【单选题】
工作票所列人员的安全责任中工作前对被监护人员交待监护范围内的安全措施、告知危险点和安全注意事项是___的安全责任。
A. 工作票签发人;
B. 工作负责人(监护人);
C. 工作许可人;
D. 专责监护人
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
工作票所列人员的安全责任中监督被监护人员遵守本规程和执行现场安全措施,及时纠正被监护人员的不安全行为是___的安全责任。
A. 工作负责人(监护人);
B. 工作许可人;
C. 专责监护人;
D. 工作班成员
【单选题】
验电前,应先在有电设备上进行试验,确认验电器良好;无法在有电设备上进行试验时,可用___高压发生器等确认验电器良好。
A. 工频;
B. 高频;
C. 中频;
D. 低频
【单选题】
使用伸缩式验电器时应保证绝缘的___。
A. 长度;
B. 有效;
C. 有效长度;
D. 良好
【单选题】
个人保安线应使用有透明护套的多股软铜线,截面积不准小于___mm2,且应带有绝缘手柄或绝缘部件。
A. 16;
B. 18;
C. 20;
D. 25
【单选题】
在一经合闸即可送电到工作地点的断路器(开关)、隔离开关(刀闸)及跌落式熔断器的操作处,均应悬挂“禁止合闸,线路有人工作!”或___的标示牌。
A. “止步,高压危险!”;
B. “禁止合闸,有人工作!”;
C. “高压危险!”;
D. “有人工作!”
【单选题】
临时围栏应装设牢固,并悬挂___的标示牌。
A. “止步,高压危险!”;
B. “禁止合闸,有人工作!”;
C. “高压危险!”;
D. “有人工作!”
【单选题】
凡在坠落高度基准面___m及以上的高处进行的作业,都应视作高处作业。
A. 1.5;
B. 2;
C. 2.5;
D. 3
【单选题】
安全带的挂钩或绳子应挂在结实牢固的构件或专为挂安全带用的钢丝绳上,并应采用___的方式。
A. 低挂低用;
B. 高挂高用;
C. 高挂低用;
D. 低挂高用
【单选题】
在5级及以上的大风以及暴雨、雷电、冰雹、大雾、沙尘暴等恶劣天气下,___露天高处作业。
A. 应停止;
B. 不宜;
C. 采取措施可;
D. 经工作负责人同意可
【单选题】
检修动力电源箱的___开关都应加装剩余电流动作保护器(漏电保护器)并应定期检查和试验。
A. 总路;
B. 分路;
C. 支路;
D. 设备
【单选题】
电焊机的外壳应可靠接地,接地电阻不准大于___Ω。
【单选题】
电气工具和用具应由专人保管,每___应由电气试验单位进行定期检查。
A. 3个月;
B. 6个月;
C. 9个月;
D. 一年
【单选题】
使用金属外壳的电气工具时应戴___。
A. 帆布手套;
B. 纱手套;
C. 绝缘手套;
D. 专用手套
【单选题】
长期停用或新领用的电动工具应用500V的绝缘电阻表测量其绝缘电阻,如带电部件与外壳之间的绝缘电阻值达不到___MΩ,应进行维修处理。
【多选题】
参与公司系统所承担电气工作的外单位或外来工作人员应熟悉《安规》,经考试合格,并经设备运维管理单位认可,方可参加工作。工作前,设备运维管理单位应告知___。
A. 作业时间;
B. 危险点;
C. 现场电气设备接线情况;
D. 安全注意事项
【多选题】
各类作业人员有权拒绝___。
A. 强令冒险作业;
B. 违章指挥;
C. 加班工作;
D. 带电工作
【多选题】
雷雨天气,需要巡视室外高压设备时,应穿绝缘靴,并不准靠近___。
A. 互感器;
B. 避雷针;
C. 避雷器;
D. 构架
【多选题】
___、泥石流等灾害发生后,如需要对设备进行巡视时,应制定必要的安全措施,得到设备运维管理单位批准,并至少两人一组,巡视人员应与派出部门之间保持通信联络。
A. 地震;
B. 台风;
C. 洪水;
D. 高温
【多选题】
操作票应用黑色或蓝色的___逐项填写。
A. 钢笔;
B. 圆珠笔;
C. 水笔 ;
D. 铅笔
【多选题】
工作票可以由___填写。
A. 工作许可人;
B. B.工作班成员;
C. 工作票签发人;
D. 工作负责人
【多选题】
工作票签发人应是___的生产领导人、技术人员或经本单位批准的人员。
A. 具有相关工作经验;
B. 熟悉工作班成员的工作能力;
C. 熟悉人员技术水平;
D. 熟悉《安规》;
E. 熟悉设备情况
【多选题】
工作票签发人的安全职责为___。
A. 确认工作必要性和安全性;
B. 确认工作票上所填写安全措施是否正确完备;
C. 确认所派工作负责人和工作班人员是否适当和充足;
D. 确认工作班成员状态良好;
E. 负责检查工器具合适
【多选题】
专责监护人的安全职责是___。
A. 负责检查工作票所列安全措施是否正确完备,是否符合现场实际条件,必要时予以补充;
B. 确认被监护人员和监护范围;
C. 工作前,对被监护人员交待监护范围内的安全措施、告知危险点和安全注意事项;
D. 监督被监护人员遵守《安规》和现场安全措施,及时纠正被监护人员的不安全行为
【多选题】
工作负责人、工作许可人任何一方不得擅自变更安全措施,工作中如有特殊情况需要变更时,应___。
A. 先取得对方同意;
B. 先取得工作票签发人同意;
C. 先取得当值调度的同意;
D. 变更情况及时记录在值班日志内;
E. 及时恢复
【多选题】
工作许可手续完成后,___应向工作班成员交待工作内容、人员分工、带电部位和现场安全措施,进行危险点告知,并履行确认手续,工作班方可开始工作。
A. 工作负责人;
B. 专责监护人;
C. 工作许可人;
D. 工作票签发人
【多选题】
工作票签发人或工作负责人,应根据现场的___等具体情况,增设专责监护人和确定被监护的人员。
A. 安全条件;
B. 施工范围;
C. 工作需要;
D. 安全措施
【多选题】
工作期间,若工作负责人必须长时间离开工作现场时,应___。
A. 履行变更手续,并告知全体作业人员及工作许可人;
B. 由有权签发工作票的人变更工作负责人;
C. 原、现工作负责人应做好必要的交接;
D. 由原工作票签发人变更工作负责人
【多选题】
在转移工作地点时,工作负责人应向作业人员交待___。
A. 带电范围;
B. 安全措施;
C. 停电时间;
D. 注意事项
【多选题】
在电气设备上工作,保证安全的技术措施有___。
A. 工作票制度;
B. 停电;
C. 接地;
D. 悬挂标示牌和装设遮栏(围栏);
E. 工作许可制度;
F. 验电
【多选题】
工作许可手续完成后,___应向工作班成员交待工作内容、人员分工、带电部位和现场安全措施,进行危险点告知,并履行确认手续,工作班方可开始工作。
A. 工作负责人;
B. 专责监护人;
C. 工作许可人;
D. 工作票签发人
【多选题】
工作票签发人或工作负责人,应根据现场的___等具体情况,增设专责监护人和确定被监护的人员。
A. 安全条件;
B. 施工范围;
C. 工作需要;
D. 安全措施
【多选题】
工作期间,若工作负责人必须长时间离开工作现场时,应___。
A. 履行变更手续,并告知全体作业人员及工作许可人;
B. 由有权签发工作票的人变更工作负责人;
C. 原、现工作负责人应做好必要的交接;
D. 由原工作票签发人变更工作负责人
【多选题】
在转移工作地点时,工作负责人应向作业人员交待___。
A. 带电范围;
B. 安全措施;
C. 停电时间;
D. 注意事项
【多选题】
在电气设备上工作,保证安全的技术措施有___。
A. 工作票制度;
B. 停电;
C. 接地;
D. 悬挂标示牌和装设遮栏(围栏);
E. 工作许可制度;
F. 验电
【多选题】
线路的停、送电均应按照___的指令执行。
A. 值班调控人员;
B. 变电运行值班负责人;
C. 线路工作负责人;
D. 线路工作许可人
【多选题】
带电作业应在良好天气下进行。如遇___等,禁止进行带电作业。风力大于5级,或湿度大于80%时,不宜进行带电作业。
A. 雷电;
B. 雹;
C. 雪;
D. 多云;
E. 雾;
F. 雨
【多选题】
带电作业工作票签发人和工作负责人、专责监护人应由具有___的人员担任。
A. 带电作业资格;
B. 高级工程师资格;
C. 带电作业实践经验;
D. 技师资格
【多选题】
在带电设备周围禁止使用___进行测量工作。
A. 钢卷尺;
B. 绝缘绳;
C. 皮卷尺;
D. 线尺(夹有金属丝者)
【多选题】
在户外变电站和高压室内搬动梯子、管子等长物,应___。
A. 与高压设备保持足够的安全距离;
B. 两人放倒搬运;
C. 与带电部分保持足够的安全距离;
D. 一人搬运
【多选题】
参与公司系统所承担电气工作的外单位或外来工作人员应熟悉《安规》,经考试合格,并经设备运维管理单位认可,方可参加工作。工作前,设备运维管理单位应告知___。
A. 作业时间;
B. 危险点;
C. 现场电气设备接线情况;
D. 安全注意事项
推荐试题
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.