【单选题】
"发生夹人夹物时,司机与站台岗应做好信息互通,由( )进行异物处理。
A. 站务人员
B. 行车值班员
C. 客运值班员及一名站务人员
D. 值班站长 "
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
《行车组织规则》--8.10.1
相关试题
【单选题】
"施工负责人及施工人员应在施工计划规定的开始时间前( )分钟到达登记地点,按规定办理施工作业手续。
A. 5
B. 10
C. 15
D. 30"
【单选题】
遇正线施工特殊情况需延长作业时间时,由施工负责人在规定的作业结束时间前 ( ) 分钟通过主站向行调申请,由值班主任审批后实施。
A. 5
B. 10
C. 15
D. 30
【单选题】
原则上,正线施工的开始时间为最后一列车(含运营的电客车、进行施工作业的工程车/电客车)通过作业影响区域( )(编制计划时以 15 分钟予以预估);结束时间为列车运行图第一列电客车或巡道车出段时间 45 分钟之前。
A. 一站一区间
B. 一站两区间
C. 两站一区间
D. 两站两区间
【单选题】
在动车作业区域两端必须保证( )空闲以作为防护区域,原则上两个动车作业区域不能共用同一个防护区域。
A. 一站一区间
B. 一站两区间
C. 两站一区间
D. 两站两区间
【单选题】
工程车在车站装卸物料时,物料必须整齐堆放稳固在距站台边缘 ( )米以外的地方,施工负责人应做好监控并查看物品是否侵限。
A. 0.5
B. 1
C. 1.5
D. 2
【单选题】
"委外单位进行A0、A1、B1类施工作业时,须由所属专业归口管理部门指派人员担任( )。
A. 施工负责人
B. 施工监管人
C. 施工联络人
D. 施工归口人"
【单选题】
"接触网挂好地线后,在地线绝缘杆离地面( )处悬挂红闪灯,地线拆除后同时撤除红闪灯
A. 1500mm
B. 1200mm
C. 1000mm
D. 800mm "
【单选题】
"因施工或调试作业需要,组织工程车/电客车在正线运行时,其运行前方必须保证至少( )空闲。
A. “两站两区间”
B. “一站一区间”
C. “一站两区间”
D. “两站一区间”"
【单选题】
"工程车在车站装卸物料时,物料必须整齐堆放稳固在距站台边缘 ( )米以外的地方,施工负责人应做好监控并查看物品是否侵限。
A. 0.5
B. 1
C. 2
D. 3"
【单选题】
A2 类施工作业由施工人员设置红闪灯,须在作业现场两端轨道中央(与轨道方向垂直)各设置一盏红闪灯,遇多个作业需要在同一地段设置红闪灯时,相邻两个红闪灯之间至少有( ) 米以上的距离
A. 0.5
B. 1
C. 2
D. 3
【单选题】
"以不属于施工负责人/联络人职责的是( )。
A. 批准请、销点手续;
B. 落实施工现场的组织指挥工作,按施工计划及相关方案组织施工;
C. 及时与有关人员联系作业事项,必要时联系 OCC;
D. 确认作业影响范围,落实作业安全防护措施;"
【单选题】
"以下不属于施工监管人职责的是( )。
A. 负责按规定协助外单位、委外单位办理施工请销点,检查其人员施工防护、劳动保护情况;
B. 负责清点进出作业区域的施工作业人员;
C. 负责监督外单位、委外单位的施工作业安全;
D. 直负责施工的请销点手续办理。"
【单选题】
"以下不属于施工负责人/联络人、施工监管人任职条件的是( )。
A. 经过培训并考核合格,且报施工管理工作小组审核、备案后,方可上岗;
B. 熟知《行车组织规则》、《车站票务管理规则》、《车站客运组织规则》、及其它相关规定等;
C. 熟知所负责施工作业的性质、内容、方法、步骤、要求等;
D. 具备所负责施工作业相关的安全知识和技能。"
【单选题】
"抢修令发布须经值班主任同意,由( )向相关部门(中心)发布,并按要求组织。
A. 设调
B. 行调
C. 值班主任助理
D. 场调 "
【单选题】
"运营期间发生以下哪种情况不需要发布抢修( )。
A. ISCS 系统、FAS 系统、PSCADA 系统等设备监控系统中央级全部故障,或系统大面积故障短时
B. 站台门系统故障造成单扇站台门无法联动的;
C. 信号系统故障影响全线或部分区域内列车正常运行的;
D. 通信系统故障且无其他备用方式进行通讯,影响调度、司机、车站等各岗位间通讯的;
【单选题】
"以下关于车站办理时作业组织程序描述正确的是( )。
A. 司机向车站值班员提出进路变更作业配合要求;
B. 行值负责根据施工负责人或其指定人员提出的配合要求,排列相关进路;
C. 行值完成进路排列后,告知施工负责人或其指定人员进路完成情况;
D. 施工负责人确认进路、道岔位置正确后指挥动车。"
【单选题】
工程车、救援列车进出封锁区间的组织程序中规定负责抢修的部门在接到通知后( )分钟内完成装载设备、物品等工作,并安排跟车人员上车,特殊情况下可适当延长时间。
A. 5
B. 10
C. 15
D. 20
【单选题】
"以下关于进入正线、辅助线影响列车运行的抢修(查看设备)组织程序描述错误的是( )。
A. 行调扣停列车后及时通知车站抢修(查看设备)作业内容,行调或车站通过信号系统设置防护后(无法通过信号系统防护时,行调通知车站设置红闪灯进行防护),立即通知值班主任助理和车站;
