【判断题】
所有灭火器必须锁在固定物体上。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
为防止易燃气体积聚而发生爆炸和火灾,贮存和使用易燃液体的区域要有良好的空气流通。
A. 对
B. 错
【判断题】
工业防火防爆的根本措施是:在生产中尽量不用和减少可燃物,用不燃物或难燃物代替可燃易燃物。
A. 对
B. 错
【判断题】
氧气瓶和乙炔瓶工作间距不应少于 4 米。
A. 对
B. 错
【判断题】
火灾发生后,如果逃生之路已被切断应退回室内,关闭通往燃烧房间的门窗,并向门窗上泼水,延缓火势发展,同时打开未受烟火威胁的窗户,发出求救信号。
A. 对
B. 错
【判断题】
"严禁烟火”的标志通常出现在火灾危险性大的部位;重要的场所;物资集中,发生火灾损失大的地方;人员集中,发生火灾伤亡大的场所。
A. 对
B. 错
【判断题】
在防火重点部位我们应注意不在这些场所吸烟和随意使用明火;不将易燃易爆物品带人防火重点部位;严格遵守各种安全标志、消防标志的要求,遵守各项防火安全制度,服从消防保卫人员的管职;劝阻违章人员、制止违章行为。维护防火重点部他的消防安全。
A. 对
B. 错
【判断题】
泡沫灭火器扑救汽油、煤油、柴油和木材等引起的火灾。
A. 对
B. 错
【判断题】
车间抹过油的废布废棉丝不能随意丢放,应放在废纸箱内。
A. 对
B. 错
【判断题】
1211 灭火器主要用于扑救用于扑灭油类、电器、精密仪器、仪表、图书资料等火灾。
A. 对
B. 错
【判断题】
1211 灭火器每半年检查一次总重量,下降十分之一就要灌装充气。
A. 对
B. 错
【判断题】
发生火灾时,基本的正确应变措施是发出警报,疏散,在安全情况下设法扑救。
A. 对
B. 错
【判断题】
如果因电器引起火灾,在许可的情况下,首先应关闭电源开关,切断电源;用细土、沙土、四氯化碳或 l2ll 火火器进行灭火。
A. 对
B. 错
【判断题】
火灾逃生的四个要点是防烟熏;果断迅速逃离火场;寻找逃生之路;等待他救。
A. 对
B. 错
【判断题】
电话报火灾时应注意要讲清楚起火单位、详细地址、着火情况、什么物品着火、有无爆炸危险、是否有人被困及报警用的电话号码和报警人的姓名等。
A. 对
B. 错
【判断题】
粉尘对人体有很大的危害,但不会发生火灾和爆炸。
A. 对
B. 错
【判断题】
灭火的三种基本方法是隔离法、窒息法、冷却法。
A. 对
B. 错
【判断题】
防火“六不准”的内容是在严禁吸烟的地方,不准吸烟;生产、生活用火要有专人看管,用火不准超量;打更、值宿人员要尽职尽责,不准擅离职守;安装使用电气设备,不准违反规定;教育小孩不准玩火;各种消防设备和灭火工具不准损坏和挪用。
A. 对
B. 错
【判断题】
下班后防火“五不走”的内容是交接班不交待清不走;用火设备火源不熄灭不走;用电设备不拉闸断电不走;可燃物没清干净不走;发现险情不报告不处理好不走。
A. 对
B. 错
【判断题】
大部分的火灾死亡是由于因缺氧窒息或中毒造成的。
A. 对
B. 错
【判断题】
公共场所的防火规定有不在公共场所内吸烟和使用明火;不带烟花、爆竹、酒精、汽油等易燃易爆危险物品进入公共场所;车辆、物品不紧贴或压占消防设施,不应堵塞消防通道,严禁挪用消防器材,不得损坏消火栓、防火门、火灾报警器、火灾喷淋等设施;学会识别安全标志,熟悉安全通道;发生火灾时,应服从公共场所管理人员的统一指挥,有序地疏散到安全地带。
A. 对
B. 错
【判断题】
电焊引起的火灾有飞散的火花、熔融金属和熔渣的颗粒,燃着焊接处附近的易燃物及可燃气体引起火灾;电焊机的软线长期拖拉,使绝缘破坏发生短路而起火,或电焊回线乱搭乱放,造成火灾;电焊机本身或电源线绝缘损坏短路发热造成火灾等情况。
A. 对
B. 错
【判断题】
电气灭火用“1211"、干粉灭火器或二氧化碳灭火器效果好,因为这三种灭火器的灭火药剂绝缘性能好,不会发生触电伤人事故。
A. 对
B. 错
【判断题】
为防止发生火灾,在厂内显眼的地方要设有严禁逗留标志。
A. 对
B. 错
【判断题】
扑火火灾后要对火场进行全面细致的检查,消除余火和阴燃,排除险情和隐患,防止复燃。
A. 对
B. 错
【判断题】
在企业生产环境中,做好防火工作的主要措施有:建立健全防火制度和组织;加强宣传教育与技术培训;加强防火检查防火责任制度,消除不安全因素;认真落防火责任制度;配备好适用的、足够的灭火器材。
A. 对
B. 错
【判断题】
夜间装卸易燃易爆物品时,不准使用明火灯具,应该使用防爆灯具。
A. 对
B. 错
【判断题】
在易燃易爆工厂、仓库区内一律为禁火区。各禁火区应设禁火标志。
A. 对
B. 错
【判断题】
要做到及时控制和消灭初起火灾,主要是依靠公安消防队。
A. 对
B. 错
【判断题】
烟雾较浓时,被困人员应用湿毛巾堵住嘴鼻,低姿势行走或匍匐穿过烟区。
A. 对
B. 错
【判断题】
某单位在没有办理动火许可证的情况下,领导指令工人明火作业,结果发生火灾造成严重后果,该领导犯了重大责任事故罪而受到刑事处分。
A. 对
B. 错
【判断题】
“四懂”是指懂火灾的危险性、懂预防火灾的措施,懂扑救火灾的方法,懂逃生的方法。
A. 对
B. 错
【判断题】
“四会”是指会报警、会使用灭火器、会扑救初起火灾、会组织疏散逃生。
A. 对
B. 错
【单选题】
《电话闭塞操作实施细则》内规定,列车出入场、经过道岔区段、进出车站限速___。
A. 20km/h
B. 30km/h
C. 40km/h
D. 50km/h
【单选题】
电话记录序列号每站一组,___个号码,按日循环使用,起始号码为 00,不得跳号。
A. 70
B. 80
C. 90
D. 100
【单选题】
电话闭塞法实施区段内列车运行方向的末端车站,发车条件根据___显示执行。
A. 调度命令执行
B. 电话闭塞法相关规定执行
C. 运营需求执行
D. 轨旁及车载信号
【单选题】
三开道岔开通左向位或右向位时,密贴侧中的长尖轨和同侧基本轨相互密贴并与同侧短尖轨相互___,另一侧长尖轨与基本轨( )。
A. 密贴、密贴
B. 密贴、斥离
C. 斥离、斥离
D. 斥离、密贴
【单选题】
当道岔当前位置与所需位置不一致时,车站值班员应安排手摇道岔作业人员进行手摇道岔作业,标准用语为___。
A. 将×号道岔手摇至×位,并加钩锁器
B. 将×号道岔手摇至×位,并锁闭
C. 将×号道岔扳至×位,并加钩锁器
D. 将×号道岔手摇至×位,并单锁
【单选题】
集团运营安全监察室组织调查的事故,事故调查报告应在___个工作日内完成。
A. 5
B. 10
C. 15
D. 20
【单选题】
事故主要责任单位承担负有事故损失及不良影响___%的责任。
A. 60
B. 70
C. 80
D. 90
【单选题】
造成 3 人以上 10 人以下死亡(含失踪),或者 10 人以上 50 人以下重伤,或者 1OOO 万元以上 5000 万元以下直接经济损失的事故属于___事故。
A. 特别重大
B. 重大
C. 较大
D. 一般
推荐试题
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN