【判断题】
挖掘通信管道沟(坑)施工现场,应设置蓝白相间的临时护栏或醒目的标志。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
不同种类、标号的水泥不得混合使用;砂和石料的含泥量如超过标准,必须用水洗干净后方能使用。
【判断题】
混凝土的搅拌必须均匀,以混凝土颜色一致为度。搅拌均匀的混凝土应在初凝期内浇筑完毕。
【判断题】
人(手)孔、通道内部净高应符合设计规定,墙体的垂直度允许偏差应不大于±20mm,墙体顶部高程允许偏差不应大于±30mm。
【判断题】
通信管道工程的砌体,严禁使用掺有白灰的混合砂浆进行砌筑。
【判断题】
上覆、盖板混凝土必须达到设计规定的强度以后,方可承受荷载或吊装、运输。
【判断题】
人(手)孔口圈顶部高程应符合设计规定,允许负偏差不应大于20mm。
【判断题】
炎热夏季和严寒冬季施工都要盖草袋,注意混凝土的防晒和防冻。
【判断题】
塑料管道的基础,土质较好的地区(如硬土),挖好沟槽后夯实沟底,回填50mm细砂或细土。
【判断题】
塑料管道的基础,土质稍差的地区(如松软不稳定地区),挖好沟槽后应做混凝土基础,基础上回填50mm细砂或细土
【判断题】
改、扩建水泥管道工程,可以在原有管道两侧加扩管孔。
【判断题】
塑料管道铺设时,塑料管群的矩形高度不宜小于宽度,但不宜超过一倍。
【判断题】
塑料管道铺设时,直线管道的段长不应大于150m。
【判断题】
直线管道管孔试通,应采用拉棒方式试通。拉棒的长度一般为900mm,拉棒的直径为管孔内径的95%。
【判断题】
凡有出厂证明的器材,经检验发现问题时,应立即撤离现场。
【判断题】
通信管道工程中使用水泥的品种、标号应符合设计要求
【判断题】
管块的标称孔径允许最大正偏差不应大于0. 5mm,负偏差不应大于lmm,管孔无形变。
【判断题】
水泥管块强度有问题应进行抽样试验。抽样的数量应以工程用管总量的3%。(或大分屯点数量的5%)为基数,试验的管块有90%达到标准即为合格
【判断题】
钢材的材质、规格、型号应符合设计文件的规定,不得有锈片剥落或严重锈蚀。
【判断题】
人(手)孔井盖装置(包括外盖、内盖、口圈等)的规格应符合标准图的规定。
【判断题】
桩点设置应牢固,顶部宜与地面平齐。桩点附近有临时建(构)筑物时,可做定位检点,并做好标志和记录。
【判断题】
施工现场条件允许,土层坚实及地下水位低于沟(坑)底,且挖深超过2m时,可采用放坡法施工
【判断题】
室外最低气温在零下5℃时,对所挖的沟(坑)底部,应采取有效的防冻措施。
【判断题】
在市内主于道路的回填土夯实,应与路面平齐。
【判断题】
人(手)孔坑的回填土,需高出人(手)孔口圈的高程50mm。
【判断题】
混凝土在初凝之前如发生离析现象,该混凝土不得使用于工程上。
【判断题】
砖、混凝土砌块(以下简称砌块)砌筑前应充分浸湿,砌体面应平整、美观,不应出现横向通缝。
【判断题】
相邻两组穿钉间距应符合设计规定,偏差应小于10mm.
【判断题】
管顶距人(手)孔、通道上覆及沟盖底面不应小于300mm。管底距人(手)孔、通道基础面不应小于400mm。
【判断题】
通信管道宜采用素混凝土基础,混凝土的标号、基础宽度、基础厚度应符合设计规定。
【判断题】
对于新建、改建的建筑物,楼外预埋的通信管道应与建筑物的建设同步进行,并应与公用通信管道相连接。
【判断题】
通信管道建设规划必须纳入城市建设规划。
【判断题】
在终期管孔容量较大的宽阔道路上,当规划道路红线之间的距离大于或等于30米时,应在道路的两侧修建管道或通道。
【判断题】
通信管道与通道宜选择地下、地上障碍物较少的街道。
【判断题】
通信管道穿越铁路和较宽的道路时,应在其两侧设置人(手)孔。
【判断题】
通信管道铺设时,同一段管道不应有反向弯曲(即S型弯曲)或弯曲部分的中心夹角小于90°的弯管道(即U型弯)。
【判断题】
单一方向标准孔(孔径90mm)不多于24孔、孔径为28mm或32mm的多孔管不多于36孔容量时,宜选用小号人孔。
【判断题】
单一方向标准孔(孔径90mm)不多于48孔、孔径为28mm或32mm的多孔管不多于72孔容量时,宜选用大号人孔。
【判断题】
对于地下水位较高地段,人(孔)建筑应做防水处理。
推荐试题
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic