【多选题】
施工现场哪些地方必须按规定配置消防器材。___
A. 木工加工场所
B. 食堂
C. 配电室
D. 宿舍
E. 办公室
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
ABCDE
解析
暂无解析
相关试题
【多选题】
超高、超重、大跨度模板支撑系统是指( )或集中线荷载大于15KN/M的模板支撑系统。___
A. 高度超过8m
B. 跨度超过18m
C. 施工总荷载大于15KN/m2
D. 高度超过5m
E. 跨度超过15m
【多选题】
《危险性较大的分部分项工程安全管理规定》住建部第37号令规定,施工单位应当在施工现场显著位置公告( ),并在危险区域设置安全警示标志。___
A. 危大工程名称
B. 安全措施
C. 具体责任人员
D. 施工时间
E. 应急措施
【多选题】
施工场地的文明要求正确的是___。
A. 道路应畅通,路面应平整坚实
B. 所有地面都应铺设25厘米厚的混凝土
C. 置排水设施,且排水通畅无积水
D. 不扬尘
E. 有绿化布置
【多选题】
施工现场材料堆放的要求正确的是___。
A. 按总平面布局进行码放
B. 码放整齐、有序
C. 料堆上挂设名称、品种、规格标牌
D. 易燃易爆物品应分类储藏在专用库房
E. 场地限制时统一靠在围墙外
【多选题】
总包单位应对承揽分包工程的分包单位进行( )的审查和安全管理。___
A. 资质
B. 安全生产许可证
C. 相关人员安全生产资格
D. 按规定建立安全机构
E. 配备专职安全员
【多选题】
《福建省建筑起重机械安全管理导则(试行)》规定,建机一体化企业的( )应当进行现场监督,技术负责人应当定期巡查。___
A. 专业技术人员
B. 专职安全生产管理人员
C. 技术负责人
D. 现场负责人
E. 企业负责人
【多选题】
《福建省建筑起重机械安全管理导则(试行)》规定,建筑起重机械检测合格后,使用单位应组织( )对建筑起重机械进行验收,填写《建筑起重机械安装验收表》,验收合格后方可投入使用。未经验收或验收不合格的起重机械不得使用。___
A. 出租单位
B. 建机一体化企业
C. 监理单位
D. 安装单位
E. 检测单位
【多选题】
《福建省建筑起重机械安全管理导则(试行)》规定,建筑起重机械在安装(拆卸)前,使用单位必须核对建机一体化企业、的安装拆卸作业人员《建筑施工特种作业操作资格证书》,安装拆卸作业人员必须持证上岗。对整个安装过程实施现场监督,见证以下工作( ),并填写《建筑起重机械安装(拆卸)监控记录表》。___
A. 建机一体化企业技术负责人向全体安装(拆卸)作业人员,进行安装(拆卸)专项施工方案和安全技术交底
B. 对所安装、拆卸的建筑起重机械以及参与安装、拆卸用的工具、索具及辅助起重机械设备进行检查
C. 对建筑起重机械基础的验收
D. 建筑起重机械安装完毕,安装单位的自检工作
E. 建机一体化企业与使用单位进行检查工作
【多选题】
以下( )危险源需要公示。___
A. 冬季工地生活区洗澡可能导致的中风
B. 深基坑施工可能导致的窒息
C. 深基坑施工可能导致的坍塌、高处坠落
D. 宿舍可能导致的火灾
E. 食堂可能发生的食物中毒
【多选题】
路基土方开挖应采取保证边坡稳定的安全措施,下列说法正确的是___
A. 有防护要求的应开挖一级防护一级。
B. 开挖应自上而下开挖。
C. 开挖时不稳定的孤石应及时清理。
D. 开挖应采取掏槽开挖。
E. 开挖应上下同时开挖
【多选题】
下列关于爆破工程说法正确的有那些选项___
A. 爆破方案应经有关部门审批,并按专项施工方案实施。
B. 爆破施工作业应向公安机关申请,并应由由爆破施工资质的单位实施。
C. 爆破作业人员应由相应的安全作业证。
D. 爆破作业前应进行安全技术交底。
【单选题】
3C认证标志的式样由基本图案、认证种类标注组成,基本图案中“CCC”,全称为。___
A. “中国强制性认可”
B. “中国限制性认证”
C. “中国限制性认可”
D. “中国强制性认证”
【单选题】
以下不属于3C认证标志的是______。___
A. CCC+S 安全认证标志
B. CCC+G 绿色认证标志
C. CCC+S&E 安全与电磁兼容认证标志
D. CCC+EMC 电磁兼容类认证标志
【单选题】
成套设备是指______。___
A. 完整的生产线、成套装置设施;
B. 金额超过1000万美元的生产线;
C. 金额超过2000万美元完整生产线;
D. 金额超过2000万美元的生产线或装置设施;
【单选题】
自______起,所有制造和销售的非道路移动机械用柴油机,其排气污染物排放必须符合国三阶段要求。___
A. 2015年10月1日
B. 2016年10月1日;
C. 2017年10月1日;
D. 2018年10月1日;
【单选题】
海关对检验的进出口商品抽取样品,对验余的样品的正确处理方式是____________。___
A. 销毁
B. 对逾期不领回的,代为货主保存
C. 通知有关单位在规定的期限领回
D. 扣押
推荐试题
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode