【判断题】
举高消防车主要用于高层建筑、石油化工装置、仓库等火灾的扑救、营救生命以及其它灾害事件中的抢险救援和社会救助。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
云梯消防车的工作斗额定载质量一般为180~800kg,较登高平台消防车略小。
【判断题】
抢险救援消防车指装备多种抢险救援器材,具有牵引、起吊、发电和照明等功能的专勤消防车。
【判断题】
举高破拆消防车主要装备曲臂或直曲臂,臂架顶端设有破拆装置,以高空破拆为主要功能的举高消防车。
【判断题】
核生化侦检消防车指能够用于现场侦检灭火救援现场的化学污染、核辐射污染和生物污染等各种污染的专勤类消防车。
【判断题】
化学救援消防车主要用于化学灾害事故现场作业,具有侦检、防护、堵漏、输转、洗消、照明和发电等功能。
【判断题】
一台风力灭火机相当于25名~30名灭火人员用手工工具的灭火效能。
【判断题】
低倍数泡沫产生器包括空气泡沫产生器、高背压泡沫产生器、泡沫枪。
【判断题】
悬挂式逃生梯应存放在通风、干燥、无蛀的室内,不得露天存放。每次使用后,应进行检查,确认无损坏后将其折叠起来,装入包装袋内。
【判断题】
缓降器不得随意拆卸,使用完毕,如沾水时,应将安全吊绳晾干,并按原放位置装好。
【判断题】
缓降器通常是由安全钩、安全带、绳索、调速器、金属连接件及绳索卷盘组成。
【判断题】
液压油混用可能会产生想不到的化学反应,严重影响液压系统安全和可靠性。
【判断题】
浮艇消防泵一般是由汽油机、单级离心泵、引水装置、手抬框架、进水部件、出水部件组成。
【判断题】
泡沫比例混合系统分负压式和正压式二类,其中压缩空气泡沫系统(CAPS)属正压式。
【判断题】
照明消防车车载灯具为特种灯具,体积小,内温高,故照明电器系统不能在大风大雨环境中使用。
【判断题】
分水器阀门应开启灵活,无卡阻现象,最大开启力不得大于300N。
【判断题】
安全钩长期保存时,应涂上黄油,以免锈蚀;金属件腐蚀或老化时应按厂方使用说明中的规定进行处理。
【判断题】
安全钩使用后,擦拭干净,放置于潮湿清洁处备用。
【判断题】
若安全绳未能通过检查或其安全性出现问题,应更换安全绳并将旧绳报废。
【判断题】
贮存救援靴时,应避免阳光直射、雨淋及受潮,可以与酸碱、油及有腐蚀性物品放在一起。
【判断题】
压缩空气泡沫消防车,是指装置了压缩空气A类泡沫系统(CAFS)的消防车。
【判断题】
起动手抬机动消防泵时应先用脚踩稳框架并迅速地用力拉动起动绳,起动汽油机,然后按压化油器上的油锨,待汽油从通气孔处溢出少许后即松开。
【判断题】
消防员灭火防护胶靴每次穿着后应用清水冲洗,洗净后放在阴凉、通风处晾干,直接日晒。
【判断题】
消防员灭火防护胶靴采用多层结构设计,主体颜色为黄色,配以灰色的围条、沿条等。
【判断题】
水气比指产生泡沫时,混合液中水的体积与空气的体积比。
【判断题】
干泡沫指系统泡沫液混合比为0.3~1%时,喷出的空气含量大、流动性差和附着力强的泡沫。通常呈成雪花状,泡沫析水时间长,能够在垂直表面上长时间停留。
【判断题】
不准将30MPa压力的气瓶连接最高输入20MPa压力的减压器上。
【判断题】
湿泡沫指系统泡沫液混合比为0.3~1%时,喷出的空气含量小、流动性好和附着力较差的泡沫,通常呈普通泡沫状,泡沫析水时间短,通常在垂直表面不能形成堆积厚度。
【判断题】
中等泡沫指当系统泡沫液混合比为0.3~1%时,喷出的空气含量介于干泡沫和湿泡沫之间,流动性较差、附着力较强的泡沫,通常呈絮状,泡沫析水时间较长,能够附着在建筑物或其它物体表面上。
【判断题】
消防员隔热防护服的款式为分体式隔热服和连体式隔热服两种。
【判断题】
消防手套按防护要求分为将其分为一类、二类和三类,一类手套防护等级最高。
【判断题】
标准规定消防员灭火防护胶靴应具有耐电压性能,可用于带电场所、不得用于浓酸和浓碱等强烈腐蚀性化学品存在的场所。
【判断题】
消防员隔热防护服应及时清洗、擦净、晾干。隔热层和外层不可分开清洗。
【判断题】
消防头盔由帽壳、佩戴装置、面罩、披肩和下颏带等主要部件组成。
【判断题】
消防头盔的外形可分为无帽沿式和有帽沿式两种。
【判断题】
腰斧受一般性沾污时,可先用肥皂水擦洗,再用水清洗后凉干;当腰斧受油漆或柏油等玷污时,应先用四氯化碳擦去污痕迹,再按以上方法清洗,切忌用汽油或石蜡油等进行擦洗,以免橡胶柄套损坏。
【判断题】
消防员配备使用的消防员呼救、定位器具包括消防员呼救器和方位灯。
【判断题】
固态微型强光防爆电筒灯具内部电路设计具有防止过充、过放、短路保护装置及开关防误操作功能。
【判断题】
固态微型强光防爆电筒由灯头、壳体和灯尾等部件组成。
【判断题】
便携式强光防爆工作灯强光与工作光可任意转换,焦距可调。
【判断题】
便携式强光防爆工作灯主要由灯头、腰带夹、电池盒等部件组成。
推荐试题
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway