刷题
导入试题
【判断题】
运营期间实施电话闭塞法时,故障区域内可采用小交路运行。( )
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
原则上不采用
相关试题
【判断题】
电话闭塞组织行车时,因线路异常等特殊情况需变更折返方式时,行值汇报行调,由行值通知司机变更进路。( )
A. 对
B. 错
【判断题】
电话记录号码自每日 0 时起至 24 时止,按日循环编号,可以重复使用。( )
A. 对
B. 错
【判断题】
路票必须具备运行方向、电话记录号码、车体号、日期、行车专用章(五要素)填写完整。( )
A. 对
B. 错
【判断题】
车站管理地域范围:车站内部、站外风亭、出入口外5米范围外。( )
A. 对
B. 错
【判断题】
首班不载客列车出段(场)前30分钟进行运营前检查。( )
A. 对
B. 错
【判断题】
生产信息汇报途径分类:分为业务线和行政线两种。重要类信息按行政线两条途径汇报,一般类信息按业务线汇报。( )
A. 对
B. 错
【判断题】
信息汇报应遵循及时性和持续性原则,即除了按规定第一时间将信息向中心汇报外,还应包括事件处理的阶段性汇报(即处理过程和处理结果的汇报)。( )
A. 对
B. 错
【判断题】
业务渠道:当事人→行值(值班站长)→OCC、生产调度、专业工程师等业务归口。( )
A. 对
B. 错
【判断题】
车站值班站长决策一、二级客流控制启动,车站站长决策三级客流控制启动,车站采用任意一级客流控制时都必须向行车调度员及时报告,并组织相关人员实施。( )
A. 对
B. 错
【判断题】
扶梯客流控制点的选取距扶梯/楼梯口应有1米以上缓冲空间,控制口宽度不得大于扶梯/楼梯口宽度。( )
A. 对
B. 错
【判断题】
控制点的铁马使用扎带固定,应遵循“渐进缩小”原则,摆成喇叭口或斜口,不宜垂直控制,有条件及必要时应设置多道控制点以减少冲击力。( )
A. 对
B. 错
【判断题】
车站员工拾得乘客遗失物品时,必须立即转交当班值班站长,并会同值班站长当场清点拾遗物品,填写至OA失物招领系统,注明失物名称、数量、特征以及拾获的时间、地点,双方确认。( )
A. 对
B. 错
【判断题】
乘客拾得物品时必须由值班员及以上人员会同拾得者当场清点拾遗物品,共同填写OA失物招领系统,填写“失物标签”粘贴在失物上,并放入“乘客失物专用箱/柜”中保管。( )
A. 对
B. 错
【判断题】
SC操作管理由当班值班站长、值班员负责SC的操作管理。( )
A. 对
B. 错
【判断题】
打开TVM维修门时,及时输入用户名和密码;可同时打开多个TVM维修门、同时操作多台TVM。( )
A. 对
B. 错
【判断题】
SC提示TVM钱箱将满时,应及时更换钱箱。设备因满箱暂停服务的,应在30分钟内更换钱箱。( )
A. 对
B. 错
【判断题】
TVM的钱箱分纸币钱箱和硬币钱箱。钱箱的更换工作由客运值班员和一名站务人员共同完成。( )
A. 对
B. 错
【判断题】
车站票务室票卡应存放于车站票务室保险柜、锁闭的票柜,且监控设备必须24小时开启。( )
A. 对
B. 错
【判断题】
屏蔽门出现故障时,站台岗立即前往故障门进行处理同时用手持台向车控室汇报现场情况,行车值班员报值班站长。( )
A. 对
B. 错
【判断题】
车站客流较大且发生交叉干扰时,在楼梯、扶梯、出入口等处用伸缩栏杆、隔离带、铁马等设备人为地隔开人群,保持客流畅通。( )
A. 对
B. 错
【判断题】
客运伤亡在线路区间内,司机立即报告车站,由值班站长视情况报120及公安。( )
A. 对
B. 错
【判断题】
乘客及不可抗力伤亡事故:是指乘客在地铁范围内及运输过程中故意造成意外事故的发生,如伤害自己的身体或自杀行为等。( )
A. 对
B. 错
【判断题】
《安全生产责任制》所称“四不放过”是指在组织对事故的调查分析的过程中,按“事故原因分析不清不放过,事故责任者和群众没有受到教育不放过,没有制定出防范措施不放过,事故责任者没有受到处理不放过”的原则处理。( )
A. 对
B. 错
【判断题】
员工必须正确使用劳动防护用品并妥善保管,严禁故意损坏劳动防护用品或挪作它用。( )
A. 对
B. 错
【判断题】
员工在作业过程中,必须按照安全生产规章制度和劳动防护用品使用规则,正确佩戴和使用劳动防护用品;未按规定佩戴和使用劳动防护用品的,不得上岗作业。( )
A. 对
B. 错
【判断题】
动火作业是指因工作、施工需要使用电焊、气焊(割)、砂轮、电钻等操作时,可产生火焰、火花及炽热表面的临时性作业。( )
A. 对
B. 错
【判断题】
车站公共区域内封条有效期半个月,其余场所封条有效期一个月,封条到期后必须开封检查箱内设施,确认完好后重新贴上封条。( )
A. 对
B. 错
【判断题】
转岗、晋级、返岗(离岗一年以上)人员仅须参加班组(车站)级安全教育培训。( )
A. 对
B. 错
【判断题】
对于新进员工,岗前接受三级安全教育的时间不得少于12学时。( )
A. 对
B. 错
【判断题】
员工离岗半年以上不足一年,重新上岗时,应重新接受第二、三级安全教育;员工离岗一年及以上,重新上岗时,应重新接受以一、二、三级安全教育。( )
A. 对
B. 错
【判断题】
运营分公司安全检查包括日常安全检查、月/年安全检查、重大节假日节前安全检查、专项安全检查等四类。( )
A. 对
B. 错
【判断题】
安全生产事故隐患按可能导致事故的后果及隐患整改的难易程度,事故隐患分为一般事故隐患和较大事故隐患。( )
A. 对
B. 错
【判断题】
新员工、新岗、新职人员必须参加三级安全教育及其他规定的安全教育和培训,经考试合格后,方准上岗作业。特种作业人员必须持有效的特种作业操作证上岗。( )
A. 对
B. 错
【判断题】
未经调度命令,未经车站请点登记,不得擅自进入轨行区作业。在轨行区作业时,应穿荧光服,施工作业区域设好防护。作业前后,应清点作业人数,出清线路,保证设备状态恢复正常。( )
A. 对
B. 错
【判断题】
发生运营事故(事件),按“四不放过”的原则;应采取积极措施,迅速组织救援处理,尽快恢复运营,尽量减少事故(事件)损失。( )
A. 对
B. 错
【判断题】
运营事故(事件)按照事故的性质、损失及对运营造成的影响,分为特别重大事故、重大事故、较大事故、一般事故、一般事件。( )
A. 对
B. 错
【判断题】
车控室钥匙柜/文件柜摆放日常使用钥匙,数量及种类按车站6S定制要求摆放。由值班站长负责保管、交接和办理借用手续;钥匙在使用后必须及时放回固定位置。( )
A. 对
B. 错
【判断题】
非运营分公司员工原则上不得借用票卡,特殊情况确需借用票卡时由所属专业的归口部门来办理借用手续,归口部门负有全面的管理责任。( )
A. 对
B. 错
【判断题】
违反边门管理办法,私自放行人员从边门出入为一级票务违章。( )
A. 对
B. 错
【判断题】
各车站单程票保有量应不低于该车站日均单程票发售量的3倍。( )
A. 对
B. 错
推荐试题
【填空题】
47.中国人民解放军海军成立于___年。
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用