刷题
导入试题
【单选题】
毒害性、腐蚀性危险化学品库房的耐火等级不得低于___级。
A. 一
B. 二
C. 三
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
《安全生产法》中三同时的规定是:生产经营单位新建、改建、扩建工程项目的(),必须与___同时设计、同时施工、同时投入生产和使用。
A. 安全卫生设施、基础工程
B. 安全设施、主体工程
C. 劳动安全卫生设施、基础设施
【单选题】
危险化学品仓库应设有___的危险化学品养护员,负责危险化学品的技术养护、管理和监测工作。
A. 专职
B. 兼职
C. 专职或兼职
【单选题】
企业负责人应每月至少参加___次班组安全活动
A. 2
B. 1
C. 3
【单选题】
生产经营单位的安全生产管理机构是专门负责___的内设机构,其工作人员是()安全生产管理人员。
A. 安全生产教育培训,专职
B. 安全生产,专业
C. 安全生产监督管理,专职
【单选题】
在应急救援过程中,对沾有毒害物品的人员要在警戒区出口处___,进入安全区后再做进一步检查,造成伤害的要尽快进行救护。
A. 实施洗消
B. 进行登记
C. 进行转移
【单选题】
应急演练___下达演练开始指令后,参演单位和人员按照设定的事故情景,实施相应的应急响应行动,直至完成全部演练工作。
A. 总导演
B. 总指挥
C. 安全总监
【单选题】
应急救援专职队平时就要___并配有相应器材。
A. 互相沟通
B. 选拔人员
C. 组建落实
【单选题】
《生产安全事故报告和调查处理条例》规定,较大事故,是指造成___死亡,或者10人以上50人以下重伤(包括急性工业中毒),或者1000万元以上5000万元以下直接经济损失的事故。
A. 3人以下
B. 3人以上10人以下
C. 10人以上30人以下
【单选题】
电器着火时下列不能用的灭火方法是 ___。
A. 用沙土灭火
B. 用四氯化碳或1211灭火器进行灭火
C. 用水灭火
【单选题】
液化气汽车罐车属于___类压力容器。
A. 一
B. 二
C. 三
【单选题】
氧气瓶及强氧化剂气瓶瓶体及瓶阀处,必须杜绝沾有___。
A. 水珠
B. 油污
C. 漆色
【单选题】
《使用有毒物品作业场所劳动保护条例》规定,使用有毒物品作业的用人单位维护、检修存在高毒物品的生产装置,必须事先制订维护、检修方案,明确___措施,确保维护、检修人员的生命安全和身体健康。
A. 安全
B. 救护
C. 职业中毒危害防护
【单选题】
爆炸物品厂房之间的安全距离是根据爆炸产生的___确定的。
A. 破片飞散距离
B. 冲击波
C. 气体扩散距离
【单选题】
下列___灭火器不适于扑灭电气火灾。
A. 二氧化碳
B. 干粉
C. 泡沫
【单选题】
根据国家《职业性接触毒物危害程度分级》,职业性接触毒物可分为___个级别。
A. 4
B. 3
C. 5
【单选题】
危险化学品库房门应为铁门或木质外包铁皮,采用___。设置高侧窗(剧毒物品仓库的窗户应加设铁护栏。
A. 外开式
B. 内开式
C. 内、外开式都可以
【单选题】
液体发生闪燃的最低温度叫___。
A. 燃点
B. 闪点
C. 自燃点
【单选题】
在同一房间或同一区域内,不同物品之问分开一定的距离,非禁忌物料之间用通道保持空间的储存方式,属于___储存。
A. 隔开
B. 隔离
C. 分离
【单选题】
在危险化学品生产或储存区域,如见到以下的标记,表示___。
A. 必须佩戴防尘口罩
B. 必须戴防护眼镜
C. 必须戴防毒面具
【单选题】
根据《危险化学品重大危险源辨识》(GB18218-2009)标准,单元是指一个(套)生产装置、设施或场所,或同属一个生产经营单位的且边缘距离小于___m的几个(套)生产装置、设施或场所。
A. 100
B. 200
C. 500
【单选题】
包装按包装容器的耐变形能力分为___。
A. 内包装和外包装
B. 运输包装和销售包装
C. 软包装和硬包装
【单选题】
爆炸品宜储藏于___级轻顶耐火建筑的库房内。
A. 一
B. 二
C. 三
【单选题】
___告诉我们,构成管理系统的各要素是运动和发展的,它们相互联系又相互制约。在生产经营单位建立、健全安全生产责任制是对这一原则的应用。
A. 动力原则
B. 动力相关性原则
C. 人本原理
【单选题】
危险化学品道路运输企业、水路运输企业应当配备___安全管理人员。
A. 兼职
B. 专职
C. 专职兼职都可以
【单选题】
人们在从事管理工作时,运用系统观点、理论和方法,对管理活动进行充分的系统分析,以达到管理的优化目标,这是___原理。
A. 系统
B. 人本
C. 预防
【单选题】
易燃品闪点在28℃以下,气温高于28℃时应在___运输。
A. 黄昏
B. 夜间
C. 白天
【单选题】
对主管部门要求备案的应急演练资料,演练___应将相关资料报主管部门备案。
A. 组织部门(单位)
B. 参演单位
C. 评估人员
【单选题】
《中华人民共和国突发事件应对法》规定,突发事件应对工作原则为预防为主、___。
A. 安全第一
B. 预防与应急相结合
C. 以人为本
【单选题】
___即根据演练工作需要,采取必要安全防护措施,确保参演、观摩等人员以及生产运行系统安全。
A. 演练工作安全保障
B. 安全防护措施
C. 系统安全
【单选题】
在应急救援过程中,救援人员首先应熟悉地形,明确撤离___;准备好进入危险区应携带的标志物、扩音器以及强光手电等必要器材。
A. 方向
B. 人数
C. 工具
【单选题】
根据《工伤保险条例》的规定,工伤保险费的缴纳,以下正确的是___。
A. 由用人单位缴纳,职工个人不缴纳
B. 按照国家、集体和个人三方负担的原则,由国家,用人单位和职工个人三方缴纳
C. 国家承担主要部分,用人单位次之,个人再次之
【单选题】
《危险化学品安全管理条例》规定,国家对危险化学品的使用有___规定的,任何单位和个人不得违反该规定使用危险化学品。
A. 限制性
B. 强制性
C. 约束性
【单选题】
《安全生产法》规定,生产经营单位采用新工艺、新技术、新材料或者使用新设备,必须了解、掌握其___特性,采取有效的安全防护措施,并对从业人员进行专门的安全生产教育和培训。
A. 商品
B. 材料
C. 安全技术
【单选题】
《气瓶安全监察规程》规定,盛装一般性气体的气瓶,每___年检验一次。
A. 1
B. 3
C. 5
【单选题】
锅炉和压力容器安全三大附件为压力表、安全阀和___。
A. 水位计
B. 温度计
C. 烟气氧含量分析仪
【单选题】
我国职业病目录中,有___。
A. 9类,99种
B. 10类,99种
C. 10类,115种
【单选题】
贴安全标签的目的是为了警示使用者,此种化学品的___以及一旦发生事故应采取的救护措施。
A. 危害性
B. 有害性
C. 物理性
【单选题】
不属于炸药爆炸的三要素是___。
A. 反应过程的放热性
B. 反应过程的高速性
C. 反应过程的燃烧性
【单选题】
可燃液体的饱和蒸气压越大,其火灾危险性___。
A. 越大
B. 越小
C. 不受影响
【单选题】
常用危险化学品标志中的图形为“骷髅头和交叉骨形”,标示危险化学品为___。
A. 有毒品
B. 腐蚀品
C. 爆炸品
推荐试题
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用