B. 得到行调准许后,值班主任助理负责通知抢修(查看设备)人员进入抢修区间,车站应监督抢修查看设备)人员进入正确的区域;
C. 作业期间严禁运行列车进入抢修的区间或站台区域;
D. 抢修(查看设备)人员作业结束、出清线路、恢复运营条件后,及时通知行调,行调通知车站作业结束,确认防护措施撤除后恢复运营。"
【单选题】
"以下关于有安全避让区域的轨行区的抢修(查看设备)组织程序描述错误的是( )。
A. 作业前,值班主任助理及行调应与现场负责人再次确认作业地点是否具有安全避让区域;
B. 作业前后,为确保列车运行安全而采取的临时应急安全措施(如钩锁或撤销故障道岔的钩锁)及
C. 作业过程中,涉及行车安全的进路准备及故障排查,行调应严格控制列车运行方式,进出作业区段的列车司机,应严格执行行调指令,限速 25km/h 运行,加强瞭望,注意鸣笛;
D. 故障恢复、作业结束、线路出清后,现场负责人及时通知行调,行调通知车站作业结束,恢复正常运营。"
【单选题】
申请取消施工指在作业开始前( )小时按规定流程申请取消的施工作业计划。
A. 一
B. 二
C. 三
D. 四
【单选题】
"电话闭塞法行车时,正线首次占用闭塞分区的列车限速 25km/h 运行,之后电话闭塞区段内列车限速( )运行
A. 35
B. 45
C. 60
D. 65"
【单选题】
"站后折返车站同意闭塞时,须确认本站站台、后方区间及折返线路的空闲情况,必须确保前列车出折返线运行至本站非接车侧站台,列车之间有( )的间隔
A. 一站一区间
B. 一站两区间
C. 两站两区间
D. 一站一区间+折返线"
【单选题】
"站前折返车站同意闭塞时,须确认本站站台及前、后方区间线路的空闲情况,必须确保前列车运行 至前方站站台,列车之间有( )的间隔
A. 一站一区间
B. 一站两区间
C. 两站两区间
D. 一站一区间+折返线"
【单选题】
"现场进路准备完成后,人员工器具出清至距邻近线路中心线( )米外的安全区域内即可视为线路 出清,车站需于现场标记安全区域具体位置
A. 2.1
B. 2.2
C. 2.3
D. 2.4"
【单选题】
"在办妥电话闭塞手续后,行调下令取消电话闭塞时,车站对已填好的路票应在路票正面对角线打 “×”,并在右上角注明( )字样
A. 注销
B. 取消
C. 作废
D. 废除"
【单选题】
"道岔不具备电操条件时,由车站人员下线路按( )的原则现场人工准备进路,采用手摇道岔至 正确位置并加钩锁器方式办理接发车、折返进路
A. 由远及近
B. 由上至下
C. 要道还道
D. 由近及远"
【单选题】
"电话闭塞法行车时,列车站后折返按( )办理
A. 由远及近
B. 由上至下
C. 要道还道
D. 由近及远"
【单选题】
在已办理列车闭塞后,因故不能接车或发车,由( )发出的电话记录号码作为取消闭塞的依据。
A. 接车站
B. 发车站
C. 提出车站
D. 接、发车站均可
【单选题】
"若列车停在道岔上,司机以不超过 ( )km/h 速度越过岔区停车待命。
A. 5
B. 10
C. 15
D. 25"
【单选题】
"联锁故障时组织车站将故障区域内中间站正线道岔人工钩锁至( )位置。
A. 行车所需
B. 定位
C. 反位
D. 左位"
【单选题】
"故障修复后根据行调命令安排人员下线路( ),并协同通号人员测试道岔功能。
A. 拆除道岔钩锁器
B. 确认道岔钩锁器
C. 拆除转辙机
D. 确认进路安全"
【单选题】
"因线路异常等特殊情况需变更折返方式时,行值汇报行调,由( )通知司机变更进路。
A. 站台岗
B. 值助
C. 行值
D. 行调"
【单选题】
"站务中心负责向行调汇报故障区域站台列车位置,与行调共同核对( )列车位置及数量。
A. 故障区域
B. 上行
C. 下行
D. 联锁区域"
【单选题】
"电话闭塞启用条件包括正线全线或局部信号联锁故障,且维修人员未给出具体恢复时间或设备重启( )分钟未成功。
A. 5
B. 10
C. 15
D. 20"
【单选题】
"发车站确认前方区间空闲,发车进路准备妥当,向接车站请求闭塞;后续列车,发车站根据接车站报列车( )后,向接车站请求闭塞。
A. 到点
B. 到达
C. 发点
D. 出发"
【单选题】
"接车站为站前折返车站,同意闭塞需确认本站站台及( )空闲。
A. 前方区间
B. 后方区间
C. 折返线路
D. 前、后方区间"
【单选题】
"接车站为中间车站,同意闭塞需确认本站站台及( )空闲。
A. 前方区间
B. 后方区间
C. 折返线路
D. 前、后方区间"
【单选题】
"接车站为站后折返车站,同意闭塞需确认本站站台及( )空闲。
A. 前方区间
B. 后方区间
C. 后方区间、折返线路空闲
D. 折返线路空闲"
【单选题】
"路票填写完毕后优先通过( )口头命令司机发车。
A. 无线固定台
B. 400M
C. 800M
D. 站间电话"
【单选题】
"路票填写有误时应在路票正面对角线划“×”,在打“×”的路票右边加盖( )章,并重新按规定填写。
A. 注销
B. 取消
C. 作废
D. 废除"
推荐试题
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento