【单选题】
生产经营单位___对本单位事故隐患排查治理工作全面负责。
A. 安全分管领导
B. 高层领导
C. 主要负责人
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
危险化学品运输车辆应当悬挂或者喷涂符合___标准要求的警示标志。
【单选题】
进行压力容器内部检验或检修时,要求工作空间空气中的氧含量(体积比)为___。
A. 15%-25%
B. ≥20%
C. 18%-23%
【单选题】
疑似职业病病人在诊断.医学观察期间的费用,由___承担。
【单选题】
环状消防管网应用阀门分为若干独立段,每段内消防栓数量不宜超过___个。
【单选题】
毒害性危险化学品库房的耐火等级不得低于___级标准。
【单选题】
加压后使气体液化时所允许的最高温度,称为___。
【单选题】
按照《安全生产法》规定,危险化学品生产经营单位的从业人员不服从管理,违反安全生产规章制度或者操作规程的,由___给予批评教育,依照有关规章制度给予处分;造成重大事故,构成犯罪的,依照刑法有关规定追究刑事责任。
A. 生产经营单位
B. 上级领导
C. 车间主任
【单选题】
事故发生单位及其有关人员谎报或者瞒报事故的,对主要负责人.直接负责的主管人员和其他直接责任人员处上一年年收入___的罚款。
A. 40%-80%
B. 60%-100%
C. 80%
【单选题】
危险.有害因素的识别是指识别危险.有害因素的存在并确定其___的过程。
【单选题】
根据《危险化学品重大危险源辨识》(GB18218-2009)标准,当单元中有多种物质时,如果各类物质的量满足式___,则定为重大危险源。
【单选题】
危险化学品经经营许可证有效期为___年。
【单选题】
对于事故的预防与控制,安全教育对策和安全___对策则主要着眼于人的不安全行为问题。
【单选题】
安全色黄色的含义为___。
A. 必须遵守规定的指令性信息
B. 注意.警告的信息
C. 安全的指示性信息
【单选题】
生产经营单位内部一旦发生危险化学品事故,单位负责人必须立即按照本单位制定的___组织救援。
A. 工作计划
B. 控制措施
C. 应急救援预案
【单选题】
一个单位的不同类型的应急救援预案要形成统一整体,救援力量要___安排。
【单选题】
产生职业病危害的用人单位应当在醒目位置设置公告栏,公布有关职业病防治的规章制度.操作规程.职业病危害事故应急救援措施和___结果。
A. 职工健康体检
B. 工作场所职业病危害因素检测
C. 职工职业病检查
【单选题】
容器耐压试验采用气压时,试验方法按照《压力容器安全技术监察规程》的有关要求进行。保压不小于___小时。
【单选题】
水压试验应该在___和热处理以后进行。
A. 无损探伤合格
B. 焊接试验
C. 金相检查
【单选题】
《危险货物品名表》按运输危险性把爆炸品分为___项。
【单选题】
危险化学品的储存必须具备适合储存方式的设施:在同一房间或同一区域内,用隔板或墙,将禁忌物料分开的储存方式。这种储存方式属于___储存方式。
【单选题】
《安全生产法》规定,生产.经营.储存.使用危险物品的车间.商店.仓库不得与___在同一座建筑物内,并应当与其保持安全距离
【单选题】
危险货物包装物的最高标准是___类包装。
【单选题】
按照系统安全工程的观点,安全是指系统中人员免遭___的伤害。
【单选题】
当生产和其他工作与安全发生矛盾时,要以安全为主,生产和其他工作要服从安全,这就是___原则。
【单选题】
人本原理体现了以人为本的指导思想,___不是人本原理中的原则。
A. 安全第一原则
B. 动力原则
C. 能级原则
【单选题】
受日光照射能发生化学反应引起燃烧.爆炸.分解.化合或能产生有毒气体的危险化学品应储存在___级建筑物中。其包装应采取避光措施。
【单选题】
禁止标志的含义是不准或制止人们的某种行为,它的基本几何图形是___。
【单选题】
爆炸品仓库库房内部照明应采用___灯具,开关应设在库房外面。
【单选题】
在应急救援过程中,社会援助队伍到达企业时,指挥部要派人员引导并告知___。
A. 生产注意事项
B. 安全注意事项
C. 安全规章制度
【单选题】
在应急救援过程中,撤离前应及时指导危险区的群众做好___防护。
【单选题】
《生产安全事故报告和调查处理条例》规定,一般事故,是指造成3人以下死亡,或者___重伤(包括急性工业中毒),或者1000万元以下直接经济损失的事故。
A. 10人以上
B. 20人以下
C. 10人以下
【单选题】
《安全生产法》规定,生产经营单位的特种作业人员必须按照国家有关规定经专门的安全作业培训,取得___,
【单选题】
《安全生产法》规定,生产经营单位应当在有较大危险因素的生产经营场所和有关设施.设备上,设置明显的___。
【单选题】
《使用有毒物品作业场所劳动保护条例》规定,从事使用高毒物品作业的用人单位应当设置淋浴间和更衣室,并设置清洗.存放或者处理从事使用高毒物品作业劳动者的工作服.工作鞋帽等物品的专用间。劳动者结束作业时,其使用的工作服.工作鞋帽等物品必须存放在___区域内。
A. 高毒作业
B. 一般毒物作业
C. 黄色警示
【单选题】
物理性爆炸前后,物质的化学成分及性质___。
【单选题】
《常用危险化学品分类及标志》按易燃液体闪点的高低分为___项易燃液体。
【单选题】
危险化学品的储存必须具备适合储存方式的设施:在同一房间或同一区域内,不同的物料之间分开一定的距离,非禁忌物料间用通道保持空间的储存方式。这种储存方式属于___储存方式。
推荐试题
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management