【判断题】
停役的设备设施上有工作,不需要需挂上“禁止操作”标志牌。[1分]
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
同一架梯子允许两人在上面工作,不准带人移动梯子。[1分]
A. 对
B. 错
【判断题】
挖掘作业坑除满足施工作业要求外, 应分别有上、下通道,通道坡度宜小于30 度。[1分]
A. 对
B. 错
【判断题】
挖掘作业前,管道企业应派人至施工现场对施工人员进行地下管线有关情况及注意事项的交底。[1分]
A. 对
B. 错
【判断题】
外检测作业过程中发现管道防腐层严重破损并可能危及管道安全的,应立即组织人员进行修复。[1分]
A. 对
B. 错
【判断题】
违反《石油天然气管道保护法》规定 ,实施危害管道安全的行为 ,给管道企业造成损害的 ,依 法承担民事责任。 ( )[1分]
A. 对
B. 错
【判断题】
向用人单位提供可能产生职业病危害的设备的,应当提供中文说明书,并在设备的醒目位置设置警示标识和中文警示说明。[1分]
A. 对
B. 错
【判断题】
新参加工作的人员和临时工作人员,必须经过安全教育培训后,方可进入输气管道现场进行操作。[1分]
A. 对
B. 错
【判断题】
需要动火的设备和管线,清洗、置换和通风后,要进行可燃气体浓度检测。[1分]
A. 对
B. 错
【判断题】
巡线员在巡线时应按规定穿戴劳动防护用品,并携带配发的GPS巡线仪、砍刀等巡线工具。[1分]
A. 对
B. 错
【判断题】
严禁电厂等重要用户在用气情况下进行切换试。[1分]
A. 对
B. 错
【判断题】
一类、二类、三类工作许可人应得到调度部门操作指令后方可进行操作。[1分]
A. 对
B. 错
【判断题】
移动发电机应停放在平稳的基础上,运转时可以移动、加油。[1分]
A. 对
B. 错
【判断题】
乙炔气瓶不准在烈日下暴晒,氧气瓶无此项要求。[1分]
A. 对
B. 错
【判断题】
应按照国家标准规定对起重机械进行月检和年检。对在检查中发现有问题的起重机械,应进行检修,并保存检修档案。[1分]
A. 对
B. 错
【判断题】
用人单位不得安排未成年工从事接触职业病危害的作业;不得安排孕期、哺乳期的女职工从事对本人和胎儿、婴儿有危害的作业。[1分]
A. 对
B. 错
【判断题】
用人单位可以安排未经上岗前职业健康检查的劳动者从事接触职业病危害的作业。[1分]
A. 对
B. 错
【判断题】
用人单位应当保障职业病病人依法享受国家规定的职业病待遇。[1分]
A. 对
B. 错
【判断题】
用人单位与劳动者订立劳动合同(含聘用合同,下同)时,应当将工作过程中可能产生的职业病危害及其后果、职业病防护措施和待遇等如实告知劳动者,并在劳动合同中写明,不得隐瞒或者欺骗。[1分]
A. 对
B. 错
【判断题】
与同属于陆上运输方式的铁路和公路输油相比,管道输油具有运量大、密闭性好、成本低和安全系数高等特点。( )[1分]
A. 对
B. 错
【判断题】
员工“三懂”是指:懂天然气着火爆炸条件、懂天然气着火爆炸的危险性、懂天然气着火爆炸预防措施及补救方法。[1分]
A. 对
B. 错
【判断题】
在办理涉及特殊作业的工作票终结手续时,应首先将工作票闭环,再对特殊作业许可证进行终结。[1分]
A. 对
B. 错
【判断题】
在管道专用隧道中心线两侧各一千米地域范围内 ,除本条第二款规定的情形外 ,禁止采石、采 矿、爆破。 ( )[1分]
A. 对
B. 错
【判断题】
在特殊情况下必须在带压和带电设备上进行焊接、气割时,应采取安全措施,并经主管安全的领导批准。[1分]
A. 对
B. 错
【判断题】
在未办理工作票终结手续之前,经工作票许可人同意确认可将该设备设施投入运行。[1分]
A. 对
B. 错
【判断题】
在正式开始吊装作业前,工作负责人必须巡视工作场所,确认支腿已垫实、牢固。[1分]
A. 对
B. 错
【判断题】
站场工艺区内有多项工作或线路有多处作业的,可填写一张工作票。[1分]
A. 对
B. 错
【判断题】
站场工艺区内有多项工作或线路有多处作业的,一个工作负责人能同时负责多项工作,可填写多张工作票。[1分]
A. 对
B. 错
【判断题】
站场运行人员对站场设备的全面检漏每周不少于2次。[1分]
A. 对
B. 错
【判断题】
站场运行人员对站场设备的全面检漏每周不少于3次。[1分]
A. 对
B. 错
【判断题】
站场运行人员巡视时,应随身携带可燃气体检测仪,特别是在进入封闭空间内巡视输气管道设备设施时,应先检测可燃气体浓度符合要求。[1分]
A. 对
B. 错
【判断题】
站场运行人员应按照规定的巡视路线、频次对设备进行巡视,当远传值与就地值偏差达2%时,应及时填写缺陷单,并报告。[1分]
A. 对
B. 错
【判断题】
站场运行值班人员应对安防系统进行实时监控,发现异常应及时处置。[1分]
A. 对
B. 错
【判断题】
站控系统维护作业中,调度中心值班人员和输气站场人员应将控制权限切换至本地站控。[1分]
A. 对
B. 错
【判断题】
针对特别重要和复杂的操作,操作时操作人应对照操作票、手指操作设备,口述操作内容,经值班调度确认无误后执行。[1分]
A. 对
B. 错
【判断题】
值班调度通过电话发布操作指令应准确、清晰并使用正规的操作术语和设备双重命名。[1分]
A. 对
B. 错
【判断题】
职业病诊断标准和职业病诊断、鉴定办法由国务院劳动保障行政部门制定。[1分]
A. 对
B. 错
【判断题】
职业卫生技术服务机构依法从事职业病危害因素检测、评价工作,接受安全生产监督管理部门的监督检查。[1分]
A. 对
B. 错
【判断题】
指挥员可在悬挂的货物下工作、站立、行走,但不得随同货物或起重机械升降。[1分]
A. 对
B. 错
【判断题】
置换作业介质流速应控制在4~6m/s。[1分]
A. 对
B. 错
【判断题】
注氮完毕后,应先关闭管道侧阀门,再关闭液氮注入侧阀。[1分]
A. 对
B. 错
推荐试题
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug