刷题
导入试题
【单选题】
运营单位 对所辖线路开展一次风险全面辨识,持续发现未知安全风险,并及时更新风险数据库。___
A. 两年
B. 每年
C. 半年
D. 每月
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
遇到以下哪种情况不用开展隐患专项排查的是:___
A. 关键设施设备更新改造;
B. 以防汛、防火、防寒等为重点的季节性隐患排查; 
C. 重要节假日、重大活动等关键运输节点前;
D. 日常工作开展期间; 
【单选题】
遇到以下哪种情况不用对特定领域、特定环节、特定对象开展风险专项辨识。___
A. 运营环境发生较大变化;
B. 运营单位部门分工进行较大调整; 
C. 日常工作开展期间; 
D. 发生运营险性事件;
【单选题】
运营单位应按照“ ”原则建立健全风险管控工作机制。___
A. 逐级负责
B. 统一指挥
C. 分级管控
D. 安全生产
【单选题】
对于重大风险,应由 牵头组织制定管控措施。___
A. 运营单位负责人
B. 专业部门负责人
C. 班组负责人
D. 副总经理
【单选题】
对于 ,应由运营单位负责人牵头组织制定管控措施。___
A. 重大风险
B. 较大风险
C. 一般风险或较小风险
D. 险性事件
【单选题】
对于较大风险,应由 牵头组织制定管控措施。___
A. 运营单位负责人
B. 专业部门负责人
C. 班组负责人
D. 副总经理
【单选题】
对于 ,应由专业部门负责人牵头组织制定管控措施。___
A. 重大风险
B. 较大风险
C. 一般风险或较小风险
D. 险性事件
【单选题】
对于一般风险及较小风险,应由 牵头组织制定管控措施。___
A. 运营单位负责人
B. 专业部门负责人
C. 班组负责人
D. 副总经理
【单选题】
对于 ,应由班组负责人人牵头组织制定管控措施。___
A. 重大风险
B. 较大风险
C. 一般风险或较小风险
D. 险性事件
【单选题】
因人员、设施设备、作业环境、管理等因素变化,台风、洪涝、冰雪等气象灾害和地震、山体滑坡、地质塌陷等地质灾害,或其他因素引起安全风险上升、管控效果降低、安全问题凸显时,运营单位应及时将风险预警和管控要求通知到相关管理和作业 。___
A. 人员
B. 单位
C. 负责人
D. 设备
【单选题】
隐患排查治理是对城市轨道交通运营过程中人的不安全行为、物的不安全状态、环境的不安全因素、 导致的风险管控措施弱化、失效、缺失等,进行排查、评估、整改、消除的闭环管理活动。 ___
A. 作业上的缺陷
B. 制度上的缺陷
C. 行为上的缺陷
D. 管理上的缺陷
【单选题】
隐患分为重大隐患、 两个等级。___
A. 特别重大隐患
B. 危险隐患
C. 一般隐患
D. 较小隐患
【单选题】
隐患分为 、一般隐患两个等级。___
A. 特别重大隐患
B. 重大隐患
C. 危险隐患
D. 较小隐患
【单选题】
隐患排查治理是进行排查、评估、整改、消除的 管理活动。___
A. 闭环
B. 通报
C. 检查
D. 考核
【单选题】
以下不属于重大隐患的是。___
A. 车站和轨行区淹水倒灌
B. 列车撞击
C. 大面积停电
D. 关键设施设备长时间停止运行
【单选题】
一般隐患是指除 外,其他可能影响运营安全的隐患,一般具有危害或治理难度较小,能够快速消除等特点。___
A. 重大隐患
B. 列车脱轨
C. 列车冲突
D. 列车撞击
【单选题】
运营单位应对照 ,逐项分析所列风险管控措施弱化、失效、缺失可能产生的隐患,确定隐患等级,并按照“一岗一册”的原则分解到各岗位,形成各岗位的隐患排查手册,明确排查内容、排查方法、排查周期等内容。___
A. 风险数据库
B. 危险源检查表
C. 综合记录本
D. 检修记录本
【单选题】
运营单位应对照风险数据库,逐项分析所列风险管控措施弱化、失效、缺失可能产生的隐患,确定隐患等级,并按照“ ”的原则分解到各岗位,形成各岗位的隐患排查手册。___
A. 一岗双责
B. 安全生产
C. 一岗一册
D. 预防为主
【单选题】
隐患排查包括日常排查、 等方式。___
A. 专项排查
B. 周检查
