【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长大于等于6m的客车(乘坐人数小于20的专用客车除外),如车身右侧仅有一个乘客门且在车身左侧未设置驾驶人门,应在车身左侧或后部设置应急门。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,总质量大于4500kg的货车(半挂牵引车除外)、货车底盘改装的专项作业车和挂车,应按GB11567的规定提供防止人员卷入的侧面防护。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,汽车驾驶室内应设置防止阳光直射而使驾驶人产生眩目的装置,且该装置在汽车碰撞时,不应对驾驶人造成伤害。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,汽车(无驾驶室的三轮汽车除外)应配备2件反光背心和1个符合GB19151规定的三角警告牌,三角警告牌在车上应妥善放置。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,乘用车、旅居车、专用校车和车长小于6m的其他客车前后部应设置保险杠,货车(三轮汽车除外)和货车底盘改装的专项作业车应设置前保险杠。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,机动车发动机的排气管口不应指向车身右侧(如受结构限制排气管口必须偏向右侧时,排气管口气流方向与机动车纵向中心面的夹角应小于等于15°),且若排气管口朝下则其气流方向与水平面的夹角应小于等于45°;客车的排气尾管如为直式的,排气管口应伸出车身外蒙皮。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,救护车的车身颜色应为白色,左、右侧及车后正中应喷符合规定的图案。
【判断题】
《机动车查验工作规程》(GB801-2019)适用于办理机动车业务时对机动车进行检验,也适用于公安机关交通管理部门对机动车安全技术检验进行监督。
【判断题】
《机动车查验工作规程》(GB801-2019)规定,对危险货物运输车辆、客车、旅居车,查验急救包。
【判断题】
《机动车查验工作规程》(GB801-2019)规定,对警车、消防车、救护车和工程救险车,查验车辆外观制式、标志灯具和车用电子警报器。
【判断题】
《机动车查验工作规程》(GB801-2019)规定,专门查验区的视线应良好,其场地应平坦、硬实,长度、宽度和高度应能满足查验车型的实际需要。专门查验区应施划有标志标线,安装有视频监控系统,按标准配备有查验工具箱。
【判断题】
《机动车查验工作规程》(GB801-2019)规定,核对机动车安全技术检验合格证明时,应审查安全技术检验的项目是否齐全及检验结论是否为合格。
【单选题】
以下哪项不是生产经营单位的主要负责人对单位安全生产工作负有的职责___
A. 建立、健全本单位安全生产责任制
B. 组织制定本单位安全生产规章制度和操作规程
C. 督促落实本单位安全生产整改措施
D. 督促、检查本单位的安全生产工作,及时消除生产安全事故隐患
【单选题】
生产经营单位委托机构提供安全生产技术、管理服务的,保证安全生产的责任仍由___负责。
A. 委托机构
B. 本单位
C. 安全部门
D. 生产部门
【单选题】
生产经营单位的主要负责人对安全生产事故隐瞒不报、谎报或者的,给予降级撤职的处分并由安全生产监督管理部门处___的罚款
A. 当年年收入百分之六十至百分之一百
B. 上一年年收入百分之六十至百分之一百
C. 当年年收入百分之三十至百分之六十
D. 上一年年收入百分之三十至百分之六十
【单选题】
危险物品的生产、经营、储存单位以及矿山、金属冶炼、城市轨道交通运营、建筑施工单位应当建立应急救援组织;生产经营规模较小的,可以不建立应急救援组织,但应当指定___
A. 指定专职的应急救援人员
B. 指定兼职的应急救援人员
C. 与政府部门签订救援协议
D. 与保险公司签订意外伤害险
【单选题】
5关于安全生产工作机制,表述不正确的是___
A. 职工参与
B. 政府负责
C. 社会监督
D. 行业自律
【单选题】
事故隐患排查治理情况应当如实记录,并向___通报
A. 工会
B. 社会
C. 从业人员
D. 政府部门
【单选题】
生产经营单位的建设项目的安全设施必须做到“三同时”,以下不属于“三同时”的是___
A. 同时设计
B. 同时施工
C. 同时验收
D. 同时投入生产和使用
【单选题】
事故调查报告应当依法及时向___公布
A. 工会
B. 社会
C. 从业人员
D. 政府部门
【单选题】
生产经营单位应当在有较大危险因素的生产经营场所和有关设施、设备上,设置明显的___
A. 安全宣传标语
B. 安全警示标志
C. 安全注意事项
D. 应急处置流程
【单选题】
从业人员发现直接危及人身安全的紧急情况时,有权停止作业或者在___后撤离作业场所
A. 经安全管理人员同意、
B. 经单位负责人批准
C. 采取可能的应急措施
D. 经现场负责人同意
【单选题】
特种作业人员必须经专门的安全作业培训,取得___方可上岗作业
A. 特种作业操作资格证书
B. 培训合格证书
C. 相应资格
D. 特种作业操作合格证书
【单选题】
安全设备的设计、制造、安装、使用、检测、维修、改造和报废,应当符合国家标准或者___
A. 行业标准
B. 地方标准
C. 企业标准
D. 单位标准
【单选题】
生产经营单位必须对安全设备进行___维护、保养,并定期检测,保证正常运转。
A. 周期性
B. 经常性
C. 定期
D. 一次性
【单选题】
生产经营单位有未建立事故隐患排查治理制度且逾期未改正的,责令停产停业整顿,并处___的罚款
A. 五万元以下
B. 五万元以上二十万元以下
C. 十万元以下
D. 十万元以上二十万元以下
【单选题】
生产经营单位的从业人员不服从管理,违反安全生产规章制度或者操作规程的,由生产经营单位给予批评教育,依照有关规章制度给予___
A. 处分
B. 口头警告
C. 行政处罚
D. 解除劳动合同
【单选题】
强令他人违章冒险作业,因而发生重大伤亡事故或者造成其他严重后果的,处___
A. 三年以下有期徒刑或者拘役
B. 三年以上七年以下有期徒刑
C. 五年以下有期徒刑或者拘役
D. 五年以上有期徒刑
【单选题】
发生运营险性事件的,城市轨道交通运营单位(以下简称运营单位)应在___内向城市轨道交通运营主管部门报告
A. 1小时
B. 2小时
C. 30分钟
D. 24小时
【单选题】
以下不属于运营险性事件技术分析报告内容的是___
A. 造成的人员受伤和直接经济损失
B. 对运营造成的影响
C. 事件整改与防范措施
D. 事件发生的原因分析
【单选题】
运营单位应在形成运营险性事件技术分析报告后___内,报送至城市轨道交通运营主管部门
A. 5日
B. 7日
C. 5个工作日
D. 7个工作日
【单选题】
运营单位应按___对本单位城市轨道交通运营险性事件的发生情况、发生原因、发展趋势、变化规律,以及既往运营险性事件整改及防范措施实施效果等进行总结评估,形成书面报告并及时报送至城市轨道交通运营主管部门。
【单选题】
按照“集中领导,统一指挥”的原则,分公司建立了包含多层次的安全生产管理网络,不包括以下哪一层次___
A. 监督管理层
B. 执行层
C. 决策层
D. 事故调查层
【单选题】
分公司安全生产实行分级负责,共分___级
【单选题】
分公司安全生产各级单位,二级单位为___
A. 部门
B. 各总部、生产公司
C. 中心
D. 班组
【单选题】
运营分公司安全生产的最高决策层是___
A. 各生产公司安委会
B. 安全总部
C. 运营分公司安委会
D. 运营分公司技委会
【单选题】
一级/二级职责不包括___
A. 组织贯彻落实上级安全生产的方针政策和法律法规,结合本单位实际情况,研究、决策、解决安全生产重大问题
B. 贯彻执行安全生产责任制、安全生产规章制度、操作规程,按要求开展应急预案
C. 组织建立健全本单位安全生产责任制
D. 督促、检查本单位安全生产工作,及时消除生产安全隐患
【单选题】
分公司各级单位应按期组织召开安全会议,其中安委会会议___召开
A. 每季度末月
B. 每月
C. 每季度首月
D. 每年
【单选题】
各总部、生产公司发生责任事件及以上事故扣___分
【单选题】
若各总部、生产公司在《年度安全目标责 任书》中签订的事苗控制指标数=1,则发生 该责任事苗后,季度安全目标考核___分
【单选题】
各总部、生产公司《年度安全目标责任书》规定的管理事项未履行,毎项扣___分
A. 0.1
B. 0.2
C. 0.3
D. 0.4
推荐试题
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.