【判断题】
第931题:裂解炉紧急停车时必须全关锅炉给水根部阀.以免突然进水而将高温炉管冷淬。正确答案:
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
第932题:乙烯装置大检修后幵车.深冷分离系统氮气干燥要彻底.达到规定的露点要求,尽可能避免设备和管线发生冻堵。正确答案:
【判断题】
裂解炉炉管某一根发生堵塞情况下.裂解炉可不停炉继续运转。正确答案:
【判断题】
裂解炉对流段积炭的主要危害为发生二次燃烧损坏对流段管线,正确答案:
【判断题】
第935题:泵轴封的作用是防止高压液体从泵壳内沿轴的四周而漏出或者外界空气以相反方向漏入泵壳内
【判断题】
第937题:废润滑油含有杂质和水分、回炼性价比不高
【判断题】
第938题:乙烯装置分离单元深冷分离系统甲烷与碳二分离罐满酒位.会导致甲烷化反应器飞温
【判断题】
脱脂作业场所.应画出安全警戒区.并挂有•严禁烟火'.有毒危险等警示牌
【判断题】
第940题:乙烯装置分离氢气过程应尽量避免富気?溜分中夹帯有乙烯、以确保操作安全
【判断题】
第941题:建设项目职业病防护用品必须与主体工程同时设计、同时施工、同时投入生产和使用
【判断题】
第942题:紧急切断阀带有近程和远程操作系统可实现自动控制
【判断题】
第943题:炉膛温度在750°C以下确认炉膛内没有火焰则不需要经过吹扫或测爆可以重新点燃
【判断题】
为了防止离心式压缩机超速可能引起的危险.设置电子超速跳闸联锁即可
【判断题】
第946题:低温泵初次投用时可用甲醇作介质进行试运转、试运转后要排净甲醇并用氮气彻底干燥管道
【判断题】
第947器:A类火灾场所应选择水型灭火器、磷酸铵盐干粉灭火器、泡沫灭火器或卤代烷灭火器
【判断题】
第948题:根据演练规模和观摩需要、可编制演练观摩手册。演练观摩手册通常包括应急演练时间、地点、情景描 述、安全注意事项等
【判断题】
第949题:裂解气干燥器入口温度高将会导致裂解气干燥不合格.造成冷箱冻堵
【判断题】
第950题:管道内部有压力时一般不得对受压原件进行重大维修
【判断题】
第951题:应急预案的编制应该有明确、具体的事故预防措施和应急程序并与其应急能力相适应
【判断题】
第952题:建筑工程施工现场的消防安全由施工单位负责。实行施工总承包的由总承包单位负责
【判断题】
往复式压缩机排气阀盖特别热、排气量减少则可以判断该排气阀有故障
【判断题】
第954题:氮气管銭与物料管线一般固定相连
【判断题】
第955题:水污染物是指直接或者间接向水体排放的.能导致水体污染的物质
【判断题】
第956题:公民参加应急救援工作或者协助维护社会秩序期间.其在本单位的工资待遇和福利不变:表现突出、成绩显著的.由县级以上人民政府给予表彰或者奖励
【判断题】
第957题:安全阀与压力容器之间一般不宜装设截止阀门
【判断题】
第958题:为了从根本上解决工业污染问题.就是要采用少废无废技术即采用低能耗、高消耗、无污染的技术
【判断题】
第959题:建设项目中防治环境污染的措施.必须与主体工程同时设计、同时施工、同时投产使用
【判断题】
第960题:环境保护通俗上说法就是环境卫生
【判断题】
第961题:应急演练是针对事故情景依据应急预案而模拟开展的预警行动、事故报告、指挥协调、现场处置等活动
【判断题】
第962题:重金属、有毒有害易长期积累的有机物对环境污染较持久
【判断题】
第963题:在丙烯精馋塔接丙烯过程中压力变化在一定程度上可反映塔内丙烯贮存量变化
【判断题】
第964题:空气中乙烷浓度大于4%,人会出现眩星、恶心和轻度麻醉症状
【判断题】
第965题:乙烯产品纯度高.不存在腐蚀问题所以输送乙烯产品的管道不需要定期检验
【判断题】
第966题:急冷油换热器进行排油和倒空操作时需要防烫伤
【判断题】
第967题:保护听力而言.一般认为每天8小时长期工作在100分贝以下听力不会损失
【单选题】
LKJ设备应按高于线路允许速度___km/h常用制动设置模式曲线.
【单选题】
机车车轮踏面擦伤深度不得超过___ mm.
【单选题】
接触网标称电压值为___kV,最高工作电压为27.5 kV,短时(5 min)最高工作电压为29 kV,最低工作电压为19 kV.
【单选题】
为保证人身安全,除专业人员执行有关规定外,其他人员(包括所携带的物件)与牵引供电设备带电部分的距离,不得小于___ mm.
A. 1500.
B. 1800.
C. 2000.
推荐试题
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server