【单选题】
[单选题]第1331题:警戒与管制就是根据事故情景.建立应急处置现场___区域实行交通管制,维护现场秩序。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
[单选题]第1332题:引起急性呼吸系统损伤的毒物是___。
【单选题】
[单选题]第1334题:氨气在车间空气中的最高容许浓度为___mg/mi。
【单选题】
[单选题]第1335题:裂解炉烧焦过程中发生两个化学反应,这两个反应是放热反应的是___
【单选题】
[单选题1第1336题:演练___是应急演练工作方案具体操作实施的文件,帮助参演人员全面掌握演练进程和内容。
【单选题】
[单选题]第1337题:关于火炬系统开车的说法,下列说法正确的是___。
A. 急冷系统已开车
B. 裂解炉已点燃
C. 裂解在接收燃料气之前
【单选题】
[单选题]第1338题:为减少大气污染企业应当对燃料燃烧过程中产生的氮氧化物___。
A. 采取控制措施
B. 达标就可以
C. 空排放
【单选题】
[单选题1第1339题:我国职业病目录中,有___类.(C)种。
A. 10,99
B. 9,99
C. 10,115
【单选题】
[单选题]第1340题:清洁生产的目的是实行节能、减污、增效和___。
【单选题】
[单选题]第1341题:裂解炉点火前需要对该炉燃料气管线进行氮气置换置换合格后氧含量应<___%。
【单选题】
[单选题]第1342题:装置爆炸极限最大的物质是___。
【单选题】
[单选题]第1343题:乙烯球罐小修的检修周期为___个月。
【单选题】
[单选题]第1344题:辐射段炉管材质为25Cr- 35Ni,加铌稳定剂,超过___9C时,会造成炉管损坏。
【单选题】
[单选题]第1345题:关于冷换设备泄露处理的注意事项,下列选项不正确的有___。
【单选题】
[单选题第1346题:工厂用防爆电气设备的环境温度为___C。
【单选题】
[单选题]第1347题:压缩机启动时油箱温度必须大于___C才具备启动条件。
【单选题】
[单选题]第1348题:各级安全监管部门门和有关部门要加强对应急预案工作的监督管理,依法将应急预案作为行业准入的___。
【单选题】
[单选题]第1349题:可能产生职业病危害的化学品、放射性同位素和含有放射性物质的材料的产品包装应当有醒目的___。
A. 警示标识和中文警示说明
B. 告知牌
C. 标识
【单选题】
[单选题]第1350题:丙烯的爆炸极限为___%(VM)。
A. 0.04-0.161
B. 0.02-0.121
C. 0.153-0.271
【单选题】
[单选题]第1351题:冷箱空间充装珠光砂的作用是___。
【单选题】
[单选题]第1352题:乙烯中毒对眼及呼吸道黏膜有轻微刺激作用吸入高浓度乙烯可立即引起___。
【单选题】
[单选题]第1353题:乙烯生产中非金属保护涂层是行之有效的防腐方法这种方法中使用最广泛的是___。
【单选题】
[单选题]第1354题:固体废物按其化学成分可分为___。
A. 生活废物和工业废物
B. 固体废物和半固体废物
C. 有机废物和无机废物
【单选题】
[单选题]第1355题:从事噪声作业应佩戴的防护用品是___。
【单选题】
[单选题]第1356题:造成离心泵冷却水管路堵塞的可能原因是___。
A. 冷却管线长
B. 水管弯头多
C. 水含污垢
【单选题】
[单选题]第1357题:材质为奥氏体合金钢的裂解炉炉管的最小腐蚀裕量为___mm。
【单选题】
[单选题]第1358题:从事使用高毒物品作业的用人单位应当至少每___个月对高毒作业场所进行- -次职业中毒危害因素检测
【单选题】
[单选题第1359题:硫化亚铁为黑棕色结晶粉末燃烧性为___,乙烯装置由于硫腐蚀产生的硫化亚铁具有自燃性直接暴露在空气中会引发火灾爆炸事故。
【单选题】
[单选题]第1360题:下列粉尘中___的粉尘不可能发生爆炸。
【单选题】
[单选题]第1361题:装置区域前期雨水应排入___系统。
【单选题】
[单选题]第1362题:下列不属于离心泵气蚀现象的是___。
A. 出口励低
B. 泵体发出噪声
C. 电机电流正常
【单选题】
[单选题]第1363题:个体防护用品只能作为-种辅助性措施 ,不能被视为控制危害的___手段。
【单选题】
[单选题]第1364题:压力容器作业的职业禁忌证不包括___。
A. 心脏病圾心电图明显异常(心律失常)
B. 红绿色盲
C. 恐高症
【单选题】
[单选题]第1365题:裂解气压缩机汽轮机转子平衡孔个数不可能为___。
【单选题】
[单选题]第1366题:下列安全设置中火炬气压缩机___是为了整个火炬系统安全而设置的。
A. 入口励低联锁
B. 出口励高连锁
C. 润滑油压力低联锁
【单选题】
[单选题]第1367题:排气筒高度越高污染物最高允许排放速率越___。
【单选题】
[单选题]第1368题:企业要加强重点岗位和重点部位监控发现事故征兆要立即发布___信息采取有效防范和处置措施,防止事故发生和事故损失扩大。
【单选题】
[单选题]第1369题:物质由- -种状态迅速的转变为另- -种状态 ,并在瞬间以机械能的形式放出巨大能量的现象称为___。
【单选题】
[单选题]第1370题:关于乙烯干燥器下面说法不正确的是___。
A. 设置乙烯干燥器为了吸附脱除少量的绿油
B. 设置乙烯干燥器是为了脱除其中的水分
C. 乙烯干燥器使用的干燥剂为4?分子筛和活性氧化铝
【单选题】
[单选题]第1371题:在生产过程中控制尘毒危害的最重要的方法是___。
A. 生产过程密闭化
B. 通风
C. 发放保健食品
【单选题】
[单选题]第1372题:三级安全教育制度是企业安全教育的基本教育制度。三级教育是指___。
A. 教育、 车间教育和岗位(班组)教育
B. 低级、中级、高级教育
C. 预备级、 普及级、提高级教育
推荐试题
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
【单选题】
1.三相刀开关的图形符号与交流接触器的主触点符号是___。
A. 一样的
B. 可以互换
C. 有区别的
D. 没有区别