刷题
导入试题
【单选题】
[单选题]第1155题:人体摄入生产性毒物的最主要、最危险途径是通过___。
A. 呼吸道
B. 消化道
C. 皮肤
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
[单选题]第1156题:分离冷区系统倒空、置换主要风险是冷淬、灾预防措施有___。
A. 系统压励与火炬系统平衡后再向系统内冲入氮气置换
B. 系统倒空遵循先泄压后排液的原则
C. 系统倒空遵循先排液后泄压的原则系统压力与火炬系统基本平衡后,向系统内冲入氮气置换
【单选题】
[单选题]第1157题:吸收法广泛用来控制态污染物的排放,它基于各组分的___。
A. 溶解度不同
B. 挥发度不同
C. 沸点不同
【单选题】
[单选题]第1158题:根据《生产安全事故应急预案管理办法》,生产经营单位风险种类多、可能发生多种事故类型的,应当组织编制本单位的___。
A. 综给应急预案
B. 专项应急预案
C. 现场处置方案
【单选题】
[单选题]第1159题:对现场窨井盖密闭改造其目的是___。
A. 防止雨水流入
B. 设备管理要
C. 防止V0
D. 散发
【单选题】
[单选题]第1160题:安全状况等级为3级的在用工业管道,其检验周期- -般不超过___年。
A. 3
B. 4
C. 5
【单选题】
[单选题]第1161题:通常的爆炸极限是在常温、常压的标准条件下测定出来的,它随___的变化而变化。
A. 温度、 容积
B. 压力,容积
C. 压力,温度
【单选题】
[单选题]第1162题:三级安全教育即厂级教育、车间级教育、___。
A. 班组教育
B. 分厂教育
C. 处教育
【单选题】
[单选题]第1163题:受理备案登记的安全生产监督管理部门应当对应急预案进行___审查经审查符合要求的,予以备案并出具应急预案备案登记表;不符合要求的,不予备案并说明理由。
A. 内容
B. 要素
C. 形式
【单选题】
[单选题]第1164题:裂解炉烧焦时判断各步合格的方法为___。
A. 分析烧气中的 氧化碳和二氧化碳的总含量
B. 分析烧焦气中的二氧化碳含量
C. 烧焦时间是否 足够长
【单选题】
[单选题]第1165题:塔设备的验收标准不包括___。
A. 完整的检查、鉴定和检修记录
B. 完整的水压试验和气密性试验记录
C. 专用工具齐全
【单选题】
[单选题]第1166题:从事苯、石油液化气等易燃液体作业人员应穿哪种工作服___。
A. 阻燃
B. 耐腐蚀
C. 防静电
【单选题】
[单选题]第1167题:裂解炉宜集中布置在装置的边缘,且位于可燃气体、液态烃的全年最小频率风向的___。
A. 下风向
B. 上风向
C. 无所谓
【单选题】
[单选题]第1168题:在可燃性环境中使用金属检尺、测温和采样设备时.应该用不产生火花的材料制成,通常都采用___工具。
A. 塑料
B. 铁质
C. 铜质
【单选题】
[单选题]第1169题:当使用过滤式防毒面具时,空气中的毒物浓度不应超过___%。
A. 2
B. 2.5
C. 3
【单选题】
[单选题]第1170题:噪声与振动较大的生产设备当设计需要将这些生产设备安置在多层厂房内时,宜将其安排在___层。
A. 底
B. 上
C. 顶
【单选题】
[单选题]第1171题:高毒作业场所应当设置___色区域警示线、警示标识和中文警示说明,并设置通讯报警设备。
A. 红
B. 黄
C. 橙
【单选题】
[单选题]第1172题:甲烷化反应和碳二加氢反应___反应必须严格控制反应温度。
A. 均吸热反应
B. 均是放热
C. 前者为吸热反应后者为放热反应.
【单选题】
[单选题]第1173题:设备维护保养的前提条件是___。
A. 状态监测
B. 检查
C. 润滑
【单选题】
[单选题]第1174题:生产装置设置围堰的目的是___。
A. 警戒
B. 防止物料扩散
C. 防止雨水流入
【单选题】
[单选题]第1175题:生产性粉尘中主要常见的类型是___。
A. 矿物性粉尘
B. 动物性粉尘
C. 混合型粉尘
【单选题】
[单选题]第1176题:按压力等级区别裂解气压缩机一段排出罐属于___容器。
A. 低压
B. 中压
C. 高压
【单选题】
[单选题]第1177题:含硫量<0.5%的原油是属于___。
A. 低硫原油
B. 含硫
C. 高硫原油
【单选题】
[单选题]第1178题:炉管上下温差保证在___以下减少炉管上下温差能有效地防止炉管弯曲变形和局部结焦。
A. 40
B. 50
C. 30
【单选题】
[单选题]第1179题:室内消火栓的最大间距不应超过___m。
A. 40
B. 50
C. 60
【单选题】
[单选题]第1180题:排污许可的具体办法和实施步骤由___规定。
A. 全国人大
B. 环保部
C. 国务院
【单选题】
[单选题]第1181题: ___建立健全应急物资储备保障制度,完善重要应急物资的监管、生产、储备、调拨和紧急配送体系。
A. 国家
B. 社会
C. 企业
【单选题】
[单选题]第1182题:全面紧急停车后.关于火炬系统的处理步骤,下列操作正确的是___。
A. 伙炬气回收压缩机时,及时与裂解联 系,避免燃料气压励波动
B. 低温液体物料可直接 排火炬总管
C. 各系统同时向火炬排放,没有顺序
【单选题】
[单选题]第1183题:输送腐蚀性大的介质,不可以采用___。
A. 塑料管
B. 不锈钢管
C. 钢管
【单选题】
[单选题]第1184题:填料塔的检修质量标准下列说法错误的是___。
A. 塔内构件不得 有松动现象
B. 规整填料支承结构水平度不大于塔内径2%o,不大于4mm
C. 喷雾孔不得堵塞
【单选题】
[单选题]第1185题:用于制造压力容器的碳钢和低合金钢其碳含量应满足小于___%。
A. 0.25
B. 0.35
C. 0.45
【单选题】
[单选题]第1186题: ___m的甲醇摄入量就会导致完全失明。
A. 0.2
B. 0.5
C. 1
【单选题】
[单选题]第1187题:职业病目录中,尘肺病有___种。
A. 11
B. 13
C. 17
【单选题】
[单选题]第1188题:氢氧化钠灼伤后可用2%的___洗涤中和后清水冲洗。
A. 盐酸
B. 醋酸
C. 硝酸
【单选题】
[单选题]第1189题:按环保要求装置含烃类气体排放应首先___。
A. 炬燃烧
B. 回收系统
C. 现场排放
【单选题】
[单选题]第1190题: ___就是根据事故情景,对事故可能波及范围内的相关人员进行疏散、转移和安置。
A. 疏散与安置
B. 疏散与转移
C. 转移和安置
【单选题】
[单选题]第1191题:储罐静置时间大多需要1~24n,至少不能少于___min,方能进行有关检测作业。
A. 20
B. 10
C. 30
【单选题】
[单选题]第1192题:对污水进行氧化、还原、分解的处理方法是___净化。
A. 物料
B. 化学
C. 生物
【单选题】
[单选题]第1193题:裂解炉膛超过___C时,不需要手动点燃侧壁烧嘴。
A. 680
B. 600
C. 750
【单选题】
[单选题]第1194题:乙烯装置碳_二加氢过程氢炔比过高会导致___。
A. 反应器飞温
B. 增产乙烯
C. 减少绿油生成量
【单选题】
[单选题]第1195题:裂解炉辐射段炉管镍元素含量过高,会导致___。
A. 炉管延展性下降
B. 炉管耐高温性能下降
C. 炉管内原料结焦趋势增大
推荐试题
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用