【多选题】
井巷出水点的位置及其水量,有积水的井巷及采空区的___,必须绘在采掘工程平面图上。
A. 积水范围
B. 标高
C. 水质
D. 积水量
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABD
解析
暂无解析
相关试题
【多选题】
废弃矿井闭坑淹没前,应当采用___等方法,探测矿井边界防隔水煤(岩)柱破坏状况及其可能的透水地段,采用注浆堵水工程隔断废弃矿井与相邻生产矿井的水力联系,避免矿井发生水害事故。
A. 物探
B. 巷探
C. 钻探
D. 化探
【多选题】
老空积水突水征兆主要有 ___ 等种。
A. 水量补给量较差
B. 岩缝中见到淤泥
C. 水为红色
D. 水味发涩
E. 发出臭鸡蛋味
【多选题】
矿井水文地质划分为 ___ 4种类型。
A. 极简单
B. 简单
C. 中等
D. 复杂
E. 极复杂
【多选题】
在___的情况下,应采用隔离式探水。
A. 高水压
B. 水量大
C. 煤层松软
D. 节理发育
【多选题】
钻机运转时,禁止探放水工用___制动运转部分。
A. 手
B. 脚
C. 铁杆
D. 其他物件
【多选题】
探放老空水前,要选分析查明老空水体的___。
A. 水温
B. 老空水位置
C. 积水量和水压
D. 流量
【多选题】
"有严重水患,未采取有效措施",是指有下列___情形之一。
A. 未查明矿井水文地质条件和采空区、相邻矿井及废弃老窑积水等情况而组织生产
B. 矿井水文地质条件复杂没有配备防治水机构或人员,未按规定设置防治水设施和配备有关技术装备、仪器
C. 在有突水威胁区域进行采掘作业未按规定进行探放水
D. 擅自开采各种防隔水煤柱
【多选题】
在探水时,如果瓦斯或其他有害气体浓度超过规程规定时,必须立即___,及时处理。
A. 停止钻进
B. 切断电源
C. 撤出人员
D. 报告矿调度
【多选题】
每次降大到暴雨时和降雨后,必须派专人检查矿区及其附近地面有无___等现象。发现漏水情况,必须及时处理。
A. 裂缝
B. 老窑陷落
C. 岩溶塌陷
D. 褶曲
【多选题】
承压含水层不具备疏水降压条件时,必须采取___等防水措施。
A. 确定探水线
B. 建筑防水闸门
C. 留设防水煤柱
D. 增加抗灾强排能力
E. 注浆加固底板
【多选题】
水灾发生后,抢险救灾的主要任务是___。
A. 抢救伤员
B. 加强排水
C. 恢复通风
D. 加强支护
【多选题】
处理上山巷道透水事故时,应注意事项有___。
A. 防止二次透水
B. 透水点下方要有能存水及沉积物的足够有效空间,否则人员要撤到安全地点
C. 保证人员在作业中的通讯联系和安全退路
D. 防止积水和淤泥的冲击
【多选题】
煤矿企业必须定期收集、调查和核对相邻煤矿和废弃的老窑情况,并在井上、下工程对照图上标出其___。
A. 井田位置
B. 开采范围
C. 开采年限
D. 积水情况
【多选题】
煤矿防治水工作应当坚持___的原则
A. 预测预报
B. 有疑必探
C. 先探后掘
D. 先治后采
【多选题】
采用电法实施掘进工作面超前探测的,探测环境应当符合下列哪些要求___
A. 巷道断面、长度满足探测所需要的空间
B. 距探测点20m范围内不得有积水,且不得存放掘进机、铁轨、皮带机架、锚网、锚杆等金属物体
C. 巷道内动力电缆、大型机电设备必须停电
【多选题】
专门水文地质工程地质勘探应当包括下列内容:___
A. 查明与煤层开采有关的上覆岩层水文地质结构,包括含水层、隔水层的厚度和分布,含水层水位、水质、富水性,各含水层之间的水力联系及补给、径流、排泄条件,断层的导(含)水性
B. 采用钻探、物探等方法探明工作面上方基岩面的起伏和基岩厚度。在松散含水层下开采时,应当查明松散层底部隔水层的厚度、变化与分布情况
C. 通过岩芯工程地质编录和数字测井等,查明上覆岩土层的工程地质类型、覆岩组合及结构特征,采取岩土样进行物理力学性质测试
【多选题】
矿井工作水泵的能力应能___小时内排出矿井( )小时的正常涌水量。
A. 20
B. 18
C. 24
D. 30
【多选题】
严禁将___等杂物堆放在山洪,河流可能冲刷到的地段.
A. 矸石
B. 炉灰
C. 垃圾
D. ****
【多选题】
矿井充水的四种水源为___。
A. 地表水
B. 地下水
C. 老窑水
D. 大气降水
【多选题】
突水点突水量的等级标准分为___。
A. Q3≤60
B. 60<Q3≤600
C. 600<Q3≤1800
D. Q3>1800、
【多选题】
矿井防治水的综合防治措施是___。
A. 探、防
B. 疏、堵
C. 排
D. 截、监
【多选题】
《煤矿防治水细则》规定,矿井应当按照规定编制的防治水图件有___,其他有关防治水图件由矿井根据实际需要编制。
A. 矿井充水性图
B. 矿井涌水量与各种相关因素动态曲线图
C. 矿井综合水文地质图
D. 矿井综合水文地质柱状图 矿井水文地质剖面图
【多选题】
《煤矿防治水细则》提出,煤矿防治水工作应当坚持___的原则,采取综合治理措施。。
A. 预测预报
B. 有疑必探
C. 先探后掘
D. 先治后采
【多选题】
《煤矿防治水细则》规定,矿井水文地质类型划分的依据包括下列___内容。
A. 矿井受采掘破坏或者影响的含水层及水体 矿井及周边老空水分布状况
B. 矿井涌水量,矿井突水量
C. 开采受水害影响程度
D. 防治水工作难易程度
【多选题】
《煤矿防治水细则》规定,矿井水文地质类型划分为___。
A. 简单
B. 中等
C. 复杂
D. 极复杂
【多选题】
矿井水文地质补充勘探包括___
A. 一般规定
B. 水文地质补充调查
C. 地面水文地质补充勘探
D. 井下水文地质补充勘探
【多选题】
煤炭企业、煤矿应当结合本单位实际情况建立健全水害防治岗位责任制、包含___重大水患停产撤人制度以及应急处置制度等。
A. 水害防治技术管理制度
B. 水害预测预报制度
C. 水害隐患排查治理制度
D. 探放水制度、
【多选题】
煤矿主要负责人必须赋予___等相关人员紧急撤人的权力,发现突水(透水、溃水,下同)征兆、极端天气可能导致淹井等重大险情,立即撤出所有受水患威胁地点的人员,在原因未查清、隐患未排除之前,不得进行任何采掘活动。
A. 调度员
B. 安检员
C. 井下带班人员
D. 班组长
【多选题】
受底板承压水威胁的水文地质类型___矿井,应当采用微震、微震与电法耦合等科学有效的监测技术,建立突水监测预警系统,探测水体及导水通道,评估注浆等工程治理效果,监测导水通道受采动影响变化情况。
A. 简单
B. 中等
C. 复杂
D. 极复杂
【多选题】
矿井闭坑报告应当包括下列防治水相关内容:___
A. 闭坑前的矿井采掘空间分布情况,对可能存在的充水水源、通道、积水量和水位等情况的分析评价
B. 闭坑对邻近生产矿井安全的影响和采取的防治水措施
C. 矿井关闭时采取的水害隐患处置工作及关闭后淹没过程检测监控情况。
D. 损失量报告。
【多选题】
矿井应当对与充水含水层有水力联系的地表水体进行长期动态观测,掌握其动态规律,分析研究地表水与地下水的水力联系,掌握其___。
A. 补给
B. 排泄地下水的规律
C. 测算补给
D. 排泄量
【多选题】
矿井主要泵房至少有___个出口,一个出口用斜巷通到井筒,并高出泵房底板( )m以上,另一个出口通到井底车场,在此出口通路内,应当设置易于关闭的既能防水又能防火的密闭门。泵房和水仓的连接通道,应当设置控制闸门。
A. 2
B. 7
C. 4
D. 6
【判断题】
煤矿企业及所属矿井总工程师(或技术负责)具体负责煤矿地质工作的组织实施和技术管理。
A. 对
B. 错
【判断题】
煤矿地质补充勘探工程应遵循物探、钻探相结合的原则,坚持“一孔多用”,钻孔应兼顾构造、瓦斯、水文地质和工程地质等多项任务。
A. 对
B. 错
【判断题】
小煤矿集中的矿区,由地方人民政府组织进行区域性隐蔽致灾地质因素普查,制定防范事故的措施。
A. 对
B. 错
【判断题】
井工煤矿补充勘探工程布置应坚持井上下结合,且与井巷设计工程结合。勘探线原则上应垂直于煤层走向布设。
A. 对
B. 错
【判断题】
煤矿地质补充勘探应由煤矿企业组织实施,由具有相应资质的单位承担,现场工程结束后6个月内提交补充地质勘探报告。
A. 对
B. 错
【判断题】
煤矿地质观测应做到及时、准确、完整、统一。
A. 对
B. 错
【判断题】
地质预报内容符合《煤矿地质工作规定》要求,内容齐全,并以季为单位装订成册,归档保存。
A. 对
B. 错
【判断题】
立井应编录2个互成直角的井筒素描剖面,其中主素描剖面应与矿井地质剖面的方向相一致。
A. 对
B. 错
推荐试题
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions