【单选题】
《安全生产法》规定,任何单位或者___对事故隐患或者安全生产违法行为,均有权向负有安全生产监督管理职责的部门报告或者举报。(单选题)
A. 职工
B. 个人
C. 管理人员
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
低压电工作业是指对___V以下的电气设备进行安装、调试、运行操作等的作业。(单选题)
A. 250
B. 500
C. 1000
【单选题】
在易燃易爆场所使用的照明灯具应采用___灯具。(单选题)
A. 防爆型
B. 防潮型
C. 普通型
【单选题】
电机在正常运行时的声音,是平稳、轻快、___和有节奏的。(单选题)
A. 尖叫
B. 均匀
C. 摩擦
【单选题】
对电机轴承润滑的检查,___电动机转轴,看是否转动灵活,听有无异声。(单选题)
A. 通电转动
B. 用手转动
C. 用其它设备带动
【单选题】
一般线路中的熔断器有___保护。(单选题)
A. 过载
B. 短路
C. 过载和短路
【单选题】
利用交流接触器作欠压保护的原理是当电压不足时,线圈产生的___不足,触头分断。(单选题)
A. 磁力
B. 涡流
C. 热量
【单选题】
电容器组禁止___。(单选题)
A. 带电合闸
B. 带电荷合闸
C. 停电合闸
【单选题】
螺旋式熔断器的电源进线应接在___。(单选题)
A. 上端
B. 下端
C. 前端
【单选题】
热继电器具有一定的___自动调节补偿功能。(单选题)
A. 时间
B. 频率
C. 温度
【单选题】
测量接地电阻时,电位探针应接在距接地端___m的地方。(单选题)
A. 5
B. 20
C. 40
【单选题】
在均匀磁场中,通过某一平面的磁通量为最大时,这个平面就和磁力线___。(单选题)
A. 平行
B. 垂直
C. 斜交
【单选题】
串联电路中各电阻两端电压的关系是___。(单选题)
A. 各电阻两端电压相等
B. 阻值越小两端电压越高
C. 阻值越大两端电压越高
【单选题】
交流10kV母线电压是指交流三相三线制的___。(单选题)
A. 线电压
B. 相电压
C. 线路电压
【单选题】
在检查插座时,电笔在插座的两个孔均不亮,首先判断是___。(单选题)
A. 短路
B. 相线断线
C. 零线断线
【单选题】
使用剥线钳时应选用比导线直径___的刃口。(单选题)
A. 相同
B. 稍大
C. 较大
【单选题】
对电机各绕组的绝缘检查,如测出绝缘电阻为零,在发现无明显烧毁的现象时,则可进行烘干处理,这时___通电运行。(单选题)
A. 允许
B. 不允许
C. 烘干好后就可
【单选题】
根据线路电压等级和用户对象,电力线路可分为配电线路和___线路。(单选题)
A. 动力
B. 照明
C. 送电
【单选题】
更换熔体时,原则上新熔体与旧熔体的规格要___。(单选题)
A. 不同
B. 相同
C. 更新
【单选题】
一般情况下220V工频电压作用下人体的电阻为___Ω。(单选题)
A. 500-1000
B. 800-1600
C. 1000-2000
【单选题】
运输液化气,石油等的槽车在行驶时,在槽车底部应采用金属链条或导电橡胶使之与大地接触,其目的是___。(单选题)
A. 中和槽车行驶中产生的静电荷
B. 泄漏槽车行驶中产生的静电荷
C. 使槽车与大地等电位
【单选题】
低压电容器的放电负载通常___。(单选题)
A. 灯泡
B. 线圈
C. 互感器
【单选题】
低压电器按其动作方式又可分为自动切换电器和___电器。(单选题)
A. 非自动切换
B. 非电动
C. 非机械
【单选题】
熔断器的保护特性又称为___。(单选题)
A. 灭弧特性
B. 安秒特性
C. 时间性
【单选题】
组合开关用于电动机可逆控制时,___允许反向接通。(单选题)
A. 不必在电动机完全停转后就
B. 可在电动机停后就
C. 必须在电动机完全停转后才
【单选题】
电能表是测量___用的仪器。(单选题)
A. 电流
B. 电压
C. 电能
【单选题】
单相电度表主要由一个可转动铝盘和分别绕在不同铁芯上的一个___和一个电流线圈组成。(单选题)
A. 电压线圈
B. 电压互感器
C. 电阻
【单选题】
通电线圈产生的磁场方向不但与电流方向有关,而且还与线圈___有关。(单选题)
A. 长度
B. 绕向
C. 体积
【单选题】
单极型半导体器件是___。(单选题)
A. 二极管
B. 双极性二极管
C. 场效应管
【单选题】
电动势的方向是___。(单选题)
A. 从负极指向正极
B. 从正极指向负极
C. 与电压方向相同
【单选题】
生产经营单位的主要负责人在本单位发生重大生产安全事故后逃匿的,由___处15日以下拘留。(单选题)
A. 公安机关
B. 检察机关
C. 安全生产监督管理部门
【单选题】
在易燃、易爆危险场所,供电线路应采用___方式供电。(单选题)
A. 单相三线制,三相四线制
B. 单相三线制,三相五线制
C. 单相两线制,三相五线制
【单选题】
图示的电路中,在开关S1和S2都合上后,可触摸的是___。(单选题)
A. 第二段
B. 第三段
C. 无
【单选题】
下列现象中,可判定是接触不良的是___。(单选题)
A. 日光灯启动困难
B. 灯泡忽明忽暗
C. 灯泡不亮
【单选题】
锡焊晶体管等弱电元件应用___W的电烙铁为宜。(单选题)
A. 25
B. 75
C. 100
【单选题】
笼形异步电动机采用电阻降压启动时,启动次数___。(单选题)
A. 不宜太少
B. 不允许超过3次/小时
C. 不宜过于频繁
【单选题】
电动机___作为电动机磁通的通路,要求材料有良好的导磁性能。(单选题)
A. 机座
B. 端盖
C. 定子铁芯
【单选题】
导线接头的绝缘强度应___原导线的绝缘强度。(单选题)
A. 大于
B. 等于
C. 小于
【单选题】
下列材料不能作为导线使用的是___。(单选题)
A. 铜绞线
B. 钢绞线
C. 铝绞线
【单选题】
对照电机与其铭牌检查,主要有___、频率、定子绕组的连接方法。(单选题)
A. 电源电压
B. 电源电流
C. 工作制
【单选题】
在对380V电机各绕组的绝缘检查中,发现绝缘电阻___,则可初步判定为电动机受潮所致,应对电机进行烘干处理。(单选题)
A. 小于10MΩ
B. 大于0.5MΩ
C. 小于0.5MΩ
推荐试题
【填空题】
47.中国人民解放军海军成立于___年。
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC