【单选题】
第1505题:—氧化碳职业接触限值PC.-STELL为___mg/m
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
【单选题]第1506题:乙烯装置中___需坚要持定期分析化验油品。
A. 裂解气压缩机
B. 化学品注入泵
C. 乙烯产品输送泵
【单选题】
【单选题]第1507题,为了防止空气倒流至火炬内而发生爆炸事故,以下___是火炬系统上设置的安全措施。
A. 注入蒸汽
B. 设置分子封
C. 火炬部设置袤汽伴热
【单选题】
第1508题:我国《清洁生产促进法》规定.国家对浪费资源和严重污染环境的落后生产技术、工艺、设备和产品实行___。
【单选题】
[单选題]第1509题:消防给水管道应保持充水状态。地下独立的消防给水管道应埋设在冰冻线以下,管顶距冰冻线不应小于___mm。
【单选题】
[单选题]第1511题:防氨和硫化氢的滤毒罐顔色为___。
【单选题】
第1512题:比水轻的非水溶性可燃、易燃液体火灾一原则上不能用___扑救。
【单选题】
第1513题:关于碳二加氢反应器飞温的处理方法,下列说法正确的是___。
A. 降低入口温度
B. 降低氢炔比
C. 反应器立即泄压至火炬
【单选题】
【单选题]第1514题:气瓶充装液化石油气时,应___充装。
【单选题】
[单选题]第1515题:用来防止可燃气体、易燃液体大量泄漏,在容器的出口位置常设置___阀
【单选题】
[单选题]第1516题:急冷锅炉、蒸汽过热炉在化学清洗时应注意___。
A. 人员保护和废液指定地点处理
B. 管线复位后,高压蒸汽管线无需吹扫
C. 化学清洗前要用蒸汽预热
【单选题】
【单选]第1517题:炼制石油、生产合成氯等装置过程中排放含有硫化物气体的,应当配备___
A. 火炬系统
B. 脱硫装置
C. 直接排放设施
【单选题】
[单选题]第1518题:急冷水乳化的危害很多,那么急冷水乳化液是___。
【单选题】
[单选题]第1519题:能提供对整个面部的高能量飞溅的的保护的是___。
【单选题】
[单选题]第1520题:苯可能引起的职业病包括苯所致白血病、接触性皮炎及___。
A. 肝血管瘤
B. 肺气肿
C. 急性化学性眼灼伤
【单选题】
【[单选题]第1521题:防治噪声污染的最根本的措施是___。
A. 减振降噪
B. 采用吸声器
C. 从声源上降低噪声
【单选题】
[单选]第1522题:要努力形成___体系,确保应对各种事故尤其是重特大且救摄复杂、难度大的生产安全事故应急救援的装置和物资需要。
A. 应急管理体系
B. 应急救摄体系
C. 多层次的应急救援装备和物资储备
【单选题】
单选题第1523题:根据《劳动防护用品监督管理规定》.(劳动防护用品目录由国家安全生产监督管理总局确定并公布___
【单选题】
【单选题]第1524题:炸药燃烧与一般可燃物爆炸不同,它不需要___就能进行燃烧。
【单选题】
[单选题]第1525题:裂解炉对流段原料预热盘管破裂后,室内最明显的变化是___。
A. 裂解炉横跨断温度异常上升
B. 裂解炉烟气温度异常上升
C. 裂解炉负压不断降低
【单选题】
[单选题]第1526题:乙烯在工作环境中最高允许浓度为___mg/m2。
【单选题】
[单选题]第1527题:下列选项中不属于急冷油管线防堵措施的是___4
A. 控制好QO黏度在指标范围内
B. 定期切换、清理急冷油循环泵进出口过滤器,防止过滤器堵塞
C. 控制汽油分馏塔釜在低液位
【单选题】
【单选题]第1528题:为了保证安全阀能够正常排放物料火炬总管的管径通常由___决定
A. 最大允许组合背压
B. 火炬气的流速
C. 最大火炬排放量
【单选题】
[单选题]第1529题:压力容器作业的职业禁忌证不包括___。
A. 心脏病及心电图明显异常(心律失常)
B. 红绿色盲
C. 恐高症
【单选题】
【单选题]第1530题:根据事故情景,对事故现场进行观票、分析或测定,确定事故严重程度、影响范围和变化趋势等。这在应急演练中属于___。
【单选题】
[单选题]第1531题:干气密封主密封的作用是___。
A. 防止机体内物料外泄
B. 防止润滑油外泄
C. 防止润滑油漏入机体
【单选题】
【单选题]第1532题:个人剂量监测档案应保存___。
【单选题】
【单选题]第1533题:若系统内存在燃爆性气体爆破片的材料不应选用___。
【单选题】
【单选]第1534题:发生特别重大突发事件对人民生命财产安全、国家安全、公共安全、环损安全或者社会秩序物成重大威胁采取有关法律、法规、规章规定的应急处置措施不能消除或者有效控制、减轻其严重社会危害,需要进入___的.由全国人民代表大会常务委员会或者国务院依照宪法和其他有关法律规定的权限和程序决定。
【单选题】
[单选题]第1535题:压力容器内的压力由于容器内部或外部受热而显著增加且容器与其它设备的连接管道又装有截止阀应单独装设___。
【单选题】
【单选题]第1536题:液体能发生闪燃的___叫闪点。
【单选题】
[单选题]第1537题:下列密封属于静密封的是___。
【单选题】
[单选题]第1538题:随着排放量的逐年增加会引起地球温度升高的是___。
【单选题】
[单选题]第1539题:降低生产过程新鲜水的消耗,装置冷却水应使用___水。
【单选题】
[单选题]第1540题:离心泵抽空的原因之一是___。
A. 入口压力偏高
B. 泵的出口阀关死
C. 吸入管内有空气
【单选题】
[单选题]第1541题:演练脚本一般采用表格形式,主要内容包括:演练模拟事故情景;处置行动与执行人员,指令与对白:步骤及时间安排视频背景与字幕,演练___等。
【单选题】
[单选题]第1542题:裂解炉对流段炉管检修抽查20%以上的弯头壁厚,减蒲率达壁厚___%寸应予以更换。
【单选题】
[单选题]第1543题:冬天,为防止水换热器循环水冻结的主要措施是___。
A. 蒸汽伴热
B. 打开水冷器循环水旁通
C. 全开循环水
【单选题】
[单选题]第1544题:下列选项中,引起管道腐蚀的因素有___。
A. 管道的材质
B. 空气的温度
C. 压力的高低
【单选题】
单选题]第1545题:主要化工污染物质有___。
A. 水污染物质
B. 大气污染物质
C. 以上两类物质
【单选题】
[【单选题]第1546题:丙烯精馏塔塔顶冷凝器内漏时,下列处理方法正确的是___。
A. 换热器切出检修
B. 不需处里
C. 降负荷即可
推荐试题
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption