刷题
导入试题
【判断题】
为了有利于静电的泄露,可采用静电导电性工具。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
静电事故多发生在潮湿的季节。
A. 对
B. 错
【判断题】
从事使用高毒物品作业的用人单位,应当配备专职的或者兼职的职业卫生医师和护士;不具备配备专职的或者兼职的职业卫生医师和护士条件的,应当与依法取得资质认证的职业卫生技术服务机构签订合同,由其提供职业卫生服务。
A. 对
B. 错
【判断题】
使用有毒物品作业的用人单位应当按照国务院卫生行政部门的规定,定期对使用有毒物品作业场所职业中毒危害因素进行检测、评价。
A. 对
B. 错
【判断题】
职业性危害因素所致职业危害的性质和强度取决于危害因素的本身理化性能。
A. 对
B. 错
【判断题】
申请易制毒化学品运输许可,应当提交易制毒化学品的购销合同,货主是企业的,应当提交营业执照;货主是其他组织的,应当提交登记证书(成立批准文件);货主是个人的,应当提交其个人身份证明。经办人还应当提交本人的身份证明。
A. 对
B. 错
【判断题】
生产经营单位风险种类多、可能发生多种事故类型的,可以不用编制本单位的综合应急预案。
A. 对
B. 错
【判断题】
危险化学品可以露天堆放,但应符合防火、防爆的安全要求。爆炸物品、一级易燃物品、遇湿燃烧物品、剧毒物品不得露天堆放。
A. 对
B. 错
【判断题】
危险化学品运输企业必须具备的条件由国务院交通部门规定。
A. 对
B. 错
【判断题】
生产经营单位必须依法参加工伤社会保险,保险费由从业人员和单位各缴纳一半。
A. 对
B. 错
【判断题】
危险化学品的储存单位在储存场所可酌情确定是否设置通信、报警装置,并保证处于正常状态。
A. 对
B. 错
【判断题】
储藏易燃易爆品的库房,应冬暖夏凉、干燥、易于通风、密封和避光。
A. 对
B. 错
【判断题】
危险化学品仓库根据危险品特性和仓库条件,必须配置相应的消防设备、设施和灭火药剂。
A. 对
B. 错
【判断题】
锅炉包括两大部分:盛装水、汽的“锅”和进行燃烧加热的“炉”。
A. 对
B. 错
【判断题】
《气瓶安全监察规程》规定,瓶装气体和气瓶经销单位必须经销有制造许可证企业的合格气瓶和气体。
A. 对
B. 错
【判断题】
静电的消失主要有两种方式即中和和泄漏。
A. 对
B. 错
【判断题】
电流持续时间愈长,人体电阻因出汗等原因而降低,使通过人体的电流进一步增加,危险性也随之增加。
A. 对
B. 错
【判断题】
可燃气体以一定的比例与空气混合后,在一定条件下所产生的爆炸属于化学爆炸。
A. 对
B. 错
【判断题】
只要具备燃烧三要素(可燃物、助燃物、点火源),即会引起燃烧。
A. 对
B. 错
【判断题】
抗溶性泡沫不仅可以扑救一般液体烃类的火灾,还可以有效地扑救水溶性有机溶剂的火灾。
A. 对
B. 错
【判断题】
对用人单位违反《用人单位职业健康监护监督管理办法》的行为,任何单位和个人均有权向安全生产监督管理部门举报或者报告。
A. 对
B. 错
【判断题】
走私易制毒化学品的,由海关没收走私的易制毒化学品;有违法所得的,没收违法所得,并依照海关法律、行政法规给予行政处罚;构成犯罪的,依法追究刑事责任。
A. 对
B. 错
【判断题】
新建的生产企业应当在竣工验收后办理危险化学品登记。
A. 对
B. 错
【判断题】
一次事故中死亡3~9人的是特大生产安全事故。
A. 对
B. 错
【判断题】
职工因工作遭受事故伤害或者患职业病进行治疗,享受工伤医疗待遇。
A. 对
B. 错
【判断题】
互为禁忌物料的危险化学品可以装在同一车、船内运输。
A. 对
B. 错
【判断题】
除矿山、建筑施工单位和易燃易爆物品、危险化学品、放射性物品等危险物品的生产、经营、储存、使用单位和中型规模以上的其他生产经营单位外,其他生产经营单位应当对本单位编制的应急预案进行论证。
A. 对
B. 错
【判断题】
运输散装固体危险物品,应根据性质,采取防火、防爆、防水、防粉尘飞扬和遮阳措施。
A. 对
B. 错
【判断题】
储存危险化学品建筑物内不宜增设采暖设施。
A. 对
B. 错
【判断题】
化学品安全技术说明书,又被称为物质安全技术说明书,简称SDS。
A. 对
B. 错
【判断题】
从事危险化学品零售业务的店面内只许存放民用小包装的危险化学品,其存放总量不得超过2t。
A. 对
B. 错
【判断题】
根据能量意外释放理论,可以利用各种屏蔽或防护设施来防止意外的能量转移,从而防止事故的发生。
A. 对
B. 错
【判断题】
在可能发生人身伤害、设备或设施损坏和环境破坏的场合,事先采取措施,防止事故发生。
A. 对
B. 错
【判断题】
生产经营单位的主要负责人、安全生产管理人员及从业人员的安全培训,由生产经营单位负责。
A. 对
B. 错
【判断题】
直接接触触电与间接接触触电的最主要的区别是发生电击时所触及的带电体是正常运行的带电体还是意外带电的带电体。
A. 对
B. 错
【判断题】
接触职业病危害因素的劳动者在作业过程中出现与所接触职业病危害因素相关的不适症状时,用人单位应当立即组织有关劳动者进行应急职业健康检查。
A. 对
B. 错
【判断题】
《使用有毒物品作业场所劳动保护条例》规定,使用单位应将危险化学品的有关安全卫生资料向职工公开,教育职工识别安全标签、了解安全技术说明书、掌握必要的应急处理方法和自救措施,经常对职工进行工作场所安全使用化学品的教育和培训。
A. 对
B. 错
【判断题】
发生危险化学品事故,事故单位安全管理人员应当立即按照本单位危险化学品应急预案组织救援,并向当地安全生产监督管理部门和环境保护、公安、卫生主管部门报告。
A. 对
B. 错
【判断题】
装卸易燃易爆品人员,在各项操作中可以使用手持金属装卸工具,但作业现场应远离热源和火源。
A. 对
B. 错
【判断题】
企业应负责制定现场应急预案,并且定期检验和评估现场应急预案和程序的有效程度,并适时进行修订。
A. 对
B. 错
【判断题】
在工业生产中,有毒品侵入人体的主要途径是呼吸道、消化道和皮肤。
A. 对
B. 错
推荐试题
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用