刷题
导入试题
【单选题】
依据《劳动法》的规定,下列企业对女职工的工作安排,符合女职工特殊保护规定的是___
A. 某矿山企业临时安排女职工到井下工作一天
B. 某翻译公司安排已怀孕3个月的女职工本周每天加班一小时
C. 某医院安排女护士(孩子5个月大)值夜班
D. 某食品公司安排女职工在例假期间从事冷库搬运作业
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
依据《劳动合同法》的规定,劳动者与用人单位签订劳动合同后,如果劳动者不能从事或者胜任工作,致使劳动合同无法履行的,用人单位额外支付劳动者最低___个月工资后,可以解除劳动合同。
A. 5.
B. 3
C. 2
D. 1
【单选题】
依据《劳动合同法》的规定,对于从事接触职业病危害作业的劳动者,下列情形中,用人单位不得解除或终止劳动合同的是___
A. 上岗前未进行职业健康检查
B. 在上岗期间未进行职业健康检查
C. 离岗前未进行职业健康检查
D. 未进行身体健康综合评估检查
【判断题】
危险源辨识的范围是人的不安全行为和物的不安全状态。
A. 对
B. 错
【判断题】
风险与危险源之间既有联系又有本质区别。风险是危险源的载体,没有风险就没有危险源。
A. 对
B. 错
【判断题】
任何危险源都会伴随着风险。只是危险源不同,其伴随的风险大小往往不同。
A. 对
B. 错
【判断题】
排查风险点是风险管控的基础。对风险点内的不同危险源或危险有害因素进行识别、评价,并根据评价结果、风险判定标准认定风险等级。
A. 对
B. 错
【判断题】
风险度越大,说明该系统危险性大。
A. 对
B. 错
【判断题】
风险不可以避免,但是风险有大小。
A. 对
B. 错
【判断题】
隐患信息是指包括隐患名称、位置、状态描述、可能导致后果及其严重程度、治理目标、治理措施、职责划分、治理期限等信息的总称。
A. 对
B. 错
【判断题】
隐患的分级是根据隐患的整改、治理和排除的难度及其导致事故后果和影响范围为标准而进行的级别划分。
A. 对
B. 错
【判断题】
一件事件发生的可能性很大或者频率很高,我们就可以理解为这个事件的风险很大。
A. 对
B. 错
【判断题】
一件事件可能的后果造成多人伤亡,我们就可以理解为这个事件的风险就很大。
A. 对
B. 错
【判断题】
风险辨识是识别组织整个范围内所有存在的风险并确定其特性的过程。
A. 对
B. 错
【判断题】
风险评价是对危险源导致的风险进行评估、对现有控制措施的充分性加以考虑的过程。
A. 对
B. 错
【判断题】
风险分级管控的基本原则是:风险越大,管控级别越高;上级负责管控的风险,下级不必管控,但必须落实具体措施。
A. 对
B. 错
【判断题】
风险控制措施是指为将风险降低至可接受程度,企业针对风险而采取的相应控制方法和手段。
A. 对
B. 错
【判断题】
作业条件危险性分析法中的D值越小,说明被评价系统的危险性越大。
A. 对
B. 错
【判断题】
工作危害分析法(JHA)是一种定量的风险分析辨识方法。
A. 对
B. 错
【判断题】
安全检查表(SCL)的编制依据包括国内外行业、企业事故统计案例,经验教训。
A. 对
B. 错
【判断题】
风险矩阵分析法(LS)和作业条件危险性分析法(LEC)均是半定量的风险评价方法。
A. 对
B. 错
【判断题】
安全检查表法是一种定量的风险分析辨识方法,它是将一系列项目列出检查表进行分析,以确定系统、场所的状态是否符合安全要求,通过检查发现系统中存在的风险,提出改进措施的一种方法。
A. 对
B. 错
【判断题】
工作危害分析法是一种定性的风险分析辨识方法,它是基于作业活动的一种风险辨识技术,用来进行人的不安全行为、物的不安全状态、环境的不安全因素以及管理缺陷等的有效识别。
A. 对
B. 错
【判断题】
一级风险点属于重大隐患,应立即停产整顿。
A. 对
B. 错
【判断题】
一般隐患,因其危害和整改难度较小,可暂时不予整改排除。
A. 对
B. 错
【判断题】
对于一般事故隐患,根据隐患治理的分级,由企业各级(公司、车间、部门、班组等)负责人或者有关人员负责组织整改,整改情况要安排专人进行确认。
A. 对
B. 错
【判断题】
重大隐患是指危害和整改难度较大,无法立即整改排除,需要全部或者局部停产停业,并经过一定时间整改治理方能排除的隐患。
A. 对
B. 错
【判断题】
重大隐患一定是重大风险,重大风险不一定是重大隐患。
A. 对
B. 错
【判断题】
对于排查出的问题应执行“五到位”,即:整改措施、责任、资金、时限和预案。
A. 对
B. 错
【判断题】
企业开展风险管控工作的目的是,实现零风险,杜绝或减少各种隐患,降低生产安全事故的发生。
A. 对
B. 错
【判断题】
企业应当根据隐患级别,确定相应的治理责任单位和人员,隐患排查治理应当以确保隐患得到完全消除为工作目标。
A. 对
B. 错
【判断题】
从企业基层操作人员到最高管理层,都应当参与隐患排查治理。
A. 对
B. 错
【判断题】
公司级隐患排查由公司安全主要负责人负责,安全管理部门具体组织实施。
A. 对
B. 错
【判断题】
企业应在通则、细则的基础上,另外建立一套安全管理体系,是双体系贯彻于生产经营活动全过程,成为企业各层级、各岗位日常工作重要的组成部分。
A. 对
B. 错
【判断题】
隐患排查主要是指中介机构、企业安全生产管理人员依据国家法律法规、标准和企业管理制度,采取一定的方式和方法,对照风险分级管控措施的有效落实情况,对本单位的事故隐患进行排查的工作过程。
A. 对
B. 错
【判断题】
风险管控层级可进行增加或合并,企业应根据风险分级管控的基本原则,结合本单位机构设置情况,合理确定各级风险的管控层级。
A. 对
B. 错
【判断题】
持续有效地做好风险管控工作,排查风险点是基础,对风险点内的不同危险源或危险有害因素进行识别、评价,并根据评价结果、风险判定标准认定风险等级,然后采取不同的控制措施是风险管控的核心。
A. 对
B. 错
【判断题】
可接受风险是指根据企业法律义务和职业健康安全方针已被企业降至可容许程度的风险。
A. 对
B. 错
【判断题】
企业应依据所排查出各类风险的全部控制措施和基础安全管理要求,编制包含全部应该排查的项目清单。
A. 对
B. 错
【判断题】
生产现场类隐患排查清单至少应包括与风险点对应的设备设施和作业名称、排查内容、排查标准、排查方法。
A. 对
B. 错
【判断题】
设备设施类危险源的控制措施包括报警、联锁、安全阀及液位、温度、压力等测量仪表和控制设施及消防、检查、检验等常规的管理措施。
A. 对
B. 错
推荐试题
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用