C. 天天检查
D. 突击排查
【单选题】
隐患排查范围应覆盖日常生产作业环节,每周应不少于 次。___
A. 4
B. 3
C. 2
D. 1
【单选题】
日常排查是指结合班组、岗位日常工作组织开展的经常性隐患排查,排查范围应覆盖日常生产作业环节, 应不少于1次。___
A. 每年
B. 每月
C. 每周
D. 每天
【单选题】
日常排查是指结合班组、岗位日常工作组织开展的 隐患排查。___
A. 周期性
B. 经常性
C. 突击性
D. 长期性
【单选题】
遇到以下哪种情况的,可以不开展专项排查。___
A. 危险源排查
B. 关键设施设备更新改造
C. 以防汛、防火、防寒等为重点的季节性隐患排查
D. 重要节假日、重大活动等关键运输节点前
【单选题】
隐患排查过程中,发现情况较为紧急的,运营单位应立即采取划定隔离区域、员工现场盯控等防范措施,并及时告知 ,防范事态扩大。___
A. 主任
B. 工班长
C. 相关人员
D. 部长
【单选题】
情况特别紧急的,应视情采取人员疏散、停止作业或停用有关设施设备、封锁线路或关闭车站等安全控制措施,确保 。___
A. 运营安全
B. 人员安全
C. 设备安全
D. 财产安全
【单选题】
对于排查出的一般隐患,运营单位应 。___
A. 立即上报
B. 立即组织消除
C. 等待上级指令
D. 等领导来
【单选题】
对于无法立即消除的隐患,应 ,未整改完毕前应制定可靠的安全控制和防范措施。___
A. 等待上级指令
B. 立即上报
C. 分阶段细化整治措施
D. 等领导来
【单选题】
一般隐患整改完成后,由 复核确认销号。___
A. 运营单位部门负责人或相关专业技术人员
B. 工班长
C. 综合部部长
D. 董事长
【单选题】
对于排查出的重大隐患,运营单位应立即上报 ,由城市轨道交通运营主管部门挂牌督办。___
A. 安监部
B. 运营公司党委
C. 集团公司党委
D. 城市轨道交通运营主管部门
【单选题】
对于治理难度大、影响范围广、危险程度高、涉及部门多、难以协调整治的重大隐患,城市轨道交通运营主管部门应及时报告 协调解决。___
A. 施工方
B. 运营公司党委
C. 集团公司党委
D. 城市人民政府
【单选题】
城市轨道交通运营主管部门应将运营单位运营安全风险分级管控和隐患排查治理工作情况纳入 。___
A. 年度监督检查计划
B. 季度监督检查计划
C. 月度监督检查计划
D. 日常监督检查计划
【单选题】
新增或更新的风险管控措施应及时修订到本单位的相关管理制度、作业标准或应急预案。其中,重大风险管控措施应在 内修订完成。___
A. 一年
B. 半月
C. 三个月
D. 一个月
【单选题】
运营单位应按年度对风险分级管控和隐患排查治理情况进行分析,总结工作开展情况,研判风险演变趋势和隐患升级______等问题。有关分析情况应书面报送城市轨道交通运营主管部门。___
A. 事件
B. 事故
C. 故障
D. 苗头
【单选题】
城市轨道交通运营安全风险分级管控和隐患排查治理管理办法有效期 年。___
A. 10年
B. 8年
C. 5年
D. 3年
【单选题】
桥梁、混凝土桥梁巡查频率不应低于()次/3月___
A. 1
B. 2
C. 3
D. 4
【单选题】
钢桥、钢混组合桥梁、钢混混合桥梁巡查频率不应低于()次/月___
A. 1
B. 2
C. 3
D. 4
【单选题】
桥梁墩台基础沉降与梁体竖向变形等在交付运营后的第一年内监测频率不应低于()次/6月___
A. 1
B. 2
C. 3
D. 4
【单选题】
桥梁墩台基础沉降与梁体竖向变形等在交付运营后第二、三年监测频率不应低于()次/年,第三年之后频率不应低于1次/3年___
A. 1
B. 2
C. 3
D. 4
【单选题】
隧道巡查频率不应低于()次/月___
A. 1
B. 2
C. 3
D. 4
【单选题】
隧道结构变形、联络通道等地下区间附属设施变形等第一年内监测频率不应低于()次/6月___
A. 1
B. 2
C. 3
D. 4
推荐试题
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用