【单选题】
起重机械上应标以鲜明的色彩标志部件不包括___。
A. 起重臂
B. 卷筒
C. 吊钩
D. 平衡重
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
操作室内禁止堆放有碍操作的物品,___禁止进入操作室。
A. 操作人员
B. 非操作人员
C. 专业人员
D. 监督人员
【单选题】
在露天有___级及以上大风或大雨、大雪、大雾、雷暴等恶劣天气时,应停止起重吊装作业。
A. 六
B. 五
C. 四
D. 三
【单选题】
起重吊装作业的指挥人员、司机和安拆人员等应持证上岗,作业时应与___密切配合,执行规定的指挥信号。
A. 指挥人员
B. 监护人员
C. 操作人员
D. 安拆人员
【单选题】
起重指挥信号不应___。
A. 简明
B. 统一
C. 含糊
D. 畅通
【单选题】
进行焊接或切割作业时,操作人员应穿戴___、绝缘鞋、防护手套等符合专业防护要求的劳动保护用品。衣着不得敞领卷袖。
A. 棉质服装
B. 静电防护服
C. 防化服
D. 专用工作服
【单选题】
登高进行焊割作业者的着装要求描述错误的是___。
A. 衣着灵便
B. 戴好安全帽
C. 系好安全带
D. 穿硬底鞋
【单选题】
不可露天或高处进行焊接和切割作业天气气候不包括___。
A. 风力四级以上
B. 风力五级以上
C. 下雨
D. 下雪
【单选题】
在高处进行焊割作业时注意事项描述正确的是___。
A. 电焊导线、软管在切断电源或气源前用绳索提吊
B. 电焊机及其他焊割设备与高处焊割作业点的下部地面保持8m以上的间隔
C. 不得从高处跨越
D. 随身携带电焊导线或气焊软管登高
【单选题】
施工现场的电焊机应根据施工区需要而设置。多台电焊机集中布置时,应将电焊机和控制刀闸作对应的编号。电焊机一次侧电源线不得超过___m,二次侧引出线不得超过 30m。一、二次线应布置整齐,牢固可靠。
A. 5
B. 6
C. 7
D. 8
【单选题】
露天装设的电焊机应设置在干燥的场所,并应有___措施。
A. 防暴晒
B. 防雨、雪
C. 防盗抢
D. 防触电
【单选题】
电焊机各电路对机壳的热态绝缘电阻不得低于___MΩ。
A. 0.1
B. 0.2
C. 0.3
D. 0.4
【单选题】
电焊机倒换接头,转移作业地点或发生故障时,应___电源。
A. 切断
B. 更换
C. 远离
D. 控制
【单选题】
氩弧焊作业场地应空气流通。作业中应开动通风排毒设备。通风装置失效时,应___作业。
A. 停止
B. 适当减少
C. 暂缓
D. 控制
【单选题】
尽可能采用放射剂量极低的铈钨极,钍钨极和铈钨极应放在___内保存。
A. 铁盒
B. 铝盒
C. 铅盒
D. 不锈钢盒
【单选题】
作业完毕应关闭___,再断开( B ),清扫作业场地。
A. 电源、电焊机
B. 电焊机、电源
C. 总电源、分电源
D. 分电源、总电源
【单选题】
下列不得与氧气瓶同车运输的物品有___。
A. 易燃品
B. 油脂
C. 带油污的物品
D. 以上都对
【单选题】
气瓶存放处___m内禁止明火,禁止与易燃物、易爆物同间存放。
A. 7
B. 8
C. 9
D. 10
【单选题】
氧气瓶卧放时不宜超过___层,两侧应设立桩,立放时应有支架固定。
A. 5
B. 6
C. 7
D. 8
【单选题】
施工现场用后的气瓶应关紧其阀门并标注“___”字样。
A. 氧气
B. 乙炔
C. 氮气
D. 空瓶
【单选题】
动火作业是指能直接或间接产生明火的作业,应严格执行DL 5027《电力设备典型消防规程》的有关规定,填用动火___。
A. 工作票
B. 作业票
C. 动火票
D. 一类票
【单选题】
动火作业应有___监护,动火作业前应清除动火现场及周围的易燃物品,或采取其他有效的防火安全措施,配备足够适用的消防器材。
A. 技术
B. 施工
C. 安全
D. 专人
【单选题】
动火作业应有专人监护,动火作业前应清除动火现场及周围的易燃物品,或采取其他有效的防火安全措施,配备足够适用的___。
A. 消防器材
B. 防火设备
C. 安全设施
D. 灭火设备
【单选题】
夏季高温季节应调整___时间,避开高温时段,并做好防暑降温工作。
A. 开工
B. 作业
C. 收工
D. 作息
【单选题】
入___之前,对消防器具应进行全面检查,对消防设施及施工用水外露管道,应做好保温防冻措施。
A. 春
B. 夏
C. 秋
D. 冬
【单选题】
对取暖设施应进行全面检查。用火炉取暖时,应采取防止___中毒措施;加强用火管理,及时清除火源周围的易燃物;根据需要配备防风保暖帐篷、取暖器等防寒设施。
A. 一氧化氮
B. 一氧化碳
C. 二氧化碳
D. 硫化氢
【单选题】
严寒季节采用工棚保温措施施工,工棚内养护人员不能少于___人。
A. 2
B. 3
C. 4
D. 5
【单选题】
山区及林(牧)区施工应___遵守环境保护相关工作。
A. 严格
B. 不应
C. 适当
D. 禁止
【单选题】
山区及林(牧)区施工应防止误踩深沟、陷阱。应穿硬胶底鞋。不得穿越不明地域、水域,随时保持联系,不得单独远离作业场所。作业完毕,___负责人应清点人数。
A. 施工
B. 作业
C. 项目经理
D. 安全
【单选题】
高海拔地区施工应合理安排劳动强度与时间,为作业人员提供___的膳食。
A. 高蛋白
B. 高热量
C. 低脂肪
D. 低糖
【单选题】
高海拔地区施工在进行高处作业时,作业人员应随身携带小型氧气瓶或袋,高处作业时间不应超过___h。
A. 1
B. 2
C. 3
D. 4
【单选题】
高海拔地区,施工或外出时不得单独行动,并应保持联络,应根据实际情况配备食物、饮用水,___等应急物品。
A. 车辆机油
B. 车辆燃油
C. 药品
D. 食品
【单选题】
起重机械吊索与物件的夹角宜采用45°~60°,且不得小于30°或大于___,吊索与物件棱角之间应加垫块。
A. 45°
B. 60°
C. 90°
D. 120°
【单选题】
履带起重机作业时,臂架、吊具、辅具、钢丝绳及吊物等与架空输电线及其他带电体之间不得___安全距离,且应设专人监护。
A. 大于
B. 小于
C. 等于
D. 不小于
【单选题】
使用绞磨规定描述错误的是___。
A. 拉磨尾绳不应少于2人
B. 牵引绳应从卷筒上方卷入
C. 机动绞磨宜设置过载保护装置
D. 不得采用松尾绳的方法卸荷
【单选题】
绞磨和卷扬机应放置平稳,锚固应可靠,并应有防滑动措施。受力___不得有人。
A. 前方
B. 后方
C. 左方
D. 右方
【单选题】
施工机械一般规定描述错误的是___。
A. 机械金属外壳应可靠接地
B. 机械在寒冷季节使用,针对机械特点应做好防冻工作
C. 作业过程中,无关人员许可后方可进入操作室内
D. 机械在寒冷季节使用,针对机械特点应做好防滑工作
【单选题】
机械作业前,___应接受施工任务和安全技术措施交底。
A. 操作人员
B. 监护人员
C. 施工队长
D. 项目经理
【单选题】
新机、经过大修或技术改造的机械,应按出厂使用说明书的要求和现行有关___标准进行测试和试运转,特殊机械还应按照有关要求到检测机构进行检测。
A. 国家
B. 省市
C. 行业
D. 公司
【单选题】
使用装载机规定描述正确的是___。
A. 起步前,应先鸣声示意,宜将铲斗提升离地1.0m
B. 行驶中,应避免突然转向
C. 运载物料时,宜保持铲臂下铰点离地面1m左右
D. 将铲斗提升到最高位置运输物料
【单选题】
使用螺旋锚钻进机规定描述错误的是___。
A. 绞盘滚筒上至少应保留4圈钢丝绳
B. 安装及拆除螺旋锚时应停机并制动
C. 在设备选定钻进位置后,应缓慢升起钻进机架
D. 怠速运转时间不得超过10min
推荐试题
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy