【单选题】
___(含)以上战备命令由公安部消防局或者省级公安消防总队军政首长签署发布,并报本级公安机关备案。
A. 一级;
B. 二级;
C. 日常性;
D. 常规性
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
支队___对所属部队应当至少进行一次战备检查
A. 每天;
B. 每周;
C. 每半月;
D. 每月
【单选题】
训练计划的制定、审批、下达必须依据___和上级指示,结合本单位的灭火执勤任务、训练水平、器材装备等实际情况,制定、审批、下达。
A. 《消防法》;
B. 《年度业务训练计划》;
C. 《公安消防部队执勤条令》;
D. 《公安消防部队灭火救援业务训练大纲》
【单选题】
___应当根据任务需要,组织部队开展战备教育
A. 司令部;
B. 组教处(科);
C. 警务处(科);
D. 政治部(处)
【单选题】
___应当落实执勤战斗装备的配置计划,建立装备档案,负责装备管理和维修保养工作。
A. 司令部);
B. 装备处(科)
C. 总、支队首长;
D. 后勤部(处)
【单选题】
降低战备等级命令的权限与发布命令的权限___
A. 不同;
B. 相同;
C. 原则相同;
D. 基本相同
【单选题】
___应当定时与辖区公安消防部队、专职消防队伍和电信部门核查通信线路及设备,做好登记,发现问题及时处理。
A. 司令部
B. 全勤指挥部;
C. 中队通信员;
D. 作战指挥中心
【单选题】
___战备时,各级首长和值班人员在岗在位,总队、支队全勤指挥部成员集中值班,指挥长在作战指挥中心值守待命。
A. 一级;
B. 二级;
C. 三级;
D. 经常性
【单选题】
公安消防部队和其他消防队伍共同执行灭火与应急救援任务时,由___实施统一指挥。
A. 当地政府;
B. 公安消防部队;
C. 公安机关;
D. 县级以上公安机关
【单选题】
公安消防支(大、中)队接到本辖区以外的报警或者增援请求时,应当及时向___报告,按照命令出动。情况紧急时,可以边出动边报告。
A. 当地政府;
B. 上级;
C. 有关机关;
D. 总队
【单选题】
公安消防队、专职消防队参加火灾以外的其他重大灾害事故的应急救援工作,由___统一领导。
A. 县级以上公安机关;
B. 县级以上人民政府;
C. 公安机关;
D. 当地政府
【单选题】
公安消防部队的灭火与应急救援组织指挥通常分为___层次
A. 四个;
B. 五个;
C. 二个;
D. 三个二个
【单选题】
组织指挥一般按照下列程序进行:迅速调集作战力量,启动指挥决策系统,侦察掌握现场情况,___。
A. 部署作战任务,制定作战方案,指挥战斗行动,落实战勤保障;
B. 部署作战任务,指挥战斗行动,制定作战方案,落实战勤保障;
C. 指挥战斗行动,部署作战任务,制定作战方案,落实战勤保障;
D. 制定作战方案,部署作战任务,指挥战斗行动,落实战勤保障
【单选题】
灭火救援组织指挥程序具有___,贯穿于灭火救援战斗的始终。
A. 一致性;
B. 合理性;
C. 连续性;
D. 阶段性
【单选题】
接警人员___迅速准确受理报警,问清发生火灾或者其他灾害事故的种类、危险程度、有无人员被困或者伤亡、发生灾害事故的单位名称、详细地址、报警人姓名等情况,同时启动录音记时设备。
A. 应该;
B. 必须;
C. 可以;
D. 应当
【单选题】
越级下达指挥命令后,___及时通知和报告接受命令者的直接领导。
A. 由下达命令者;
B. 由接受命令者;
C. 不需要;
D. 由下达命令和接受命令的双方
【单选题】
《公安消防部队执勤战斗条令》规定,灭火战斗中非紧急情况下的组织指挥原则是:统一指挥和___。
A. 授权指挥;
B. 逐级指挥;
C. 计划指挥;
D. 临机指挥
【单选题】
现场作战总指挥部负责发布各项决策、___和上级首长的指示。
A. 具体措施;
B. 作战意图;
C. 注意事项;
D. 战斗命令
【单选题】
火灾扑灭归队后,应当迅速补充油料、器材和灭火剂,调整执勤力量,恢复战备状态,并报告___。
A. 上级部门;
B. 作战指挥中心;
C. 总队;
D. 支队
【单选题】
基本掌握火场的情况后,指挥员应当确定作战意图,果断命令参战人员立即实施火灾扑救属于___。
A. 完全展开;
B. 全面展开;
C. 预先展开;
D. 准备展开
【单选题】
从建筑外部看不到燃烧部位和火焰时,指挥员应当在组织火情侦察的同时,命令参战人员占领水源,将主要战斗装备摆放在消防车前,做好战斗展开的准备属于___
A. 准备展开;
B. 预先展开;
C. 完全展开;
D. 全面展开
【单选题】
现场文书一般由司令部参谋或者___干部担任。
A. 中队;
B. 大队;
C. 支队;
D. 领导
【单选题】
大队指挥员由___值班首长担任。
A. 支队;
B. 上级;
C. 本级;
D. 大队
【单选题】
政工宣传组一般由政治部(处)和宣传部门的有关人员组成,由总(支)队___领导担任组长。
A. 相关部门;
B. 公安部门;
C. 上级部门;
D. 政治部门
【单选题】
在狭小空间长时间作业,无法使用个人携带式空气呼吸器时,应使用___。
A. 移动式供气源
B. 氧气呼吸器
C. 强式送风器
D. 过滤式防毒面具
【单选题】
高电压场所作业应使用___手套。
A. 防化
B. 防高温
C. 电绝缘
D. 防割
【单选题】
___用于在黑暗、浓烟条件下观察火源及火势蔓延方向,寻找被困人员。
A. 有毒气体探测仪
B. 生命探测仪
C. 热像仪
D. 蛇眼可视仪
【单选题】
___用于堵塞管道、容器、油罐(槽)车、储罐等直径480㎜以上的裂缝。
A. 外封式堵漏袋
B. 内封式堵漏袋
C. 金属堵漏套管
D. 泄漏密封枪
【单选题】
耐压为2、5MPa的水带属于___水带。
【单选题】
___用于产生大流量、远射程、高强度射流,以扑救大规模、大面积火灾。
A. 直流水枪
B. 空气泡沫枪
C. 水(泡沫)炮
D. 多用水枪
【单选题】
楼层外部垂直铺设水带时可使用___加以固定。
A. 水带挂钩
B. 水带护桥
C. 水带包布
D. 水带护套
【单选题】
消防直流水枪的工作压力范围为___MPa。
A. 2~7
B. 7~2
C. 2~7
D. 5~7
【单选题】
乙炔无色无臭气体,大部分工业品含有硫化物、磷化物等杂质,使其有蒜样气味,极易燃烧爆炸,爆炸极限___。
A. 15%~85%
B. 0.5%~92%
C. 1.5%~12%
D. 2.5%~82%
【单选题】
照明消防车灯具点亮后勿立即关闭,应连续工作___min,使光源卤化物得以充分循环,廷长灯管的使用寿命。
【多选题】
常见影响行动安全的因素有___。
A. 建筑倒塌类
B. 有毒有害
C. 爆炸
D. 放射性
【多选题】
火场基本安全因素主要是指火场常见的___等危害因素。
【多选题】
浓烟或缺氧的安全危害主要是指烟雾的___。
【多选题】
严寒气候下的安全危害主要是指发生___等情况。
A. 冻伤
B. 高空滑落
C. 跌倒
D. 车辆打滑
【多选题】
下列属于行动安全中对尖锐物的防护方法是___。
A. 灭火战斗过程中,消防人员要注意观察地面有无碎玻璃、刀具、钉子或金属、竹、木、硬塑料的尖端和薄片,防止被刺或割伤
B. 必须通过碎玻璃区域时,要穿着防刺消防靴,佩戴防割或较厚的手套,必要时首先清除玻璃碎片
C. 灭火需要破拆时,要按规范要求进行操作,破、拉、扯、搬要用力适当,防止被尖利的碎片划伤
D. 登高破拆时,要按规范要求进行操作,防止破拆碎片坠落或破拆工具脱手坠落砸伤地面人员;沿着火建筑外墙边行走时,要紧贴墙脚或与墙保持一定距离,防止被高空坠落物、碎裂的窗玻璃或幕墙玻璃砸伤
推荐试题
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2