【单选题】
配网抢修物资按照城区(市区)___小时,农村(郊区)_____小时,偏远山区______小时配送时效配送。
A. 2,3,5
B. 2,3,6
C. 2,4,6
D. 1,3,5
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
报废物资处置工作中,报废物资价值评估报告由___单位编制。
A. 物资部
B. 财务部
C. 财务委托中介结构
D. 供电局
【单选题】
各分子公司应根据各地市局库容量,定期集中批量处置本单位报废物资,原则上每半年至少处置___次。
【单选题】
工程结余物资和工程余料按___入账。
A. 物资市场价值
B. 原账面价值
C. 账面净值计价
D. 物资账面余额
【单选题】
物资部门对达到___轮换年限(特殊情况,可适当调整时间)的储备物资列入轮换计划清单范围,轮换计划清单经部门审核后,发至相应专业部门安排利用计划,并将清单物资纳入物资需求申报阶段平衡利库范围。
A. 三分之二
B. 四分之三
C. 五分之四
D. 使用或存储年限超过
【单选题】
以下哪项不属于逆向物资鉴定报告应明确的信息___
A. 鉴定结果
B. 使用方式、使用价值、账面价值
C. 出入库时间
D. 允许存放的期限
【单选题】
报废手续包括___
A. 报废物资清册、资产损失报告(若存在资产损失)
B. 鉴定报告及审批表、报废物资转让审批表、
C. 经财务部门核算的报废物资入库价值、报废物资转让审批表
D. 以上均是
【单选题】
报废物资办完报废审批手续后(报废审批手续应明确入库价值),相关部门向物资部门移交报废审批手续的同时,提前___个工作日提出入库申请。
【单选题】
分子公司财务部对报废评估申请进行审核,并在审核无误后___个工作日内组织完成有关资价值评估并报公司财务部备案。
【单选题】
计量表计退运后,允许物资使用管理部门将退运表计暂存在仓库待鉴定区,存放时间不超过___个抄表周期
【单选题】
退役物资(资产)在未完成鉴定前由___部门负责回收、保管;工程余料、工程结余物资在未完成鉴定前由________部门负责回收、保管。
A. 物资使用管理、项目管理
B. 财务、项目管理
C. 物资、生产设备管理
D. 物资使用管理、基建
【单选题】
以下哪项不属于报废物资处理需注意的事情。___
A. 符合安全、质量和环境的要求
B. 防止出现重复使用
C. 提高出库频率
D. 防止污染环境现象
【单选题】
闲置物资管理的原则不包括___。
A. 分级管理
B. 平衡利库
C. 调剂优先
D. 量化考核
【单选题】
闲置物资管理应遵循___的原则。
A. 滚动鉴定、分级管理、调剂优先、量化考核
B. 统筹管理、分级处理、程序规范、公开公平
C. 速度第一、效率优先、多种储备、综合利用
D. 监控节点、动态评价、量化考核
【单选题】
闲置物资无法在本单位范围内再利用的,可按照有关规定,由___负责实施产权转让
A. 物资使用管理部门
B. 物资管理部门
C. 物资使用部门
D. 项目设计院
【单选题】
闲置物资再利用遵循的原则是___。
A. 内部消化为主、统筹调剂为辅
B. 内部消化为辅、统筹调剂为主
C. 外部消化为主、统筹调剂为辅
D. 内部消化为主、统一分配为辅
【单选题】
《中国南方电网有限责任公司物资管理规定》逆向物资分为___
A. 闲置物资和报废物资
B. 退运物资和报废物资
C. 工程余料和工程结余物资
D. 闲置物资和退运物资
【单选题】
某单位办理退役设备入库工作,以下哪项不是物资部门的职责?___
A. 组织鉴定
B. 入库办理
C. 闲置设备统计评价
D. 入库后闲置设备的调拨
【单选题】
物资部门根据储备物资补货需求,可将闲置物资转为___。
A. 储备物资
B. 定额物资
C. 项目物资
D. 补货物资
【单选题】
根据《中国南方电网有限责任公司逆向物资管理办法》规定,以下选项正确的是___
A. 工程结余是指在基建、技改、应急等工程中使用过的剩余物资
B. 工程余料物资是指基建、技改、应急等项目因工程变更等原因无法在原项目中应用,且未使用过的物资
C. 退役物资(资产)是指在生产经营中因磨损、损坏、技术更新、工程拆除(含灾害抢修)、严重污染环境或按上级有关规定等原因退出使用的物资(资产)
D. 闲置物资是指经鉴定未丧失其应具备的使用功能,但已不再使用的逆向物资
【单选题】
退役设备拆除后,项目管理部门根据回收损失标准判定是否足额回收,如出现差异,项目管理部门应编制___,经本单位领导审批后,抄送财务部门。
A. 回收报告
B. 拒收请示
C. 差异报告
D. 设备拆除说明
【单选题】
对于需要修复的闲置设备,设备专业管理部门在修复后___个工作日内进行入库登记。
【单选题】
物资部门应建立闲置物资信息共享平台,按照“内部消化为主、统筹调剂为辅”的原则,在___阶段强制平衡利库。
A. 项目立项
B. 需求申报
C. 调拨
D. 配送
【单选题】
各类急救包储备物资清单应紧密结合不同专业生产班组日常维修、抢修所需的___编制,______物资归集在一二级仓库储备,满足效率效益原则。
A. 常用物资、高周转率
B. 常用物资、低周转率
C. 不常用物资、高周转率
D. 不常用物资、低周转率
【单选题】
各专业应结合物资品类优化结果,遵循___的原则,提出并优化清单,减少储备物资种类。
A. 互换性和通用性
B. 互换性和针对性
C. 互换性
D. 通用性
【单选题】
根据《中国南方电网有限责任公司仓储配送管理办法》,储备定额(定额)是指___的存储数量标准,即最高储备量、安全库存、重购线及重购量。
A. 备品备件
B. 生产运维
C. 救灾应急
D. 就低不就高
【单选题】
物资部门对照定额核查实际储备,按照___原则,制订一级仓(区域仓)储备物资补货计划
A. 定额存储、动态补仓
B. 多种方式、定额存储
C. 定额存储、综合利用
D. 动态补仓、综合利用
【单选题】
协议储备轮换年限在储备协议中约定,由___负责轮换
A. 物资部门
B. 专业部门
C. 供应商
D. 物资部门或供应商
【单选题】
储备方式应优先采用___方式,不能满足供应时效要求的采用_______方式。
A. 自购储备、协议储备
B. 协议储备、自购储备
C. 协议储备、协议储备
D. 自购储备、自购储备
【单选题】
各专业部门在公司储备清单范围提出储备定额需求,内容包括___
A. 物资编码、型号规格
B. 需求数量、供应时效、单一来源物资的供应商名称
C. 轮换年限、适用范围、相关订货技术规范
D. 以上均是
【单选题】
物资部门根据什么因素编制本级统筹储备的储备定额。___
A. 储备定额需求
B. 综合仓库层级及急救包设置
C. 配送能力、历史用量统计
D. 以上均是
【单选题】
一级仓(区域仓)采取___方式,储备库存达到定额_____时按_____编制补货计划。
A. 定期补货、重购量、重购线
B. 定量补货、重购量、重购线
C. 定期补货、重购线、重购量
D. 定量补货、重购线、重购量
【单选题】
储备物资是指公司为满足生产、经营、抢险、抢修等需要,实行___存储的物资。
【单选题】
协议储备是指供应商依照协议储存物资但所有权属于___的储备方式。
A. 需求部门
B. 物资部门
C. 供应商
D. 施工单位
【单选题】
一级仓(区域仓)采取定量补货方式,储备库存达到定额___时按重购量编制补货计划。
【单选题】
一级仓(区域仓)采取___补货方式,储备库存达到定额重购线时按重购量编制补货计划。
A. 不定量
B. 不定期
C. 定量
D. 定期
【单选题】
储备物资按储备方式分有___。
A. 自购储备
B. 协议储备
C. 自购储备、协议储备
【单选题】
储备物资达到___轮换年限后,由物资部门组织再利用工作,转为项目物资
A. 0.33333333333
B. 0.4
C. 0.66666666667
D. 0.5
【单选题】
网公司统筹储备物资以及I级和II级应急响应下物资跨省调拨由___组织
A. 网公司物资部
B. 省公司物资部
C. 地市局物流中心
D. 供应商
【单选题】
储备物资基本分类:主网物资、___、表计物资、救灾应急物资。
A. 报废物资
B. 闲置物资
C. 线材类物资
D. 配网物资
【单选题】
储备物资是指公司及所属各单位为保障生产、经营所需,按___储备的物资。
A. 现状
B. 历史使用量
C. 需求
D. 定额
推荐试题
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49