【判断题】
压缩气体和液化气体仓库应阴凉通风,远离热源、火种,防止日光暴晒,严禁受热,库内照明应采用防爆照明灯,库房周围不得堆放任何可燃材料。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
易燃液体的蒸汽很容易被引燃。
A. 对
B. 错
【判断题】
危险化学品仓库的建筑屋架可以根据所存危险化学品的类别和危险等级采用木结构、钢结构或装配式钢筋混凝土结构。
A. 对
B. 错
【判断题】
储存剧毒化学品以及重大危险源的其他危险化学品的单位,应当将储存剧毒化学品以及重大危险源的其他危险化学品的数量、地点以及管理人员的情况,报公安部门和负责危险化学品安全监督管理综合工作的部门备案。
A. 对
B. 错
【判断题】
压缩气体如正丁烷、乙炔等发生着火时,应迅速灭火,然后切断气源。
A. 对
B. 错
【判断题】
压缩气体和液化气体的特点是压力大、温度高。
A. 对
B. 错
【判断题】
在职业安全健康管理体系中绩效测量和监测中被动测量是一种预防机制。
A. 对
B. 错
【判断题】
从事危险化学品零售业务的店面内危险化学品的摆设应布局合理,禁忌物料可混合存放。
A. 对
B. 错
【判断题】
搞好危险化学品安全生产管理,是全面落实科学发展观的必然要求,是建设和谐社会的迫切需要,是各级政府和生产经营单位做好安全生产工作的基础。
A. 对
B. 错
【判断题】
安全管理原理是现代企业安全科学管理的基础、战略和纲领。
A. 对
B. 错
【判断题】
危险化学品仓库应有专职或义务消防、警卫队伍。如果是义务消防、警卫队伍,不必制定灭火预案和进行消防演练。但专职消防队伍必须制定灭火预案并经常进行消防演练。
A. 对
B. 错
【判断题】
有毒物品应储存在阴凉、通风、干燥的场所,不要露天存放,不要接近酸类物质。
A. 对
B. 错
【判断题】
在管理中必须把人的因素放在首位,体现以人为本的指导思想,这就是安全第一原则。
A. 对
B. 错
【判断题】
从事危险化学品批发业务的企业,所经营的危险化学品可以存放在业务经营场所。
A. 对
B. 错
【判断题】
在同一建筑物或同一区域内,用隔板或墙,将禁忌物料分开的储存方式叫隔离储存。
A. 对
B. 错
【判断题】
危险化学品经营许可证是从事危险化学品的采购、调拨、销售活动的合法凭证。
A. 对
B. 错
【判断题】
危险化学品经营销售实行许可制度只适用于中华人民共和国境内国有企业,不适用于个人或私有企业。
A. 对
B. 错
【判断题】
事故发生后,危险区域人员首先要做好自救互救,在医护人员到达时,要听从医护人员的指挥,采取切实可行的救助办法,以达到减少人员伤亡的目的。
A. 对
B. 错
【判断题】
单位或者个人违反《中华人民共和国突发事件应对法》,不服从所在地人民政府及其有关部门发布的决定、命令或者不配合其依法采取的措施,构成违反治安管理行为的,由公安机关依法给予处罚。
A. 对
B. 错
【判断题】
生产经营单位风险种类多、可能发生多种事故类型的,可以不用编制本单位的综合应急预案。
A. 对
B. 错
【判断题】
《中华人民共和国突发事件应对法》所称突发事件,是指突然发生,造成社会危害,需要采取应急措施的事件。
A. 对
B. 错
【判断题】
属于易制毒化学品中的危险化学品可以使用现金或者实物进行交易。
A. 对
B. 错
【判断题】
危险化学品生产企业必须向用户提供化学事故应急咨询服务,为化学事故应急救援提供技术指导和必要的协助。
A. 对
B. 错
【判断题】
从事危险化学品经营的单位应有符合国家规定的危险化学品事故应急预案,并配备必要的应急救援器材、设备。
A. 对
B. 错
【判断题】
直流电流与交流电流相比,容易摆脱,其室颤电流也比较小,因而,直流电击事故很少。
A. 对
B. 错
【判断题】
感知电流一般不会对人体构成伤害,但有可能导致二次事故。
A. 对
B. 错
【判断题】
锅炉包括两大部分:盛装水、汽的“锅”和进行燃烧加热的“炉”。
A. 对
B. 错
【判断题】
《压力容器安全技术监察规程》规定,压力容器运行操作人员,应加强对液面计的维护管理,保持完好和清晰。
A. 对
B. 错
【判断题】
劳动者因某种原因未接受离岗时职业健康检查,用人单位可以解除或者终止与其订立的劳动合同。
A. 对
B. 错
【判断题】
建设项目职业病防护设施建设期间,建设单位应当对其进行经常性的检查,对发现的问题及时进行整改。
A. 对
B. 错
【判断题】
《使用有毒物品作业场所劳动保护条例》规定,使用单位应将危险化学品的有关安全卫生资料向职工公开,教育职工识别安全标签、了解安全技术说明书、掌握必要的应急处理方法和自救措施,经常对职工进行工作场所安全使用化学品的教育和培训。
A. 对
B. 错
【判断题】
存在高毒作业的危险化学品建设项目的防护设施、设计,未经卫生行政部门审查同意,可进行施工操作。
A. 对
B. 错
【判断题】
《常用危险化学品分类标志》规定,氧化剂包括含有过氧基的无机物,其本身不一定可燃,但能导致可燃物的燃烧。
A. 对
B. 错
【判断题】
加油站邻近单位发生火灾时,可继续营业但应向上级报告。
A. 对
B. 错
【判断题】
不是任一个点火源都能引燃每一种可燃物。
A. 对
B. 错
【判断题】
有些自燃物品遇火或受潮后能分解引起自燃或爆炸。
A. 对
B. 错
【判断题】
与氧化剂相比,有机过氧化物更危险。
A. 对
B. 错
【判断题】
爆炸品与其他非爆炸品严禁混储混运,点火器材、起爆器材与炸药、爆炸性药品以及发射药、烟火等其他爆炸品可以共同储存和运输。
A. 对
B. 错
【判断题】
氧化性物质的危险性是通过与其他物质作用或自身发生化学变化的结果表现出来的。
A. 对
B. 错
【判断题】
氧化剂的特点是其本身不一定可燃,但能导致可燃物的燃烧。
A. 对
B. 错
【判断题】
爆炸品不包括以爆炸物质为原料制成的成品。
A. 对
B. 错
推荐试题
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting