【判断题】
电子显示屏的特点是画面丰富多彩,新闻及广告的即时性强。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
广告设施拆除作业应从上至下分层逐段拆除。
A. 对
B. 错
【判断题】
使用安全带时,应检查安全带的部件是否完整,有无损伤;安全绳是否存在断股、烫伤的现象。
A. 对
B. 错
【判断题】
梯子是由木料、竹料、绝缘材料、铝合金等材料制作的登高作业的工具。
A. 对
B. 错
【判断题】
梯脚必须使用防滑措施。
A. 对
B. 错
【判断题】
六级以上强风、大雾天气不得露天进行攀登与悬空高处作业。
A. 对
B. 错
【判断题】
从业人员可以不参加安全生产教育和培训。
A. 对
B. 错
【判断题】
安全绳是连接自锁器与坠落悬挂安全的绳,不具有吸收冲击能量的作用。
A. 对
B. 错
【判断题】
根据国家标准,座板式单人吊具是个体使用的具有防坠落功能,沿建筑物立面自上而下移动的无动力载人作业用具。
A. 对
B. 错
【判断题】
棒式下降器的工作原理是利用缠绕在棒式下降器轴上的工作绳所产生的摩擦力来控制作业人员的下降速度。
A. 对
B. 错
【判断题】
连锁装置的基本原理是只有安全装置关合时,机器才能转动。
A. 对
B. 错
【判断题】
外墙采用砖墙、砖柱的承重结构,它的结构简单、造价经济、施工方便。
A. 对
B. 错
【判断题】
自动安全装置的机构是把暴露在危险中的人体从危险区域中移开,不限任何运转的机器上使用。
A. 对
B. 错
【判断题】
楼梯是多层建筑的非重要垂直交通设施。
A. 对
B. 错
【判断题】
墙或柱是建筑物的承重配件,它承受屋顶、楼板下传来的各种荷载,并连同自重一起传给础。
A. 对
B. 错
【判断题】
只要接触物体粗糙面,就会产生静摩擦力。
A. 对
B. 错
【判断题】
外墙清洗时断电,首先关闭电源,防止来电发生意外。
A. 对
B. 错
【判断题】
用水清洗室外机冷凝器需要在断电的情况下进行。
A. 对
B. 错
【判断题】
手动垂直式升降作业平台(车)是一种钢结构简单,操作方便载重量较小,作业高度低的作业平台(车),靠小电机启动升降。
A. 对
B. 错
【判断题】
在拆除作业中,发现不明物体,应停止施工,采取相应的应急措施,保护现场,及时向有关部门报告。
A. 对
B. 错
【判断题】
广告维护作业时多是单人作业,没有其他人干扰,只要注意安全,不带保险带不会出什么问题。
A. 对
B. 错
【判断题】
地下室、人防内空气不流通时,必须设置通风换气设施。
A. 对
B. 错
【判断题】
采暖与空调水管道水平安装时,应有2‰~5‰的坡度坡向泄水处,且管道坡度均匀。
A. 对
B. 错
【判断题】
在地下室人防内进行电焊作业时,不必设置通风换气设施。
A. 对
B. 错
【判断题】
一个体在另一个粗糙物体表面滑动、有相对运动趋势的滚动,则物体受到滑动摩擦力、静摩擦力或滚动摩擦力。
A. 对
B. 错
【判断题】
消防泵电源由现场总配电箱总开并上口引接,且应保持不间断供电。
A. 对
B. 错
【判断题】
广告施工高处作业使用吊装设备吊装桁架或广告结构时,应选择方便的位置作起吊点。
A. 对
B. 错
【判断题】
水平安全绳即水平固定安全绳。
A. 对
B. 错
【判断题】
高处作业时可以适当的饮酒,不影响操作。
A. 对
B. 错
【判断题】
从业人员可享受工伤保险和因生产安全事故受到损害时要求赔偿的权利。
A. 对
B. 错
【判断题】
用人单位必须采用有效的职业病防护措施,并为劳动者提供个人使用的职业病防护用品。
A. 对
B. 错
【判断题】
作业中,工作绳端头不应松散,不应用接头。
A. 对
B. 错
【判断题】
下降器是安装在工作绳上,以通过工作载重量为动力、自动下降的装置。
A. 对
B. 错
【判断题】
跳闸安全装置的作用,是在操作到危险点之前,自动使机器停止或反方向运动。
A. 对
B. 错
【判断题】
沿着力的作用线进行移动,不会改变力的作用方向。
A. 对
B. 错
【判断题】
预防物体打击应该佩戴安全帽。
A. 对
B. 错
【判断题】
在周围环境不会危及生命的情况下,可以随便搬动伤员。
A. 对
B. 错
【判断题】
高处作业现场安全隐患分为高处坠落、触电事故和物体打击三大类。
A. 对
B. 错
【判断题】
建筑物顶层广告设施基础制作有时会遇到与原建筑结构主柱樑钢结构、钢筋焊接的连接方法。焊接后应进行强度试验。
A. 对
B. 错
【判断题】
高处作业施工进行电、气焊作业,只要充分了解环境,注意安全可不必使用接火装置。
A. 对
B. 错
【判断题】
剪刀式高空作业平台(车)有电瓶、柴油发动机两种方式。
A. 对
B. 错
推荐试题
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall