相关试题
【单选题】
施工单位应当建立、健全教育培训制度,加强对职工的教育培训;未经教育培训或考核不合格的人员。___
A. 不得上岗作业
B. 应当下岗
C. 可以上岗作业
D. 调到其他岗位任职
【单选题】
根据《建筑工程安全生产管理条例》,施工单位应当设立___,配备专职安全生产管理人员。
A. 安全生产管理机构
B. 安全生产监督机构
C. 安全生产实施机构
D. 安全生产保障机构
【单选题】
根据《建筑工程安全生产管理条例》,施工单位应当在施工现场入口处,出入道路口、空洞口、基坑边缘,有害气体等危险部位,设置明显的___
A. 安全提示标志
B. 安全警示标志
C. 安全标志
D. 警示提示标志
【单选题】
从业人员在作业过程中,应当严格遵守本单位的安全生产规章制度和操作规程。服从管理,正确佩戴和使用___
A. 劳动生产用品
B. 劳动防护用品
C. 劳动标志
D. 劳动联系工具
【单选题】
任何单位或个人对事故隐患或者安全生产违法行为,___向负有安全生产监督管理职责的部门报告或举报。
【单选题】
根据建设部3号令,《工程建设重大事故报告和调查程序规定》下列关于重大事故书面报告所包括的内容,说法错误的是___
A. 事故发生的时间,地点、工程项目、企业名称
B. 事故发生的简要经过、伤亡人数和直接经济损失的初步估计
C. 事故发生原因的最终判断和确凿依据
D. 事故发生后应采取的措施及事故控制情况
【单选题】
___是指国务院有关主管部门对没有国家标准而又需要在全国某行业范围内统一的技术要求所制定的技术规范。
A. 规范性文件
B. 强制性行业标准
C. 推选性国家标准
D. 强制性国家标准
【单选题】
___负责建筑安全生产的管理
A. 劳动行政主管部门
B. 建筑行业协会
C. 建设行政主管部门
D. 国务院
【单选题】
下列哪单位应当取得相应登记的资质证书,并在其资质等级许可的范围内承接工程___
A. 监理单位
B. 房地产单位
C. 施工单位
D. 工程单位
【单选题】
《安全生产法》适用于在中华人民共和国领域内从事生产经营活动单位的___
A. 安全生产
B. 社会治安
C. 国家安全
D. 公共安全
【单选题】
《安全生产法》规定,工会有权依法组织职工参见本单位安全生产工作的___,维护职工在安全生产方面的合法权益。
A. 审批和管理
B. 认证和监督
C. 民主管理和民主监督
D. 民主审查和民主监督
【单选题】
国务院和地方各级人民政府在安全生产方面的职责是加强对安全生产工作的___,支持,督促各有关部门依法履行安全生产监督管理职责。
【单选题】
《安全生产法》规定,国家对在改革安全生产条件,防止生产安全事故,参加___等方面取得显著成绩的单位和个人,给予奖励。
A. 安全检查
B. 安全教育
C. 抢险救护
D. 应急指挥
【单选题】
《安全生产法》规定,个人经营的生产经营单位应当具备安全生产条件所必需的资金投入,由___予以保证,并对由于安全生产所必需的资金投入不足导致的后果承担责任。
A. 安全机构
B. 投资人
C. 劳资双方
D. 安全管理人员
【单选题】
《安全生产法》规定,应当对建设项目安全设施设计审查结果负责的是审查部门及其___
A. 负责人
B. 单位法人
C. 主管部门
D. 负责审查的人员
【单选题】
《安全生产法》规定,应当对建设项目安全实施工程质量负责的是___
A. 安全实施的所有单位
B. 施工单位
C. 设计单位
D. 验收单位
【单选题】
根据《建筑工程安全生产管理条例》,建设工程实行总承包的,___对施工现场的安全生产负总责。
A. 分包单位
B. 建设单位
C. 总承包单位
D. 监理单位
【单选题】
根据《建筑工程安全生产管理条例》,在施工中发生危机人身安全的紧急情况时,作业人员有权___或采取必要的应急措施后撤离危险区域。
A. 立即下达停工指令
B. 立即自救
C. 立即上报上级
D. 立即停止作业
【单选题】
根据《建筑工程安全生产管理条例》,施工单位应当对管理人员和作业人员___安全生产教育培训,其教育培训情况记入个人工作档案。
A. 每季度至少一次
B. 每月至少一次
C. 每年至少一次
D. 每年至少二次
【单选题】
国家实行生产安全事故责任追究制度,依据《安全法》和有关法律、法规的规定,追究___的法律责任
A. 生产安全事故责任人员
B. 相关企业领导C.技术人员 D.项目经理
【单选题】
从业人员发现事故隐患或其他不安全因素,应当立即报告___;接到报告的人员应当及时予以处理。
A. 现场安全生产管理人员
B. 建设单位人员
C. 设计人员
D. 监理人员
【单选题】
根据建设部3号令《工程建设重大事故报告和调查程序规定》,重大事故分为___等级。
A. 三个
B. 四个
C. 五个
D. 以上均不对
【单选题】
在炎热季节对高温作业工种的工人应具有含盐量为0.1%~0.2%的清凉饮料,饮料水温不宜高于多少度?___
【单选题】
放置灭火器时,其底部离地面不宜低于多少米?___
A. 0.08米
B. 0.15米
C. 0.3米
【单选题】
按安全色的使用规定,黄色表示什么意思?___
A. 指令 必须遵守
B. 停止 禁止 危险 消防设备
C. 注意 警告
【单选题】
电气设备着火后,应采如何扑救?___
A. 用二氧化碳灭火器灭火
B. 用泡沫灭火器灭火
C. 用水灭火
【单选题】
使用灭火器扑灭火灾时要对准火焰哪一部分喷射?___
【单选题】
以下哪项作业不属于特种作业范围?___
A. 企业内机动车辆驾驶
B. 电工作业
C. 木工作业
【单选题】
信号标志设备应随施工地点的变动而转移,施工完毕后应___
【单选题】
在城镇路口路面上测量,应注意到人和车辆,并设___或其他安全标志,必要时请交通民警协助。
【单选题】
在施工现场用车辆搬运器材时,必须指定专人负责安全,在公路上行车必须遵守___
A. 施工人员指挥
B. 交通法规
C. 行人优先
【单选题】
在深沟___以上的沟坑内作业时,必须头戴安全帽、
【单选题】
测量仪器的放设地点,以不妨碍___为原则
【单选题】
进行测试时,仪器由使用人员负责保护,如因故需要离开仪器时,___
A. 可以离开
B. 制定专人看守
C. 随便找人看守
【单选题】
机房楼板预留孔洞必须配置()___
A. 阻燃材料
B. 安全盖板
C. 阻燃材料的安全盖板
【单选题】
当梯子靠在吊线上时,梯子的顶端至少要高出吊线___厘米,且不能大于梯长的三分之一。(有挂钩除外)
【单选题】
梯子上不准有___人同时作业,上下梯子时不得携带笨重的工具和材料,应用绳索上下提吊。
【单选题】
保安带(绳)上绳索磨损和断头超过___者及有腐坏的严禁使用。
【单选题】
吊板挂钩截面腐损___时,应及时更换,坐吊板时,安全代扣连索须扣紧扎牢。
推荐试题
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine