【单选题】
单选题第1523题:根据《劳动防护用品监督管理规定》.(劳动防护用品目录由国家安全生产监督管理总局确定并公布___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
【单选题]第1524题:炸药燃烧与一般可燃物爆炸不同,它不需要___就能进行燃烧。
【单选题】
[单选题]第1525题:裂解炉对流段原料预热盘管破裂后,室内最明显的变化是___。
A. 裂解炉横跨断温度异常上升
B. 裂解炉烟气温度异常上升
C. 裂解炉负压不断降低
【单选题】
[单选题]第1526题:乙烯在工作环境中最高允许浓度为___mg/m2。
【单选题】
[单选题]第1527题:下列选项中不属于急冷油管线防堵措施的是___4
A. 控制好QO黏度在指标范围内
B. 定期切换、清理急冷油循环泵进出口过滤器,防止过滤器堵塞
C. 控制汽油分馏塔釜在低液位
【单选题】
【单选题]第1528题:为了保证安全阀能够正常排放物料火炬总管的管径通常由___决定
A. 最大允许组合背压
B. 火炬气的流速
C. 最大火炬排放量
【单选题】
[单选题]第1529题:压力容器作业的职业禁忌证不包括___。
A. 心脏病及心电图明显异常(心律失常)
B. 红绿色盲
C. 恐高症
【单选题】
【单选题]第1530题:根据事故情景,对事故现场进行观票、分析或测定,确定事故严重程度、影响范围和变化趋势等。这在应急演练中属于___。
【单选题】
[单选题]第1531题:干气密封主密封的作用是___。
A. 防止机体内物料外泄
B. 防止润滑油外泄
C. 防止润滑油漏入机体
【单选题】
【单选题]第1532题:个人剂量监测档案应保存___。
【单选题】
【单选题]第1533题:若系统内存在燃爆性气体爆破片的材料不应选用___。
【单选题】
【单选]第1534题:发生特别重大突发事件对人民生命财产安全、国家安全、公共安全、环损安全或者社会秩序物成重大威胁采取有关法律、法规、规章规定的应急处置措施不能消除或者有效控制、减轻其严重社会危害,需要进入___的.由全国人民代表大会常务委员会或者国务院依照宪法和其他有关法律规定的权限和程序决定。
【单选题】
[单选题]第1535题:压力容器内的压力由于容器内部或外部受热而显著增加且容器与其它设备的连接管道又装有截止阀应单独装设___。
【单选题】
【单选题]第1536题:液体能发生闪燃的___叫闪点。
【单选题】
[单选题]第1537题:下列密封属于静密封的是___。
【单选题】
[单选题]第1538题:随着排放量的逐年增加会引起地球温度升高的是___。
【单选题】
[单选题]第1539题:降低生产过程新鲜水的消耗,装置冷却水应使用___水。
【单选题】
[单选题]第1540题:离心泵抽空的原因之一是___。
A. 入口压力偏高
B. 泵的出口阀关死
C. 吸入管内有空气
【单选题】
[单选题]第1541题:演练脚本一般采用表格形式,主要内容包括:演练模拟事故情景;处置行动与执行人员,指令与对白:步骤及时间安排视频背景与字幕,演练___等。
【单选题】
[单选题]第1542题:裂解炉对流段炉管检修抽查20%以上的弯头壁厚,减蒲率达壁厚___%寸应予以更换。
【单选题】
[单选题]第1543题:冬天,为防止水换热器循环水冻结的主要措施是___。
A. 蒸汽伴热
B. 打开水冷器循环水旁通
C. 全开循环水
【单选题】
[单选题]第1544题:下列选项中,引起管道腐蚀的因素有___。
A. 管道的材质
B. 空气的温度
C. 压力的高低
【单选题】
单选题]第1545题:主要化工污染物质有___。
A. 水污染物质
B. 大气污染物质
C. 以上两类物质
【单选题】
[【单选题]第1546题:丙烯精馏塔塔顶冷凝器内漏时,下列处理方法正确的是___。
A. 换热器切出检修
B. 不需处里
C. 降负荷即可
【单选题】
[[单选题】第1547题:安全阀作为压力容器的附件或管件,可起超压保护作用,其定压时,应根据___确定安全阀的开启压力。
A. 安全阀的种类
B. 安全阀的位置
C. 介质的操作压力与物态
【单选题】
[单选题]第1548题:主控室的桑声声级设计值要求是小于等于___D.B.(A..。
【单选题】
[单选题]第1549题:裂解炉翅片损坏的主要原因为___。
A. 排烟温度过低,造成水蒸气凝液,与烟道气中酸性气体混合,腐蚀对流段想片
B. 燃料燃烧不完全,对流殿积灰严重
C. 对流段温度过高,造成管线疲劳
【单选题】
单选题]第1550题:导致高心泵扬程小的原因是___。
A. 入口压力高
B. 转速过低
C. 联轴器对中不良
【单选题】
[单选题]第1551题:火炬排放物料时应缓慢,并防止大量___进入火炬总管以防下火雨。
【单选题】
[单选题第1552题:急冷钢炉内管损坏根数很少时,可采用将内管堵死的方法进行修理堵管数量不应超过该急冷锅炉管子总数的___%
【单选题】
[单选题]第1553题:低压带电作业可能造成的事故类型是___。
【单选题】
【单选题第1554题:《使用有毒物品作业场所劳动保护条例》规定,用人单位应当搜照规定对从事使用高毒物品作业的劳动者___
A. 妥善安置
B. 进行调离
C. 进行岗位轮换
【单选题】
[单选题]第1555题:安全阀的定压依据是___。
A. 其开启压力一般为最高压力的1.05至1.5倍
B. 其开启压力一般为最高压力的1.05至1.10倍
C. 其开启压力一般为最高压力的1.05至1.3倍
【单选题】
【单选题]第1556题:工房内防静电的措施不包括___。
【单选题】
[单选题]第1557题:未按期复审或复审《特种作业人员操作证》不合格者,其___。
A. 参加再培训后方可有效
B. 在下一年度再重审
C. 操作证自行失效
【单选题】
[单选题]第1558题:演练工作通信保障就是根据演练工作需要,采用___,保证演练通信信息通畅。
A. 电信系统
B. 多种公用或专用通信系统
C. 计算机系统
【单选题】
[单选题]第1559题:分离各塔发生塔超压联锁后发生的动作是___.防止塔压进一步上升。
A. 切撕进料
B. 切撕塔釜加热
C. 放空阀打开
【单选题】
[单选题]第1560题:为防止在机泵运行时操作人员被机泵的转动部位伤害,机泵需要设置___。
A. 泵入口压力表
B. 泵出口压力表
C. 机泵联轴节护置
【单选题】
[单选题]第1561题:燃料容器管道直径越小,发生爆炸的危险性___。
【单选题】
[单选题]第1562题:职业病目录中,职业中毒有___种。
【单选题】
[单选题]第1563题:裂解炉燃料燃烧以下不是必须具备的___。
A. 火源或者温度
B. 空气(氧气)
C. 氮气
推荐试题
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.