刷题
导入试题
【判断题】
安全标准化采取企业自主管理,安全标准化考核机构考评、政府安全生产监督管理部门监督的管理模式
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
风险无论大小,只要是不可接受风险就应该釆取改进措施使其降低到可接受水平
A. 对
B. 错
【判断题】
风险信息是风险点名称、危险源名称、类型、所在位置、当前状态以及伴随风险大小、等级、所需管控措施、责任单位、责任人等一系列信息的综合
A. 对
B. 错
【判断题】
风险与危险源有本质区别,二者之间没有联系
A. 对
B. 错
【判断题】
风险指特定危害性事件发生的可能性和后果的结合。人们常常将可能性L的大小和后果S的严重程度分别用表明相
A. 对
B. 错
【判断题】
并采取相应的治理措施;经治理,职业中毒危害因素符合国家职业卫生标准和卫生要求的,方可重新作业
A. 对
B. 错
【判断题】
根据化工企业生产安全事故隐患排查治理体系细则,化工企业的现场若存在、使用国家明令淘汰、禁止使用的严重危及生产安全的工艺、设备的,可按重大事故隐患进行治理
A. 对
B. 错
【判断题】
工作危害分析法(JHA)适合于
A. 对
B. 错
【判断题】
构建风险分级管控与隐患排查治理体系双重预防机制,是企业落实安全生产主体责任的核心内容
A. 对
B. 错
【判断题】
化工企业进行隐患排查时,季节性隐患排查应根据季节性特点及本单位的生产实际,至少每季度开展一次
A. 对
B. 错
【判断题】
化工企业进行隐患排查时,需编制生产现场类隐患排查清单,排查内容应包括工程技术、管理措施、培训教育、个体防护、应意处器等全部控制措施
A. 对
B. 错
【判断题】
化工企业进行隐患排查时,需编制生产现场类隐患排查清单,该清单至少应包括、与风险点
A. 对
B. 错
【判断题】
化工企业进行隐患排查时,应根据自身组织架构确定不同的排查组织级别,一般包括车间级、班组级
A. 对
B. 错
【判断题】
化工企业进行隐患排查时,专业或专项隐患排查应由工艺、设备、电气、仪表等专业技术人员或相关部门至少每半年组织一次
A. 对
B. 错
【判断题】
化工企业进行隐患排查时,专业性隐患排查一般包括工艺、设备、电气、自控仪表、建筑结构、消防、公用及辅助工程等
A. 对
B. 错
【判断题】
化工企业在建立生产安全事故隐患排查治理体系时,若发现现场使用国家明令淘汰禁止使用的严重危及生产安全的工艺、设备的,可按重大事故隐患进行治理
A. 对
B. 错
【判断题】
化工企业在建立生产安全事故隐患排查治理体系时,应从班组长及以上人员到最高管理层,参与隐患排查治理,使隐患排查治理贯穿于生产经营活动全过程,成为企业日常工作重要的组成部分
A. 对
B. 错
【判断题】
化工企业在进行安全生产风险分级管控体系建设时,风险点排查应按生产(工作)流程的阶段、场所、装置、设施、作业活动等进行但是不可以将上述几种方法结合使用
A. 对
B. 错
【判断题】
化工企业在进行风险评价时,常用的方法为风险矩阵分析法(LS)、作业条件危险性分析法(LEC)等方法
A. 对
B. 错
【判断题】
化工企业在进行季节性排查时,夏季排查要以防雷暴、防设备容器超温超压、防台风、防洪、防署降温等为重点
A. 对
B. 错
【判断题】
建立风险管控和隐患排查治理双重预防机制,是由以事故为重点向以风险为重点的转变
A. 对
B. 错
【判断题】
安全风险分级管控与事故隐患排査治理遵循策划、实施、检查、改进的PDCA动态循环模式
A. 对
B. 错
【判断题】
建设项目安全设施竣工或者试运行完成后,生产经营单位应当委托具有相应资质的安全评价机构
A. 对
B. 错
【判断题】
建设项目职业病危害分类管理目录由囯家安全生产监督管理总局制定并公布。省级安全生产监督管理部门可以根据本地区实际情况
A. 对
B. 错
【判断题】
剧毒化学品经营企业应当每天核
A. 对
B. 错
【判断题】
开展隐患排査治理是企业安全管理的重要组成部分,是
A. 对
B. 错
【判断题】
企业安全生产管理机构及人员存在的问或訣陷为基础管理类隐患
A. 对
B. 错
【判断题】
620企业安全生产管理机构人员存在的问或缺陷为现场管理类隐患
A. 对
B. 错
【判断题】
企业分管负责人要全过程参与、组织、协调和推进双重预防体系建设工作;企业其他负责人和企业内设剖门负责分管业务、车间建立双重预防体系的推进落实和跟进管理
A. 对
B. 错
【判断题】
企业风险分级管控体系应与企业现行安全管理体系紧密结合,形成一体化的安全管理体系,使风险分级管控贯彻于生产经营活动全过程
A. 对
B. 错
【判断题】
企业风险管控能力得到加强和提升与隐患排查治理体系建设的成果无关
A. 对
B. 错
【判断题】
企业生产经营单位资质证照存在的问或缺陷为基础管理类隐患
A. 对
B. 错
【判断题】
安全生产监督管理部门确定选择一批在风险管控、隐患排査治理经验较丰富的行业标杆企业的目的昰其他同类型的企业复制、照搬
A. 对
B. 错
【判断题】
企业双重预防体系建设必须与安全生产标准化、职业健康安全管理体系相互融合
A. 对
B. 错
【判断题】
企业要加强
A. 对
B. 错
【判断题】
企业一旦发生重大危险源事故本企业抢险抢救力量不足不必请求社会力量援助
A. 对
B. 错
【判断题】
企业隐患排查治理,是以风险管控措施为排查重点,是控制、降低风险的有效手段
A. 对
B. 错
【判断题】
企业应根据风险分级管控的基本原则,结合本单位机构设置情况,合理确定各级风险的管控层级。风险管控层级不可合并
A. 对
B. 错
【判断题】
企业应加强应急管理,在隐患排查的基础上,编制与修订应急预案
A. 对
B. 错
【判断题】
企业应建立隐患排查治理目标责任考核机制,形成激励先进、约束落后的鲜明导向
A. 对
B. 错
【判断题】
企业应制订事故处置程序,一旦发生重大事故,做到临危不惧,指挥不乱
A. 对
B. 错
推荐试题
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用