【判断题】
 高处作业使用的脚手架不需验收即可使用。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
 工作票应使用黑色或蓝色的钢(水)笔或圆珠笔填写与签发,一式两份,内容应正确,填写应清楚,不得任意涂改。当有错、漏字需要修改时,应重新填写工作票。
A. 对
B. 错
【判断题】
 一张工作票中,工作许可人与工作负责人不得互相兼任。若工作票签发人兼任工作许可人或工作负责人,应具备相应的资质,并履行相应的安全责任。
A. 对
B. 错
【判断题】
 分工作票的许可和终结,由分工作票负责人与工作许可人办理。
A. 对
B. 错
【判断题】
 分工作票由总工作票的工作负责人签发。
A. 对
B. 错
【判断题】
 供电单位到用户变电站内施工时,工作票应由有权签发工作票的施工单位签发。
A. 对
B. 错
【判断题】
 在5级及以上的大风或雷电等恶劣天气下,应停止露天高处作业。特殊情况下,确需在恶劣天气进行抢修时,应制定相应的安全措施,经工区批准后方可进行。
A. 对
B. 错
【判断题】
 发现有人溺水应设法迅速将其从水中救出,呼吸心跳停止者用心肺复苏法坚持抢救。曾受水中抢救训练者在水中即可抢救。
A. 对
B. 错
【判断题】
 触电救护,救护者在救护过程中特别是在杆上或高处抢救伤者时,要注意自身和被救者不要触及附近带电体,防止再次触电。
A. 对
B. 错
【判断题】
 眼球固定、瞳孔散大,无反应时,立即用手指甲掐压人中穴、合谷穴约5s。
A. 对
B. 错
【判断题】
 当发现有人低压触电时,可通过抓住触电者脚上的绝缘鞋的方法,使触电者脱离电源。
A. 对
B. 错
【填空题】
1.进入作业现场应正确佩戴安全帽,现场作业人员还应穿 ___ 。
【填空题】
2.工作期间,工作票应始终保留在 ___ 手中。
【填空题】
3.需要进入变电站或发电厂升压站进行架空线路、电缆等工作时,应 ___ 工作票份数【按许可单位确定数量】。
【填空题】
4.高压开关柜内手车开关拉出后,隔离带电部位的挡板应可靠封闭,禁止开启,并设置 ___ 标示牌。
【填空题】
5. 风力大于5级,或 湿度大于 ___ 时,不宜带电作业。
【填空题】
6.在超过 ___ m深的基坑内作业时,向坑外抛掷土石应防止土石回落坑内,并做好防止土层塌方的临边防护措施。
【填空题】
7.现场工作开始前,应检查确认已做的安全措施符合要求、运行设备和检修设备之间的 ___ 正确完成。工作时,应仔细核对检修设备名称,严防走错位置。
【填空题】
8.一张工作票中,同时有检修和试验时,试验前应得到 ___ 的同意。
【填空题】
9.电缆故障声测定点时,禁止 ___ 触摸电缆外皮或冒烟小洞。
【填空题】
10.变更接线或试验结束,应 ___ 试验电源,并将升压设备的高压部分放电、短路接地。
【填空题】
11.工作票由工作负责人填写。也可由 ___ 填写。
【填空题】
12.工作票签发人或工作负责人对有 ___ 、施工复杂容易发生事故的工作,应增设专责监护人和确定被监护的人员。
【填空题】
13.装设接地线时, ___ 不准碰触接地线和未接地的导线。
【填空题】
14.个人保安线装设时,应先接接地端,后接导线端,且接触良好, ___ 。拆个人保安线的顺序与此相反。
【填空题】
15. ___ 和拉合断路器【开关】的单一操作可不使用操作票。
【填空题】
1. 作业人员应了解机具【施工机具、电动工具】及安全工器具 ___ ,熟悉其使用方法。
【填空题】
2. 检修动力电源箱的支路开关、临时电源都应加装 ___ 。
【填空题】
3. 高处作业区周围的孔洞、沟道等应设盖板、安全网或遮栏【围栏】并有固定其位置的措施。同时,应 ___ ,夜间还应设红灯示警。
【填空题】
4. 在没有脚手架或者在没有栏杆的脚手架上工作,高度超过 ___ 时,应使用安全带,或采取其他可靠的安全措施。
【填空题】
5. 运用中的电器设备,是指全部带有电压、一部分带有电压或 ___ 即带有电压的电气设备。
【填空题】
6. 经常有人工作的场所及施工车辆上宜配备 ___ ,存放急救用品,并应指定专人经常检查、补充或更换。
【填空题】
7. 作业人员的基本条件规定,具备必要的安全生产知识,学会紧急救护法,特别要学会 ___ 。
【填空题】
8. 参与公司系统所承担电气工作的外单位或外来工作人员应熟悉《安规》、经考试合格,并经 ___ 认可,方可参加工作。
【填空题】
9. 现场勘察应查看现场施工【检修】作业需要停电的范围,保留的 ___ 和作业现场的条件、环境及其他危险点等。
【填空题】
10. 工作票由工作负责人填写。也可由 ___ 填写。
【填空题】
11. 倒闸操作应有两人进行,一人操作,一人监护,并认真执行 ___ 。
【填空题】
12. 高处作业应一律使用工具袋。较大的工具应用绳栓在牢固的构建上,工件、边角余料应放置在牢靠的地方或用铁丝扣牢并有防止坠落的措施,不准 ___ ,以防止从高空坠落发生事故。
【填空题】
13. 在进行高处作业时,除有关人员外,不准他人在工作地点的下面通行或逗留,工作地点下面应有围栏或装设其他保护装置,防止 ___ 。
【填空题】
14. 带电作业应在 ___ 下进行,如遇雷电【听见雷声、看见闪电】、雪、雹、雨、雾等,禁止进行带电作业。
【填空题】
15. 带电作业工作票签发人和工作负责人、专责监护人应由具有带电作业资格、带电作业 ___ 的人员担任。
推荐试题
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map