刷题
导入试题
【判断题】
《安全生产法》第四十八条规定,生产经营单位必须依法参加工伤保险,为从业人员缴纳保险费。[1分]
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
职业病诊断标准和职业病诊断、鉴定办法由国务院劳动保障行政部门制定。[1分]
A. 对
B. 错
【判断题】
严禁电厂等重要用户在用气情况下进行切换试。[1分]
A. 对
B. 错
【判断题】
停役的设备设施上有工作,不需要需挂上“禁止操作”标志牌。[1分]
A. 对
B. 错
【判断题】
用人单位与劳动者订立劳动合同(含聘用合同,下同)时,应当将工作过程中可能产生的职业病危害及其后果、职业病防护措施和待遇等如实告知劳动者,并在劳动合同中写明,不得隐瞒或者欺骗。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第六十二条规定,安全生产监督管理部门对检查中发现重大事故隐患排除前或者排除过程中无法保证安全的,应当提醒作业人员从危险区域内撤出。[1分]
A. 对
B. 错
【判断题】
正常操作应尽量避免在交接班时进行,必须在交接班时进行的操作,则由接班人负责操作完毕。[1分]
A. 对
B. 错
【判断题】
职业卫生技术服务机构依法从事职业病危害因素检测、评价工作,接受安全生产监督管理部门的监督检查。[1分]
A. 对
B. 错
【判断题】
值班调度通过电话发布操作指令应准确、清晰并使用正规的操作术语和设备双重命名。[1分]
A. 对
B. 错
【判断题】
《职业病防治法》第三十四条规定,用人单位应当对劳动者进行上岗前的职业卫生培训和离岗期间的定期职业卫生培训,普及职业卫生知识,督促劳动者遵守职业病防治法律、法规、规章和操作规程,指导劳动者正确使用职业病防护设备和个人使用的职业病防护用品。[1分]
A. 对
B. 错
【判断题】
进出站场工艺区、配电间、发电机房、控制室等无关人员禁止入内的场所,应随手关门。[1分]
A. 对
B. 错
【判断题】
工作过程中发现设备设施与运行设备设施不能有效隔离的,应采取有效防范措施,并在工作负责人现场全程监护下,方可继续工作。[1分]
A. 对
B. 错
【判断题】
站场运行人员巡视时,应随身携带可燃气体检测仪,特别是在进入封闭空间内巡视输气管道设备设施时,应先检测可燃气体浓度符合要求。[1分]
A. 对
B. 错
【判断题】
管道运行温度应控制在管道(含防腐材料)允许的上、下温度限值之间。[1分]
A. 对
B. 错
【判断题】
任何单位和个人不得将产生职业病危害的作业转移给不具备职业病防护条件的单位和个人。[1分]
A. 对
B. 错
【判断题】
生产经营单位使用被派遣劳动者的,被派遣劳动者享有同本单位从业人员完全等同的权利,并应当履行完全等同的义务。[1分]
A. 对
B. 错
【判断题】
站场运行人员应按照规定的巡视路线、频次对设备进行巡视,当远传值与就地值偏差达2%时,应及时填写缺陷单,并报告。[1分]
A. 对
B. 错
【判断题】
管道企业应在相关操作管理制度中明确特别重要和复杂操作项目界定标准。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第九条规定,国务院安全生产监督管理部门对全国安全生产工作实施管理。[1分]
A. 对
B. 错
【判断题】
发电机运行中,应观察运行情况及相关参数,发现有异常声响、异味等情况,可继续运行,但不得湿手触摸发电机。[1分]
A. 对
B. 错
【判断题】
劳动者可以在用人单位所在地、本人户籍所在地或者经常居住地依法承担职业病诊断的医疗卫生机构进行职业病诊断。[1分]
A. 对
B. 错
【判断题】
站场运行值班人员应对安防系统进行实时监控,发现异常应及时处置。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第二十条规定,生产经营单位应当具备的安全生产条件所必需的资金投入,由生产经营单位的决策机构、主要负责人或者个人经营的投资人予以保证,并对由于安全生产所必需的资金投入不足导致的后果承担责任。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第四十条规定,生产经营单位进行吊装作业时,应当指定兼职人员负责进行现场安全管理。[1分]
A. 对
B. 错
【判断题】
工作票所列安全措施全部操作或布置完毕后,工作许可人方可许可工作,并及时向发令人报告。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第七十一条规定,任何单位和个人对事故隐患或者安全生产违法行为,均有权向负有安全生产监督管理职责的部门报告或者举报。[1分]
A. 对
B. 错
【判断题】
工作许可人正确完成工作票所列安全措施的操作,并检查工作范围与运行设备是否有效隔离,设备设施是否有突然来气、来电等危险。[1分]
A. 对
B. 错
【判断题】
用人单位不得安排未成年工从事接触职业病危害的作业;不得安排孕期、哺乳期的女职工从事对本人和胎儿、婴儿有危害的作业。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第十二条规定,有关协会组织依照法律、行政法规和章程,为生产经营单位提供安全生产方面的信息、培训等服务,发挥自律作用,促进生产经营单位加强安全生产管理。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第二十三条规定,生产经营单位不得因安全生产管理人员依法履行职责而降低其工资、福利等待遇或者解除与其订立的劳动合同。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第二十七条规定,生产经营单位的特种作业人员必须按照国家有关规定经专门的安全作业培训,取得相应资格,方可上岗作业。[1分]
A. 对
B. 错
【判断题】
产生职业病危害的用人单位,应当在醒目位置设置公告栏,公布有关职业病防治的规章制度、操作规程和工作场所职业病危害因素检测结果。[1分]
A. 对
B. 错
【判断题】
用人单位可以安排未经上岗前职业健康检查的劳动者从事接触职业病危害的作业。[1分]
A. 对
B. 错
【判断题】
《职业病防治法》第七条规定,用人单位必须依法参加工伤保险。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第二十五条规定,劳务派遣单位应当对被派遣劳动者进行必要的安全生产教育和培训。生产经营单位使用被派遣劳动者的,不必对被派遣劳动者进行岗位安全操作规程和安全操作技能的教育和培训。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第四十五条规定,两个以上生产经营单位在同一作业区域内进行生产经营活动,可能危及对方生产安全的,应当签订安全生产管理协议,明确各自的安全生产管理职责和应当采取的安全措施,并指定专职安全生产管理人员进行安全检查与协调。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第二条规定,有关法律、行政法规对消防安全和道路交通安全、铁路交通安全、水上交通安全、民用航空安全以及核与辐射安全、特种设备安全另有规定的,适用其规定。[1分]
A. 对
B. 错
【判断题】
《职业病防治法》第二十条规定,用人单位应当采取下列职业病防治管理措施:设置或者指定职业卫生管理机构或者组织,配备专职或者兼职的职业卫生管理人员,负责本单位的职业病防治工作。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第五十六条规定,从业人员发现事故隐患或者其他不安全因素,应当自己想办法排除隐患。[1分]
A. 对
B. 错
【判断题】
《安全生产法》第四十八条规定,目前国家不强制要求生产经营单位投保安全生产责任保险。[1分]
A. 对
B. 错
【判断题】
发生或者可能发生急性职业病危害事故时,用人单位应当立即采取应急救援和控制措施,并及时报告所在地卫生行政部门和有关部门。[1分]
A. 对
B. 错
推荐试题
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用