【单选题】
不属于战斗员正确射水姿势的是___。
A. 立式
B. 蹲式
C. 卧式
D. 肩式
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
下列战斗员卧射姿势描述不正确的是___。
A. 右脚后退一步并下蹲,双手前伸支撑上体。
B. 双脚向后叉开伸直,脚尖向外,脚跟相对于肩同宽。
C. 右臂肘部着地握水枪前部,左手小臂着地扶水带,目视前方喊“好”。
D. 右手将水枪按在地上。
【单选题】
救援中,不适应于搬运失去自主活动能力的轻伤人员的方法___。
A. 背式救人
B. 抱式救人
C. 抬式救人
D. 肩负式救人
【单选题】
下列伤口包扎的要点不正确的是___。
A. 慢
B. 准
C. 轻
D. 细
【单选题】
破拆工具大体分为手动破拆工具.动力破拆工具和___。
A. 化学破拆工具
B. 液压破拆工具
C. 电动破拆工具
D. 高压破拆工具
【单选题】
当建筑物内可燃物数量较多(火灾荷载密度>50kg/m2)时,使用Ф19mm水枪(有效射程为15m)灭火,每支水枪的控制面积可按___m2估算。
A. 30
B. 50
C. 80
D. 100
【单选题】
扑救油罐火灾邻近罐的冷却强度是___L/s.m2。
A. 0.1~0.15
B. 0.15~0.2
C. 0.2~0.3
D. 0.35~0.7
【单选题】
排除和输送温度超过80℃的空气或其它气体以及易燃碎屑的管道,与可燃或难燃物体之间应保持不小于___mm的间隙。
A. 150
B. 200
C. 250
D. 400
【单选题】
设置在四层的歌舞娱乐游艺放映场所内建筑面积小于等于___㎡的房间,可设置一个疏散门。
A. 50
B. 60
C. 65
D. 75
【单选题】
卤钨灯和超过100W的白炽灯泡的吸顶灯.槽灯.嵌入式灯的引入线不应采用___作隔热保护。
A. 瓷管
B. 石棉
C. 玻璃丝
D. 阻燃的PVC
【单选题】
旧建筑物原安装的配电设备从未检修更新,家电增多,用电量增大,超负载使用,容易发生电线过载发热,引起___。
A. 火灾
B. 触电
C. 电线损坏
D. 烧毁家电
【单选题】
消防工作贯彻___的方针。
A. 以防为主,以消为辅
B. 以消为主,以防为辅
C. 预防为主,防消结合
D. 消灭为主,防消结合
【单选题】
燃烧的必要条件主要包括可燃物.___.温度。
A. 氧气
B. 助燃剂
C. 热量
D. 空气
【单选题】
闪燃是固体和___的燃烧类型。
A. 气体
B. 液体
C. 油类
D. 氧气
【单选题】
在火场上燃烧物质所放出的热能,通常是以传导.___.辐射等方式传播。
A. 循环
B. 感应
C. 混合
D. 对流
【单选题】
公共娱乐场所一般与甲.乙类生产厂房.库房之间应留有不少于___米的防火间距。
A. 30
B. 40
C. 50
D. 60
【单选题】
商场的安全出口疏散宽度不应小于___米。
A. 1.4
B. 1.5
C. 1.6
D. 1.8
【单选题】
宾馆.饭店内的装饰灯具,如果装饰件是由可燃材料制成的,其灯泡功率不得超过___W。
A. 40
B. 50
C. 60
D. 80
【单选题】
宾馆.饭店内的疏散用应急照明灯,其地面最低照度不应低于()lx,且连续供电时间不应少于___min
A. 0.620
B. 0.530
C. 0.630
D. 0.520
【单选题】
电路一般是由电源.___.连接导线和控制设备四个部分组成。
A. 用电设备
B. 电流
C. 负载
D. 开关
【单选题】
电阻的连接方式主要有串联.___.混连。
A. 并连
B. 混合连
C. 分连
D. 全连
【单选题】
常用电工仪表按用途分可分为电压表.电流表.___等。
A. 伏特表
B. 压力表
C. 功率表
D. 万用表
【单选题】
电气线路引发火灾的主要原因是接触电阻过大.过负荷以及___。
A. 连电
B. 短路
C. 电火花
D. 内部故障
【单选题】
防雷装置是指___.引下线.接地装置.过电压保护器及其他连接导体的总和。
A. 避雷针
B. 避雷器
C. 导入器
D. 接闪器
【单选题】
火灾自动报警系统由___.报警装置.警报装置.控制设备和电源五部分组成。
A. 触发装置
B. 电气设备
C. 操控装置
D. 应急设备
【单选题】
火灾探测器可以把温度.___.辐射光强度等转换成电信号,向火灾报警控制器发送报警信号。
A. 烟雾强度
B. 烟雾浓度
C. 烟气强度
D. 烟气浓度
【单选题】
消防广播从结构形式上可分为___广播和总线制广播两种。
A. 分线制
B. 连线制
C. 多线制
D. 导线制
【单选题】
室外消防给水系统的类型,按消防水压分,可分为高压消防给水系统,临时高压消防给水系统和___。
A. 常压消防给水系统
B. 临时常压消防给水系统
C. 低压消防给水系统
D. 临时低压消防给水系统
【单选题】
根据对消防用水水量或扬程的不同要求,消防水泵可以采取串连和___两种形式进行连接。
A. 并连
B. 混连
C. 分连
D. 全连
【单选题】
室内消火栓设备,通常由水枪.水带和___组成。
A. 分水器
B. 消火栓
C. 水管
D. 报警器
【单选题】
室内火灾的发展过程主要包括初起阶段.___.猛烈燃烧阶段和下降熄灭阶段。
A. 上升阶段
B. 平衡阶段
C. 持续阶段
D. 发展阶段
【单选题】
防火门按其耐火极限可分为甲乙丙三级,耐火极限分别不低于___小时。
A. 2.01.61.2
B. 1.51.21.0
C. 1.20.90.6
D. 1.00.60.3
【单选题】
公共建筑的入场门.太平门的净宽度不应小于()米,紧靠门口()米内不应设置踏步;室外疏散小巷的净宽度不应小于___米。
A. 1.51.44
B. 1.41.53
C. 1.51.54
D. 1.41.43
【单选题】
消防电梯应设___,并宜靠外墙设置。
A. 前室
B. 前门
C. 前厅
D. 避难间
【单选题】
根据装修材料的不同燃烧性能,将内部装修材料分为四级,其中B1为___。
A. 可燃性材料
B. 不燃性材料
C. 易燃性材料
D. 难燃性材料
【单选题】
消防用电设备的配电线路应穿管保护,明敷时,必须穿___管。
A. PVC
B. 金属
C. 塑料
D. 铜
【单选题】
低倍数泡沫是指发泡倍数在___倍以下的泡沫。
A. 1
B. 2
C. 20
D. 200
【单选题】
人员密集场所火灾特点主要是火势猛烈.蔓延迅速;烟雾浓.毒性大,易造成人员伤亡;___;扑救火灾难度大;疏散困难等。
A. 有毒气体威胁大
B. 火场高温炙烤
C. 玻璃幕墙恼人
D. 人员密集
【单选题】
火场逃生的原则是:确保安全.迅速撤离,___。
A. 顾全大局.救助结合
B. 相互扶持.密切配合
C. 熟悉环境.暗记出口
D. 做好防护.组织有序
【单选题】
常见的水枪射流类型有分散射流和___射流。
A. 密集
B. 集中
C. 全面
D. 整体
【单选题】
用水扑救油类火灾,主要是利用水能___非水溶性可燃液体。
A. 稀释
B. 溶化
C. 乳化
D. 冷却
推荐试题
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules