【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“健全监管执法保障体系”中要求:严格监管执法人员资格管理,制定安全生产监管执法人员录用标准,提高专业监管执法人员比例()
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“健全监管执法保障体系”中要求:统一安全生产执法标志标识和制式服装()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“严格责任追究制度”中要求:完善生产安全事故调查组组长负责制()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“加强安全风险管控”中要求:地方各级政府要建立完善安全风险评估与论证机制,科学合理确定企业选址和基础设施建设、居民生活区空间布局()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“强化企业预防措施”中要求:企业要定期开展风险评估和危害辨识()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“强化企业预防措施”中要求:树立隐患就是事故的观念()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“强化企业预防措施”中要求:严格执行安全生产和职业健康“三同时”制度()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发磕展的意见》在“强化企业预防措施”中要求:开展经常性的应急演练和人员避险自救培训,着力提升现场应急处置能力( )
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“建立隐患治理监督机制”中要求:制定生产安全事故隐患分级和排查治理标准()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“强化城市运行安全保障”中要求:定期排查区域内安全风险点、危险源,落实管控措施,构建系统性、现代化的城市安全保障体系,推进安全发展示范城市建设()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“建立完善职业病防治体系”中要求:将职业病防治纳入各级政府民生型工程及安全生产工作考核体系,制定职业病防治中长期规划,实施职业健康促进计考划()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“发挥市场机制推动作用”中要求:取消安全生产责任保险制度,建立健全安全生产风险抵押金制度()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“发挥市场机制推动作用”中要求:取消安全生产风险抵押金制度,建立健全安全生产责任保险制度( )
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“健全安全宣传教育体系”中要求:把安全知识普及纳入国民教育,建立完善中小学安全教育和高危行业职业安全教育体系()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“健全安全宣传教育体系”中要求:把安全生产纳入农民工技能培训内容()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“健全社会化服务体系”中要求:将安全生产专业技术服务纳入现代服务业发展规划,培育多元化服务主体()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“健全社会化服务体系”中要求:鼓励中小微企业订单式、协作式购买运用安全生产管理和技术服务()
A. 对
B. 错
【判断题】
《中共中央国务院关于推进安全生产领域改革发展的意见》在“明确地方党委和政府领导责任”中要求:党政主要负责人是本地区安全生产第一责任人,班子其他成员对分管范围内的安全生产工作负领导责任()
A. 对
B. 错
【判断题】
外商独资企业的生产经营单位不需要落实安全生产主体责任( )
A. 对
B. 错
【判断题】
生产经营单位的主要负责人是本单位安全生产的第一责任人,对落实本单位安全生产主体责任全面负责( )
A. 对
B. 错
【判断题】
街道办事处以上政府及其有关部门应当依法对生产经营单位落实安全生产主体责任实施监督管理( )
A. 对
B. 错
【判断题】
生产经营单位应依法为从业人员提供劳动防护用品,并监督、教育其正确佩戴和使用( )
A. 对
B. 错
【判断题】
没有任何资质、证照的建筑施工队,属于《山东省生产经营单位安全生产主体责任规定》中的生产经营单位范围()
A. 对
B. 错
【判断题】
生产经营单位的安全生产责任制度,不仅要涵盖有关负责人和安全管理人员的责任,而且要涵盖所有岗位、所有人员的责任( )
A. 对
B. 错
【判断题】
从业人员在300人以上不足1000人的高危生产经营单位,应当设置专门的安全生产管理机构,并按不低于从业人员10‰但最低不少于5名的比例配备专职安全生产管理人员,其中至少应当有3名注册安全工程师( )
A. 对
B. 错
【判断题】
使用劳务派遣人员从事作业的,劳务派遣人员应当计入劳务派遣单位的从业人员人数( )
A. 对
B. 错
【判断题】
使用劳务派遣人员的,安全生产保障责任由劳务派遣单位承担( )
A. 对
B. 错
【判断题】
生产经营单位因改制、破产、收购、重组等发生产权变动的,在产权变动完成前,安全生产的相关责任主体不变,产权变动完成后,由受让方承担安全生产责任受让方为两个以上的,由各受让方承担安全生产责任( )
A. 对
B. 错
【判断题】
生产经营单位发生生产安全事故,造成其从业人员死亡的,死亡者家属除依法获得工伤保险补偿外,事故发生单位还应当按照有关规定向其支付一次性工亡补助金()
A. 对
B. 错
【判断题】
按照《山东省生产经营单位安全生产主体责任规定》的规定,高危生产经营单位每年至少组织1次综合或者专项应急预案演练,每半年至少组织1次现场处置方案演练,其他生产经营单位每年至少组织1次演练( )
A. 对
B. 错
【判断题】
按照《山东省生产经营单位安全生产主体责任规定》的规定,安全总监是生产经营单位安全生产管理机构的负责人( )
A. 对
B. 错
【判断题】
企业法人的分公司,属于生产经营单位母公司下属的子公司,不属于生产经营单位()
A. 对
B. 错
【判断题】
事故发生后,事故现场有关人员应当立即向本单位负责人报告生产经营单位负责人接到报告后,应当于2小时内报告事故发生地县(市、区)人民政府有关部门()
A. 对
B. 错
【判断题】
事故发生单位和相关事故责任单位应当在事故处理工作完结之日起20个工作日内,将落实批复的情况报告本级政府有关部门()
A. 对
B. 错
【判断题】
从业人员在100人以上不足300人的,应当配备专兼职安全生产管理人员( )
A. 对
B. 错
【判断题】
劳动者离开用人单位时,有权索取本人职业健康监护档案复印件,用人单位应当如实、无偿提供,并在所提供的复印件上签章( )
A. 对
B. 错
【判断题】
电焊工,锅炉工必须经过培训并持证才能上岗( )
A. 对
B. 错
【判断题】
人员密集场所的门窗不得设置影响逃生和灭火救援的障碍物( )
A. 对
B. 错
【判断题】
从业人员在300人以上的高危生产经营单位和从业人员在1000人以上的其他生产经营单位,应当建立本单位的安全生产委员会,安全生产委员会每季度至少召开1次会议,会议应当有书面记录。()
A. 对
B. 错
【判断题】
生产经营单位主要负责人和安全生产管理人员初次安全培训时间不得少于24学时,每年再培训时间不得少于12学时()
A. 对
B. 错
【判断题】
高危生产经营单位主要负责人和安全生产管理人员安全资格培训时间不得少于48学时,每年再培训时间不得少于16学时()
A. 对
B. 错
推荐试题
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic