刷题
导入试题
【单选题】
在#4杆砍剪树木时说法错误的是___
A. 应有专人监护
B. 应使用安全带
C. 应使用普通绳索
D. 倒树范围内不得有人逗留
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
工作票签发人赵xx应经过专业技能培训取得带电作业资格和___。
A. 熟悉设备情况
B. 实践经验
C. 考试合格
D. 变电或线路第一种工作票签发人资格
【单选题】
作业开工前,必须对现场的风速和湿度进行测量,如果实测风力大于___,或湿度大于80%时,不宜带电作业。
A. 5级
B. 6级
C. 4级
D. 3级
【单选题】
作业前,工作班员李xx应使用应使用2500V绝缘摇表或绝缘测试仪对绝缘工具进行___。
A. 冲击试验
B. 静力试验
C. 绝缘检测
D. 动力试验
【单选题】
作业前,工作负责人张xx安排王xx对绝缘斗臂车车体进行接地,应使用不小于___mm2的软铜线良好接地。
A. 12.0
B. 16.0
C. 20.0
D. 25.0
【单选题】
开工前,应对绝缘斗臂车接地并在预定位置___试操作一次,确认液压传动、回转、升降、伸缩系统工作正常、操作灵活,制动装置可靠。
A. 空斗
B. 载人
C. 模拟
D. 正式
【单选题】
斗内电工李xx在操作绝缘斗臂车时,要注意周围的其他通信线路和树并控制___。
A. 操作频率
B. 操作速度
C. 操作方法
D. 操作强度
【单选题】
斗内电工李xx向地面施放绝缘绳传递绝缘子串时,绝缘绳落到地面的小水坑中,绝缘绳下部受湿绝缘性能会___。
A. 下降
B. 升高
C. 不变
D. 不一定
【单选题】
在对10kV梅子垭线54#杆绝缘子串进行绝缘包裹时,包裹的顺序是___。
A. 先导线再耐张线夹然后横担最后绝缘子串
B. 先导线再耐张线夹然后绝缘子串最后横担
C. 先横担再绝缘子串然后导线最后耐张线夹
D. 先横担再绝缘子串然后耐张线夹最后导线
【单选题】
带电更换10kV架空线路的耐张绝缘子串,绝缘紧线设备的有效绝缘长度应不小于___m。
A. 0.4
B. 0.6
C. 0.7
D. 1
【单选题】
配电线路带电作业中,作业人员安全防护的重点对象是___。
A. 空间电场
B. 电流
C. 静电电击
D. 线路噪声
【单选题】
进行带负荷更换柱上开关作业过程中,工作负责人张XX在监护过程中说法正确的是___。
A. 低头接打电话
B. 协助其他工作人员传递工器具
C. 多角度多方位全过程监护绝缘斗内人员行为
D. 可以临时离开现场
【单选题】
带电作业前,工作负责人张XX要求李XX应使用不小于16㎜²的软铜线对绝缘斗臂车车体进行接地,临时接地体的地下深度不小于___。
A. 0.3m
B. 0.4m
C. 0.6m
D. 0.8m
【单选题】
带负荷更换柱上开关作业,工作负责人要求作业人员张XX在安装绝缘引流线后,应___。
A. 拉开柱上开关
B. 拆除柱上开关引线
C. 更换柱上开关
D. 测流确认
【单选题】
带负荷更换柱上开关作业,工作负责人张XX确认绝缘引流线安装到位需要斗内电工张XX测量绝缘引流线和柱上开关两部分___。
A. 电压相等
B. 电流基本相等
C. 电流差额较大
D. 电压差额较大
【单选题】
在带负荷更换柱上开关作业中,工作负责人张XX重点监护斗内作业人员李XX不得___。
A. 接触横担
B. 接触导线
C. 接触接地构件
D. 同时接触不同电位的导体
【单选题】
作业前,如实测现场风力大于5级或湿度大于___时,不宜带电作业。
A. 50%
B. 60%
C. 70%
D. 80%
【单选题】
人体不同部位同时接触有电位差的带电体会产生___危害。
A. 电流
B. 电压
C. 电场
D. 接地
【单选题】
在10kV配电线路上,使用高架绝缘斗臂车采用绝缘手套作业法作业,通过人体的电流有两个回路,其中电阻回路为___。
A. 接地体→人体→绝缘体→带电体
B. 带电体→绝缘体→人体→绝缘体→接地体
C. 接地体→人体→带电体
D. 接地体→绝缘体→人体→带电体
【单选题】
引线拆除后应及时恢复绝缘遮蔽措施,遮蔽工具连接处必须保持___的重叠。
A. 10cm
B. 15cm
C. 20cm
D. 25cm
【单选题】
绝缘斗臂车的接地属于___接地。
A. 系统
B. 保护
C. 防雷
D. 工作
【单选题】
1作业现场使用溶剂擦拭绝缘材料表面的脏污后,___。
A. 可直接投入使用
B. 预防性试验合格后投入使用
C. 在空气中暴露15min后使用
D. 在空气中暴露24h后使用
【单选题】
10kV带电作业绝缘防护用具的预防性试验方法是加压___kV,试验时间1min。
A. 10
B. 20
C. 30
D. 40
【单选题】
10kV带电作业绝缘遮蔽用具的预防性试验方法是加压___kV,试验时间1min。
A. 20
B. 45
C. 75
D. 100
【单选题】
10kV配电线路带电作业绝缘手套作业法使用___作为主绝缘平台。
A. 高空作业车
B. 钢管梯
C. 绝缘斗臂车
D. 脚手架
【单选题】
操作斗臂车时,工作斗的起升、下降速度不应___m/s。
A. 小于0.1
B. 大于0.2
C. 小于0.3
D. 大于0.5
【单选题】
带电立杆作业前,应检查作业点两侧电杆、导线及其他带电设备是否固定牢靠,必要时应采取___。
A. 加固措施
B. 防护措施
C. 隔离措施
D. 遮蔽措施
【单选题】
梢径为∮190mm的15m锥形水泥杆,其重心与杆根的距离为约___m。
A. 4.8
B. 5.2
C. 6.6
D. 7.2
【单选题】
带电立杆作业,当电杆起立接近导线时,要求地面电工控制辅助拉绳先拉开___导线,保证电杆与导线保持适当距离。
A. 中相
B. 近边相
C. 远边相
D. 两边相
【单选题】
10kV东站路线#09杆-#10杆带电组立电杆,起重设备应与带电线路保持___m以上的安全距离。
A. 0.6
B. 1
C. 1.5
D. 2
【单选题】
带电组立电杆作业中,传递绳滑车采用___滑轮。
A. 铁
B. 铝
C. 绝缘
D. 铝镁合金
【多选题】
在进行10kV明清街线北门#4台区支线#0-#9杆更换导线工作时___对有触电危险、检修(施工)复杂容易发生事故的工作,应增设专责监护人,并确定其监护的人员和范围。
A. 蒋××
B. 宋××
C. 田××
D. 李××
【多选题】
此项工作中如果收紧线时需使用绞磨,在作业前应检查和试车,确认___后方可使用。
A. 外观整洁
B. 安置稳固
C. 运行正常
D. 制动可靠
【多选题】
作业人员在攀登10kV明清街线#9杆时检查过程中发现,电杆基础有下沉、冲刷、拉线松动的现象,登杆前应___。
A. 培土加固
B. 打好临时拉线
C. 重新立杆
D. 支好架杆
【多选题】
更换10kV明清街线#12电杆时,为保证施工安全应采取如下___措施。
A. 采取绝缘无极绳环,控制导线的跳跃;
B. 杆上作业人员应使用个人保安线;
C. 因安全距离满足《安规》要求,所以无需做任何安全措施;
D. 指派专人监护,观察导线、抱杆与35kV安茅线垂直距离;
【多选题】
进入施工现场应佩戴安全帽,使用前,应检查___、下颏带等附件完好无损。
A. 帽壳
B. 帽衬
C. 帽箍
D. 顶衬
【多选题】
在紧线施工过程中如发生滑轮卡住导线的情况,以下处理方法正确的是。___
A. 松线后进行处理
B. 工作人员直接用手打开滑轮进行处理
C. 安排专人使用专用工具进行处理,人员不得站在导线内角侧
D. 使用机械车辆帮助拉线
【多选题】
在施工作业中的“三防”指___。
A. 防止静电伤害
B. 防止高空坠落伤害
C. 防止物体打击伤害
D. 防止倒(断)杆伤害
E. 防止触电伤害;
【多选题】
10kV明清街线北门#4台区支线#0-#9杆更换导线施工,在#9杆装设工作接地线前应___。
A. 先验电,后装接地线
B. 先断开低压开关,后断开台区跌落式熔断器
C. 先装低压,后装高压
D. 先装左侧,后装右侧
【多选题】
在此项工作中, 10kV明清街线北门#4台区支线#0-#9杆更换导线施工作业时,线盘架应___。
A. 周围设置围栏
B. 放置在施工车辆上应转动灵活
C. 稳固可靠
D. 制动可靠
【多选题】
在此项工作中若出现有作业人员触电事故发生,现场作业人员应迅速使触电者脱离电源,随后判断触电者意识,其方法正确的有___
A. 轻轻拍打伤员肩部
B. 直接呼喊伤员姓名
C. 用手指甲掐压人中穴
D. 用心肺复苏法急救
推荐试题
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用