法设立的危险化学品生产企业在其厂区范围内销售本企业生产的危险化学品,不需要取得危险化学品经营许可。
【判断题】
任何单位、个人不得损坏、挪用或者擅自拆除、停用消防设施、器材,
【判断题】
各级人民政府应当组织开展经常性的消防宣传教育,提高公民的消防安全意识。
【判断题】
对于正常人体,感知阈值与时间因素无关;而摆脱阈值与时间有关。
【判断题】
用人单位不得安排未成年工从事接触职业病危害的作业,不得安排孕期、哺乳期的女职工从事对本人和胎儿、婴儿有危害的作业。
【判断题】
建设项目的职业病防护设施发生重大变更的,建设单位应当重新进行职业病危害预评价,办理相应的备案或者审核手续。
【判断题】
建设项目职业病防护用品必须与主体工程同时设计、同时施工、同时投入生产和使用。
【判断题】
机动车在加注汽油时,油箱口会有大量油气冒出,应该注意防火。
【判断题】
易燃固体储存库房温度需控制在35℃及以下。
【判断题】
根据我国《常用危险化学品分类及标志》,压缩气体和液化气体中,不包括氧气。
【判断题】
爆炸品一旦发生爆炸,往往危害大、损失大、扑救困难,因此从事爆炸品工作的人员必须熟悉爆炸品的性能、危险特性和不同爆炸品的特殊要求。
【判断题】
危险物品的生产、经营、储存单位,应当设置安全生产管理机构或者配备兼职安全生产管理人员。
【判断题】
《工伤保险条例》规定了工伤保险基金组成和征收办法。工伤保险费由个人缴纳。
【判断题】
危险化学品安全标签中还应标注出化学品是否为易(可)燃或助燃物质,有效的灭火剂和禁用的灭火剂以及灭火注意事项。
【判断题】
为了防止危险化学品的误用,危险化学品安全标签的粘贴、挂拴、喷印应牢固,保证在运输及储存期间不脱落、不损坏。
【判断题】
危险化学品生产单位在厂内销售本单位生产的危险化学品,不再办理经营许可证。
【判断题】
可以生产、销售或者使用不合格的消防产品以及国家明令淘汰的消防产品。
【判断题】
每种材料对不同的介质、甚至对同一介质在不同的使用条件下的耐腐蚀性是不一样的。
【判断题】
高毒作业场所职业中毒危害因素不符合国家职业卫生标准和卫生要求时,用人单位必须立即停止高毒作业,并采取相应的治理措施;经治理,职业中毒危害因素符合国家职业卫生标准和卫生要求的,方可重新作业。
推荐试题
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group