刷题
导入试题
【判断题】
客运值班员巡视车站维护车站安全,防止意外事件发生。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
首班载客列车到站前50分钟,按 设调指令开启环控系统并确认运行情况。
A. 对
B. 错
【判断题】
首班载客列车到站前15分钟确认照明开启,并开启 AFC 设备。
A. 对
B. 错
【判断题】
值班站长、站厅保安首班列车前10分钟完成扶梯、电梯、出入口的开启。
A. 对
B. 错
【判断题】
上/下行末班载客列车开出前10分钟开始末班车广播。
A. 对
B. 错
【判断题】
最后一班载客列车开出后清站,确保车站无逗留人员,完成出入口、扶梯、电梯的关闭工作,确认工作照明、AFC 设备全部关闭。
A. 对
B. 错
【判断题】
巡视要求:认真、细致、周全、及时、真实。
A. 对
B. 错
【判断题】
一般类信息:紧急情况下,影响正常运营的各业务模块发生的异常事件。
A. 对
B. 错
【判断题】
客流组织工作坚持高度集中、统一指挥、逐级负责的原则。
A. 对
B. 错
【判断题】
首班不载客列车出段(场)前40分钟将运营前检查情况汇报行车调度员。
A. 对
B. 错
【判断题】
扶梯客流控制点的选取距扶梯/楼梯口应有 1 米以上缓冲空间,控制口宽度不得大于扶梯/楼梯口宽度。
A. 对
B. 错
【判断题】
控制点的铁马使用扎带固定,应遵循“渐进缩小”原则,摆成喇叭口或斜口,最好垂直控制。
A. 对
B. 错
【判断题】
首班载客列车到站前 30 分钟给客服中心岗配好票。
A. 对
B. 错
【判断题】
学龄前儿童、行动不便的老人、残疾人、弱智人士、精神病人、突发病人、酗酒者和携带导盲犬的等,应由健康成人陪同进站乘车。否则站务人员应劝其离开车站。
A. 对
B. 错
【判断题】
车站值班站长为本站消防安全第一责任人,对本站消防安全负责。
A. 对
B. 错
【判断题】
分公司内部安全考试为百分制,80分及以上为合格,考试不合格者,延期进行补考,如补考仍不合格者,则交由人力资源处处置。
A. 对
B. 错
【判断题】
对于新进员工,岗前接受三级安全教育的时间不得少于48学时。
A. 对
B. 错
【判断题】
一般事故隐患,是指危害和整改难度较小,发现后能够立即整改排除的隐患。
A. 对
B. 错
【判断题】
转岗、晋级、返岗(离岗一年以上)人员须参加处室级和班组(车站)级安全教育培训
A. 对
B. 错
【判断题】
微型消防站设立值班室,实行全时段值班,确保职守人员12小时在岗在位,有效开展防火宣传和火情防控。
A. 对
B. 错
【判断题】
“一懂三会”:1.懂本场所的火灾危险性;2.会报火警;3.会扑救初起火灾;4.会组自我逃生
A. 对
B. 错
【判断题】
职业病指企业、事业单位和个体经济组织(以下统称用人单位)的劳动者在职业活动中,因解除粉尘、放射性物质和其他有毒、有害物质等因素而引起的疾病。
A. 对
B. 错
【判断题】
特大伤亡事故是指一次事故死亡5人以上的事故(含5人)
A. 对
B. 错
【判断题】
分公司的安全奖惩在奖励上,坚持精神奖励与物质奖励相结合,坚持按照安全责任、安全成绩进行奖励的原则。
A. 对
B. 错
【判断题】
当报表、备用金、票卡、发票数量不足时,客服中心岗必须及时通知客运值班员要求补充,在《客服中心岗结算单》--上签字确认,并在相关台帐上注明,做好交接工作;
A. 对
B. 错
【判断题】
钥匙使用完毕40分钟内必须归还。客运值班员严禁单人借用或持有此钥匙。
A. 对
B. 错
【判断题】
呼救器、个人防护装备、灭火毯、多功能撬棒、消防斧、手提式防爆强光照明灯、防毒面具、消防装备存放柜资产归属使用部门,日常实行“谁维护、谁负责”的原则。
A. 对
B. 错
【判断题】
发生影响列车运行的相关事故(事件)时,在启动后备措施仍不能保证行车恢复的情况下,在尽量获得现场图像、标记后,按“先复后通”原则执行。
A. 对
B. 错
【判断题】
“安全生产先进集体”包括“安全生产先进部门”和“安全生产先进班组(车站)”。
A. 对
B. 错
【判断题】
各级义务消防队组织机构应包括:灭火行动组、通讯联络组、疏散引导组、全防护救护组,按照正常当班每班人员不少于5人组建。如人数不够5人,则应全员参加。
A. 对
B. 错
【判断题】
如票卡已折损,且票面损毁严重无法辨识票卡编号,BOM 也无法分析该票卡时,不办理储值票更换和退款业务。
A. 对
B. 错
【判断题】
车站管理地域范围:车站内部、站外风亭、出入口外5米范围内。
A. 对
B. 错
【判断题】
客服中心岗负责边门的管理,检查乘客票卡以及免费乘车证件的有效性,按规定开关边门并做好登记;
A. 对
B. 错
【判断题】
站台岗按照规定巡视、立岗,对站台卫生、安全负责,引导乘客排队候车,维持好候车秩序;
A. 对
B. 错
【判断题】
与交班客服中心岗按车站交接班制度进行交接,检查核对客服中心内备品情况,如有问题立即上报站长。
A. 对
B. 错
【判断题】
在售票时,不接受非标准币;
A. 对
B. 错
【判断题】
关站时,客服中心岗收拾票卡、现金、各类报表,整理客服中心备品、卫生,注销BOM,回AFC票务室结帐。
A. 对
B. 错
【判断题】
客服中心岗负责售补票、兑零、问询间隙,留意进站乘客动态,发现精神异常、醉酒等不宜乘车的乘客,劝阻进站乘车,并及时汇报车控室,必要时请求地铁公安或其他同事协助并注意自我保护。
A. 对
B. 错
【判断题】
遗失物品应由值班站长负责登记,登记后将遗失物品移交专人保管。并及时将具体信息填写在 OA 失物招领系统中。
A. 对
B. 错
【判断题】
岗位卫生不洁不交接班。
A. 对
B. 错
【判断题】
车站员工的消防安全培训应当至少每季度进行一次,培训的内容还应当包括组织、引导在场群众疏散的知识和技能。
A. 对
B. 错
推荐试题
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用