【单选题】
___应始终认为线路带电。
A. 周期巡视
B. 夜间巡视
C. 事故巡线
D. 特殊巡视
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
在同杆塔架设的杆塔上施工时,___等牵引工具应接地
A. 滑车
B. 绞车
C. 金具
D. 瓷瓶
【单选题】
“___”安全标志牌应设置在线路下方及保护区内。
A. 禁止取土
B. 禁止在保护区内建房
C. 禁止攀登 高压危险
D. 由此上下
【单选题】
“___”安全标志牌应设置在经常有人放风筝的线路附近适宜位置。
A. 禁止在高压线附近放风筝
B. 禁止攀登 高压危险
C. 当心触电
D. 在此工作
【单选题】
登杆塔至横担处时,应再次核对停电线路的识别标记与___,确实无误后方可进入停电线路侧横担。
A. 杆号
B. 名称
C. 识别标记
D. 双重称号
【单选题】
在相互靠近的线路上工作,登杆塔时要核对停电检修线路的___无误,并设专人监护,以防误登有电线路杆塔。
A. 双重名称
B. 双重编号
C. 双重称呼
D. 双重标记
【单选题】
《电力安全事故应急处置和调查处理条例》(国务院599号令)要求,事故发生后,应当___向上一级电力调度机构、本企业负责人、事故发生地电力监管机构、安全生产监督管理部门、政府主管部门报告。
A. 立即
B. 1小时内
C. 2小时内
D. 24小时内
【单选题】
在山坡上立杆时应注意拉绳的___,以确保施工人员安全。
A. 长度
B. 强度
C. 直径
D. 角度
【单选题】
人工背立电杆只能用于___m以下的轻型拔梢电杆,其他电杆的起立不得使用此法
A. 12
B. 8
C. 15
D. 18
【单选题】
多人上下同一杆塔时应___进行。
A. 同时
B. 分批
C. 逐个
D. 一起
【单选题】
复合绝缘子相对易于破损,在施工中应避免损坏复合绝缘子的伞裙、护套及端部密封,___人员沿复合绝缘子上下导线。
A. 严禁
B. 允许
C. 应使
D. 不允许
【单选题】
夜间巡线应沿线路___进行;
A. 内侧
B. 左侧
C. 外侧
D. 右侧
【单选题】
___工作应由有电力线路工作经验的人员担任。
A. 巡线
B. 检修
C. 事故
D. 登高
【多选题】
停电检修的线路如与另一回带电线路相交叉或接近而不能满足安全距离要求时,则另一回线路也应___。
A. 停电
B. 不停电
C. 接地
D. 作业
E. 施工
【多选题】
在带电线路杆塔上工作如不能保持相应电压等级要求的距离时,应按照___作业工作进行。
A. 带电
B. 停电
C. 抢修
D. 施工
E. 改造
【多选题】
遇有___、台风、冰雪、洪水、泥石流、沙尘暴等灾害发生时,如需对线路进行巡视,应制订必要的安全措施,并得到设备运行管理单位分管领导批准。
A. 火灾
B. 地震
C. 干旱
D. 暴雨
E. 打雷
【多选题】
在带电线路杆塔上进行检修工作,作业人员活动范围及其所携带的___等,与带电导线最小距离不准小于相应电压等级安全距离的要求。
A. 工具
B. 材料
C. 电压表
D. 停电进行
E. 电流表
【多选题】
防误登杆措施之一:经核对停电检修线路的___工作负责人方可宣布开始工作
A. 双重名称无误
B. 验明线路确已停电
C. 挂好地线
D. 设好围栏
E. 个人保安线
【多选题】
停电检修的线路如在另一回线路的上面,而又必须在该线路不停电情况下进行___等工作时,应采取安全可靠的措施。
A. 放松导线
B. 放松地线
C. 架设导线
D. 架设地线
E. 更换瓷瓶
【多选题】
操作票票面应清楚整洁,不准任意涂改。操作票应填写设备双重名称,即___。
A. 设备名称
B. 编号
C. 设备序号
D. 设备称号
E. 设备型号
【多选题】
邻近10KV带电的电力线路进行工作时,应采取有效措施使___符合3.0米的安全距离规定。
A. 人体
B. 导线
C. 施工机具
D. 牵引绳
E. 拉绳
【多选题】
倒闸操作人员应该根据值班调度员(工区值班员)的操作指令___填写或打印倒闸操作票.
A. 口头
B. 电话
C. 传真
D. 电子邮件
E. 短信
【多选题】
为防止树木(树枝)倒落在导线上,应设法用绳索将其拉向与导线相反的方向。绳索应有___,以免拉绳的人员被倒落的树木砸伤。
A. 保护
B. 足够的长度
C. 足够的强度
D. 绝缘性能
E. 后备保护
【多选题】
安全距离的大小决定于___等因素。
A. 功率大小
B. 电压高低
C. 设备类型
D. 环境条件
E. 安装方式
【多选题】
待砍剪的树木下面和倒树范围内不得有人逗留,___应设置围栏,防止砸伤行人。
A. 野外工作
B. 城区
C. 人口密集区
D. 周围
E. 偏远山区
【多选题】
对于土壤电阻率较高地区如岩石、瓦砾、沙土等,应采取增加接地体___等措施改善接地电阻。
A. 管理
B. 根数
C. 长度
D. 截面积
E. 埋地深度
【多选题】
在相互靠近的线路上工作,登杆塔时要核对停电检修线路的___,以防误登有电线路杆塔。
A. 双重名称无误
B. 专人监护
C. 导线型号
D. 导线截面
E. 导线材料
【多选题】
工作班成员的安全责任是要熟悉___手续。
A. 工作内容
B. 工作流程
C. 掌握安全措施
D. 明确工作中的危险点
E. 并履行确认
【多选题】
我国的安全生产方针是___。
A. 科学发展
B. 安全发展
C. 安全第一
D. 预防为主
E. 综合治理
【多选题】
单人时,禁止攀登___。
A. 电杆
B. 房屋
C. 围墙
D. 铁塔
E. 梯子
【多选题】
在交叉档内松紧、降低或架设导、地线的工作,应采取防止导、地线产生___而与带电导线接近安全距离以内的措施。
A. 松弛
B. 跳动
C. 过牵引
D. 断股
E. 断线
【多选题】
单独巡线人员应考试合格并经___分管生产领导批准。
A. 公司
B. 所
C. 工区
D. 班组
E. 地区
【多选题】
对同杆塔架设的多回路线路进行验电时,应先验低压___ 。
A. 后验高压
B. 先验下层
C. 后验上层
D. 先验近侧
E. 后验远侧
【多选题】
在日常工作中要贯彻预防为主原则,通过实施安全风险管理体系,开展___,落实事故预防措施,使管理对象始终保持在安全状态,防止风险失控。
A. 风险预防
B. 风险辨识
C. 风险评估
D. 风险分析
E. 风险控制
【多选题】
生产班组负责生产作业风险控制的执行,做好___等风险管控。
A. 人员安排
B. 任务分配
C. 资源配置
D. 安全交底
E. 工作组织
【多选题】
现场标准化作业指导书由___作业程序和工艺标准、检修记录、指导书执行情况评估和附录九项内容组成。
A. 封面
B. 范围
C. 引用文件
D. 修前准备
E. 流程图
【多选题】
多个标志在一起设置时,应按照___类型的顺序,先左后右、先上后下地排列,且应避免出现相互矛盾、重复的现象。
A. 警告
B. 禁止
C. 提醒
D. 指令
E. 提示
【多选题】
安全标志分___四大基本类型和消防、道路安全标志等特定类型。
A. 禁止标志
B. 警告标志
C. 指令标志
D. 提示标志
E. 警示标志
【多选题】
安全标志分___四大基本类型。
A. 禁止标志、警告标志
B. 停止标志、警告标志
C. 停止标志、绿色标志
D. 禁止标志、绿色标志
E. 指令标志、提示标志
【多选题】
双回路杆号标志牌色标颜色按照红___排列使用。
A. 黄
B. 绿
C. 蓝
D. 白
E. 紫
【多选题】
对___的地段,宜缩短耐张段长度,同时杆塔设计应留有裕度。
A. 易覆冰
B. 同杆架设
C. 交叉跨越
D. 风口
E. 高差大
推荐试题
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.