刷题
导入试题
【判断题】
《中华人民共和国安全生产法》规定:生产经营单位应当安排用于配备劳动防护用品、进行安全生产培训的经费
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
《中华人民共和国安全生产法》规定:生产经营单位发生生产安全事故时,单位的主要负责人应当立即组织抢救,并不得在事故调查处理期间擅离职守
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:生产经营单位必须依法参加工伤保险,为从业人员缴纳保险费。国家鼓励生产经营单位投保安全生产责任保险
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:生产经营单位不得因从业人员在紧急情况下停止作业或者采取紧急撤离措施而降低其工资、福利等待遇或者解除与其订立的劳动合同
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:从业人员发现直接危及人身安全的紧急情况时,有权在请示领导之后停止作业,或者在采取可能的应急措施后撤离作业场所
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:从业人员有权对本单位安全生产工作中存在的问题提出批评、检举、控告;有权拒绝违章指挥和强令冒险作业
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:因生产安全事故受到损害的从业人员,除依法享有工伤保险外,依照有关民事法律尚有获得赔偿的权利的,有权向本单位提出赔偿要求
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:从业人员在作业过程中,应当严格遵守本单位的安全生产规章制度和操作规程,服从管理,正确佩戴和使用劳动防护用品
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:从业人员应当接受安全生产教育和培训,掌握本职工作所需的安全生产知识,提高安全生产技能,增强事故预防和应急处理能力
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:从业人员发现事故隐患或者其他不安全因素,应当立即向现场安全生产管理人员或者本单位负责人报告;接到报告的人员应当及时予以处理
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:生产经营单位应当制定本单位生产安全事故应急救援预案,与所在地县级以上地方人民政府组织制定的生产安全事故应急救援预案相衔接,并定期组织演练
A. 对
B. 错
【判断题】
《中华人民共和国安全生产法》规定:任何单位和个人都应当支持、配合事故抢救,并提供一切便利条件。任何单位和个人不得阻挠和干涉对事故的依法调查处理
A. 对
B. 错
【判断题】
《电力安全事故应急处置和调查处理条例》规定:电力企业应当按照国家有关规定,制定本企业事故应急预案
A. 对
B. 错
【判断题】
《电力安全事故应急处置和调查处理条例》规定:事故造成电力设备、设施损坏的,有关供电部门应当立即组织抢修
A. 对
B. 错
【判断题】
《电力安全事故应急处置和调查处理条例》规定:特别重大事故由国务院电力监管机构组织事故调查组进行调查
A. 对
B. 错
【判断题】
《生产安全事故应急条例》规定:国务院统一领导全国的生产安全事故应急工作,县级以上地方人民政府统一领导本行政区域内的生产安全事故应急工作。生产安全事故应急工作涉及两个以上行政区域的,由有关行政区域共同的上一级人民政府负责,或者由各有关行政区域的上一级人民政府共同负责
A. 对
B. 错
【判断题】
《生产安全事故应急条例》规定:生产经营单位应当加强生产安全事故应急工作,建立、健全生产安全事故应急工作责任制,其主要负责人对本单位的生产安全事故应急工作全面负责
A. 对
B. 错
【判断题】
29《生产安全事故应急条例》规定:生产经营单位应当针对本单位可能发生的生产安全事故的特点和危害,进行风险辨识和评估,制定相应的生产安全事故应急救援预案,并向本单位管理人员公布
A. 对
B. 错
【判断题】
《生产安全事故应急条例》规定:县级以上人民政府应当加强对生产安全事故应急救援队伍建设的统一规划、组织和指导
A. 对
B. 错
【判断题】
《生产安全事故应急条例》规定:县级以上人民政府负有安全生产监督管理职责的部门根据生产安全事故应急工作的实际需要,在重点行业、领域单独建立或者依托有条件的生产经营单位、社会组织共同建立应急救援队伍
A. 对
B. 错
【判断题】
《生产安全事故应急条例》规定:国家鼓励和支持生产经营单位和其他社会力量建立提供社会化应急救援服务的应急救援队伍
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》所指的应急工作,是指公司应急体系建设与管理维护,突发事件的预防与应急准备、监测与预警、应急处置与救援、事后恢复与重建等活动
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》所称的突发事件,是指突然发生,造成或者可能造成严重社会危害,需要公司采取应急处置措施予以应对,或者参与应急救援的自然灾害、事故灾难、公共卫生事件和社会安全事件
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:按照社会危害程度、影响范围等因素,突发事件分为一、二、三、四级,分别用红色、橙色、黄色和蓝色标示,一级为最高级别
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:公司建立由各级应急领导小组及其办事机构组成的,自上而下的应急领导体系;由安全监察质量部门归口管理、各职能部门分工负责的应急管理体系;根据突发事件类别和影响程度,成立专项事件应急处置领导机构(临时机构)
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:公司各单位应急领导小组下设安全应急办公室和稳定应急办公室。安全应急办公室设在安全监察质量部,稳定应急办公室设在办公室
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:应急制度体系是组织应急工作过程和进行应急工作管理的规则与制度的总和,是公司规章制度的重要组成部分,包括应急技术、管理、工作三大标准,以及其他应急方面规章性文件
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:应急队伍由应急救援基干分队、应急抢修队伍和应急专家队伍组成。应急救援基干分队负责快速响应实施突发事件应急救援
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:恢复重建能力包括事故灾害快速反应机制与能力、人员自救互救水平、事故灾害损失及恢复评估、事故灾害现场恢复、事故灾害生产经营秩序和灾后人员心理恢复等方面内容
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:公司各单位均应与当地气象、水利、地震、地质、交通、消防、公安等政府专业部门建立信息沟通机制,共享信息,提高预警和处置的科学性,并与地方政府、社会机构、电力用户建立应急沟通与协调机制
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:公司各单位应加强应急救援基干分队、应急抢修队伍、应急专家队伍的建设与管理,配备先进和充足的装备,加强培训演练,提高应急能力
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:总部及公司各单位均应定期组织开展应急演练,每两年至少组织一次综合应急演练,每年至少组织一次专项应急演练,演练可采用桌面(沙盘)推演、验证性演练、实战演练等多种形式。相关单位应组织专家对演练进行评估,分析存在问题,提出改进意见。涉及政府部门、公司系统以外企事业单位的演练,其评估应有外部人员参加
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:发生突发事件,事发单位首先要做好先期处置,营救受伤被困人员,恢复电网运行稳定,采取必要措施防止危害扩大。并根据相关规定,及时向上级和所在地人民政府及有关部门报告
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:公司各单位应切实履行社会责任,服从政府统一指挥,积极参加国家各类突发事件应急救援,提供抢险和应急救援所需电力支持,优先为政府抢险救援及指挥、灾民安置、医疗救助等重要场所提供电力保障
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:公司各单位应将应急工作纳入企业综合考核评价范围,建立应急管理考核评价指标体系,健全责任追究制度
A. 对
B. 错
【判断题】
《国家电网公司应急工作管理规定》规定:公司建立应急工作奖惩制度,对应急工作表现突出的单位和个人予以表彰奖励;对履行职责不当引起事态扩大、造成严重后果的单位和个人,依据有关规定追究责任
A. 对
B. 错
【判断题】
《国家电网公司应急救援基干分队管理意见》的编制目的是:为规范建设国家电网公司系统“平战结合、一专多能、装备精良、训练有素、快速反应、战斗力强”的应急救援基干分队,提升公司对各类突发事件的快速反应和有效处置能力,更好的发挥专业优势,协助各级政府开展应急救援,努力践行企业宗旨,维护公司良好形象
A. 对
B. 错
【判断题】
《国家电网公司应急救援基干分队管理意见》规定:基干分队属脱产性质,单独设置机构
A. 对
B. 错
【判断题】
根据《国家电网公司应急救援基干分队管理意见》规定:基干分队开展演练、拉练、培训,以及参加应急救援工作期间,由网省公司给予一定的经济补贴
A. 对
B. 错
【判断题】
根据《国家电网公司应急救援基干分队管理意见》规定:基干分队人员科目培训合格由培训单位颁发证书,无合格证书者不能参加应急救援行动
A. 对
B. 错
【判断题】
根据《国家电网公司应急救援基干分队管理意见》规定:基干分队应根据现场救援工作程序和救援处置方案内容,每年至少组织一次演练或拉练,并组织评估、修订完善救援现场处置方案
A. 对
B. 错
推荐试题
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用