【判断题】
有关涉密的文件、资料的制作、保管建立病毒防护系统后可上网
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
实验室的接线板远离可能有水的位置和高温环境
A. 对
B. 错
【判断题】
红外灯、紫外灯不得安装在木柜或纸箱中使用
A. 对
B. 错
【判断题】
电炉、烘箱等用电设备在使用中,使用人员不得离开
A. 对
B. 错
【判断题】
剧毒品管理应严格遵守“五双”制度(即"双人保管、双人收发、双人使用、双人运输、双人双锁"),精确计量和记录剧毒品的使用情况,防止被盗、丢失、误领、误用。如发现问题应立即报告保卫处、实验室与设备管理处和当地公安部门
A. 对
B. 错
【判断题】
使用电子门禁的大楼和实验室,应各类人员设置相应的级别,于门禁卡丢失、人员调动或离校等情况应及时采取措施,办理报失或移交手续
A. 对
B. 错
【判断题】
涉辐人员必须持有辐射安全与防护培训合格证书,并佩带个人剂量计进行实验
A. 对
B. 错
【判断题】
电离辐射(放射性)的警告标识是: 
A. 对
B. 错
【判断题】
 
A. 对
B. 错
【判断题】
涉源单位产生放射性废源废物要及时送贮(一般3个月内),按规定处置,不得直接排入下水道或混装到普通垃圾中
A. 对
B. 错
【判断题】
辐射工作场所的入口处可以不必放置辐射警示标志和工作信号
A. 对
B. 错
【判断题】
所有操作或接触放射性核素的实验室人员应接受放射性基础知识、相关技术和放射性防护的指导和培训。实行持证上岗,并佩戴个人专用的辐射剂量计
A. 对
B. 错
【判断题】
同位素实验室和使用固定放射源实验室要在明显位置张贴放射警示标志。定期检测放射污染情况,严防射线污染超标
A. 对
B. 错
【判断题】
 
A. 对
B. 错
【判断题】
铸造实习期间不准穿凉鞋、拖鞋,不准穿短裤,女生不准穿裙子
A. 对
B. 错
【判断题】
不准在车间打闹,不准随意攀登吊车、墙梯或者其它设备,不准在吊车吊运物体运行线上行走或停留
A. 对
B. 错
【判断题】
实验室应仪器设备加强维护保养,定期校验和检修
A. 对
B. 错
【判断题】
因实验需要,仪器设备可以随便拆装
A. 对
B. 错
【判断题】
电气设备和大型仪器须接地良好,电线老化等隐患要定期检查并及时排除
A. 对
B. 错
【判断题】
用手搬运重物时,应先以半蹲姿势,抓牢重物,然后用腿肌出力站起,切勿弯腰,以防伤及背部和腰
A. 对
B. 错
【判断题】
人工呼吸的方法是捏紧伤者鼻孔,深吸一口气后紧贴伤者的口向口内吹气,时间约为2秒钟,吹气完毕后,立即松开伤者的鼻孔,让他自行呼气,时间约3秒钟。如此以每分钟约12次的速度进行
A. 对
B. 错
【判断题】
胸外心脏挤压法:救护者跪在触电者一侧或骑跪在其腰部两侧,两手相迭,手掌根部放在伤者心窝上方、胸骨下,掌根用力垂直向下挤压,压出心脏里面的血液,挤压后迅速松开,胸部自动复原,血液充满心脏,以每分钟60次速度进行
A. 对
B. 错
【判断题】
心脏骤停者应立即行胸外心脏按摩术,同时拨打120。现场抢救成功的心肺复苏患者或重症患者,如昏迷、惊厥、休克、深度青紫等,应立即送医院治疗
A. 对
B. 错
【判断题】
强酸灼伤时,必须先用大量流水彻底冲洗,然后在皮肤上擦拭碱性药物,否则会加重皮肤损伤
A. 对
B. 错
【判断题】
碱灼伤时,必须先用大量流水冲洗至皂样物质消失,然后可用1%~2%醋酸或3%硼酸溶液进一步冲洗
A. 对
B. 错
【判断题】
护送病人时,应取掉口中异物,采用平卧位,头部稍低,保持呼吸畅通
A. 对
B. 错
【判断题】
发生意外后先伤员进行必要的止血、包扎、固定等处理,然后尽可能用担架搬运,搬运时病人始终处脚朝前,头朝后,以便于随时观察伤者情况变化,及时实施急救处理
A. 对
B. 错
【判断题】
急救时伤口包扎越紧越好
A. 对
B. 错
【判断题】
急救时伤口包扎松劲适度,不可过紧或过松,以防滑脱或压迫神经和血管,影响远端血液循环,甚至造成肢体坏死
A. 对
B. 错
【判断题】
某人因机械操作不慎,致使左手食指从指根完全离断,急救处理首先是找器皿保存断指,然后包扎残端伤口止血
A. 对
B. 错
【判断题】
实施急救的顺序:若有呼吸心跳停止的,先行复苏,然后是止血、包扎、骨折固定或脱臼复位(固定)、搬运
A. 对
B. 错
【判断题】
火或热水等引起的小面积烧伤、烫伤,必须用冷水冲洗30分钟以上,然后用烧伤膏涂抹,切不可用牙膏、酱油、盐等覆盖
A. 对
B. 错
【判断题】
火或热水等引起的大面积烧伤、烫伤,必须用湿毛巾、湿布、湿棉被覆盖,然后送医院进行处理
A. 对
B. 错
【判断题】
触电时,不可人去拉(可用木棒把伤员挑开),应立即切断电源,然后先做人工呼吸,再做心脏按压,同时报120送医院进行处理
A. 对
B. 错
【判断题】
突发性不可抗拒的雷电、水灾、地震、房屋垮塌等自然灾害事故发生后,应在领导小组的指挥下,马上组织疏散、抢救现场工作人员或进行人员自助自救,以确保人员的人身安全,作好善后工作
A. 对
B. 错
【判断题】
实验中遇到一般割伤,应立即取出伤口内的异物,保持伤口干净,并用酒精棉清除伤口周围的污物,涂上外伤膏或消炎粉
A. 对
B. 错
【判断题】
实验中遇到严重割伤,可在伤口上部10cm处用沙布扎紧,减慢流血,并立即送医院
A. 对
B. 错
【判断题】
实验中遇到一般烫伤和烧伤,不要弄破水泡,在伤口处用95%的酒精轻涂伤口,涂上烫伤膏或涂一层凡士林油,再用纱布包扎
A. 对
B. 错
【判断题】
如溴滴落到皮肤上,应立即用水冲洗,再用1体积25%的氨水,1体积松节油和10体积(75%)酒精混合液涂敷;也可先用苯甘油除去溴,然后用水冲洗
A. 对
B. 错
【判断题】
如酚灼伤皮肤,先用浸了甘油或聚乙二醇和酒精混合液(7:3)的棉花除去污物,再用清水冲洗干净,然后用饱和硫酸钠溶液湿敷。但不可用水直接冲洗污物,否则有可能使创伤加重
A. 对
B. 错
【判断题】
实验中溅入口中而尚未下咽的毒物,应立即吐出,并用大量水冲洗口腔
A. 对
B. 错
推荐试题
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall