【判断题】
挖掘作业坑除满足施工作业要求外, 应分别有上、下通道,通道坡度宜小于30 度。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
需要动火的设备和管线,清洗、置换和通风后,要进行可燃气体浓度检测。
A. 对
B. 错
【判断题】
超过一天的工作票每天工作开始前,工作负责人和工作许可人需重新检查确认安措落实情况后,方可重新开始工作。
A. 对
B. 错
【判断题】
一类、二类、三类工作许可人应得到调度部门操作指令后方可进行操作。
A. 对
B. 错
【判断题】
中断工作连续3个月以上者,必须重新学习安规,并经考试合格后,方可恢复工作。
A. 对
B. 错
【判断题】
天然气场站中,机动车辆不带防火罩不准进入场区。
A. 对
B. 错
【判断题】
员工“三懂”是指:懂天然气着火爆炸条件、懂天然气着火爆炸的危险性、懂天然气着火爆炸预防措施及补救方法。
A. 对
B. 错
【判断题】
《安全生产法》规定,从业人员有权对本单位安全生产工作中存在的问题提出整改。
A. 对
B. 错
【判断题】
国家规定要求取得相应资格证书才能上岗作业的工作人员,必须经过公司培训后上岗。
A. 对
B. 错
【判断题】
安规所称特殊作业是指涉及输气管道安全运行并具有较大作业风险的动火作业、受限空间作业、货梯升降作业、高处作业、起重作业、管线打开作业、临时用电作业。
A. 对
B. 错
【判断题】
经医师鉴定,无妨碍工作的病症,并应至少每年进行一次体检,特殊岗位,按国家相应规定执行。
A. 对
B. 错
【判断题】
任何人进入站场工艺区或在输气管道本体设备上工作,必须正确佩戴安全帽,交出火种、释放静电,不得穿容易产生火花的带钉鞋和产生静电的化纤类衣物。
A. 对
B. 错
【判断题】
两个及以上单位(包括管道企业自身)在输气管道现场从事交叉作业,必须书面明确交叉作业安全措施,并由管道企业对各方工作负责人进行安全交底,并要求各方安排专门监护人在现场履行对交叉作业的组织协调和监督监护职责。
A. 对
B. 错
【判断题】
《临时/应急抢修单》可由现场监护人签发。
A. 对
B. 错
【判断题】
签发后的工作票需增加工作项目或变更安全措施的,应向签发人报告并经同意,可不填写新的工作票。
A. 对
B. 错
【判断题】
站场工艺区内有多项工作或线路有多处作业的,可填写一张工作票。
A. 对
B. 错
【判断题】
站场工艺区内有多项工作或线路有多处作业的,一个工作负责人能同时负责多项工作,可填写多张工作票。
A. 对
B. 错
【判断题】
若至预定时间,原工作范围内的一部分工作尚未完成,仍需继续工作而不影响恢复输气的,原工作票可先行终结。
A. 对
B. 错
【判断题】
工作票签发人督促、监护工作班成员严格遵守本规程和有关安全规章制度,正确使用作业机具、安全工器具、个人防护用品和应急救援器材。
A. 对
B. 错
【判断题】
工作负责人审查工作票所列安全措施和风险辨识、控制措施是否正确完备,是否符合现场实际。对工作票所列内容有疑问时,应及时向工作票签发人询问清楚,必要时应要求修改或补充。
A. 对
B. 错
【判断题】
从事输气管道设备设施维(检、抢)修、施工等工作的外包单位人员可以担任工作票签发人。
A. 对
B. 错
【判断题】
如工作内容发生变化或工作范围扩大,需要变更安全措施或工艺上的调整的,应重新填写工作票,履行签发、许可手续后,方可继续工作。
A. 对
B. 错
【判断题】
同一架梯子允许两人在上面工作,不准带人移动梯子。
A. 对
B. 错
【判断题】
处于运行状态的生产作业区域内,凡能拆移的动火部件,应拆移至安全地点进行动火。
A. 对
B. 错
【判断题】
工作延期在没有批准以前,可以继续工作,延长工作时间。
A. 对
B. 错
【判断题】
工作中,工作负责人或工作许可人不得单方面变更安全措施。
A. 对
B. 错
【判断题】
经常有人工作的场所和施工车辆上宜配备必要的急救药品,并指定专人检查、补充或更换,确保齐全、有效。
A. 对
B. 错
【判断题】
新参加工作的人员和临时工作人员,必须经过安全教育培训后,方可进入输气管道现场进行操作。
A. 对
B. 错
【判断题】
非管道企业的上级领导、检查组或外来参观人员进入站场检查、指导或参观,必须告知其安全注意事项,并经签字确认后,方可进入现场。
A. 对
B. 错
【判断题】
工作票签发应写明“同意”或“不同意”字样,必要时应附加有关要求或补充安全措施,允许只签名不签意见。
A. 对
B. 错
【判断题】
从事输气管道设备设施维(检、抢)修、施工等工作的相关方人员可以担任工作票签发人。
A. 对
B. 错
【判断题】
不准在基坑、沟槽内休息,但可以在升降设备、挖掘设备下方或基坑、沟槽上端边沿站立、走动。
A. 对
B. 错
【判断题】
临近地下隐蔽设施时,可采用机械配合人工挖掘。
A. 对
B. 错
【判断题】
所有工作开始前,工作许可人应向工作班全体成员进行安全交底,安全交底的内容包括(但不限于)工作内容、工作范围、质量要求和职责分工以及风险控制、应急措施。
A. 对
B. 错
【判断题】
在办理涉及特殊作业的工作票终结手续时,应首先将工作票闭环,再对特殊作业许可证进行终结。
A. 对
B. 错
【判断题】
在特殊情况下必须在带压和带电设备上进行焊接、气割时,应采取安全措施,并经主管安全的领导批准。
A. 对
B. 错
【单选题】
外检测作业应至少安排____人进行检测作业。___
A. 5
B. 4
C. 3
D. 2
【单选题】
在有坠落危险且高度在基准面____米及以上的作业,应采取防坠落措施。___
A. 2
B. 5
C. 8
D. 10
【单选题】
固定式配电箱、开关箱底部与地面的垂直距离应大于____,小于____。___
A. 1.1m 1.6m
B. 1.2m 1.7m
C. 1.3m 1.5m
D. 1.4m 1.6m
【单选题】
移动式配电箱、开关箱底部与地面的垂直距离应大于____,小于____。___
A. 0.5m 1.6m
B. 0.6m 1.5m
C. 0.7m 1.6m
D. 0.8m 1.7m
【单选题】
遇有____级以上强风、雷电、暴雨、大雪、大雾等恶劣天气,不得进行露天脚手架搭拆作业。___
A. 8
B. 7
C. 6
D. 5
推荐试题
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv