【判断题】
剧毒的氯气可通过呼吸道、眼睛、皮肤等途径侵入人体,引起无有效防护人员严重中毒,造成伤亡
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
能溶于水的易燃液体的闪点随含水量的增加而升高
A. 对
B. 错
【判断题】
热传播是影响火灾发展的决定性因素
A. 对
B. 错
【判断题】
窒息灭火的常用方法有在火场上可用喷雾水流、水蒸气、惰性气体充入燃烧区域内,稀释氧气浓度
A. 对
B. 错
【判断题】
中队每天、大队每月、支队每季度应对所属部队至少进行一次战备检查,重要节日、重要活动或遇特殊情况时,必须进行检查。总队应适时组织抽查
A. 对
B. 错
【判断题】
在视线很差的情况下,消防人员在火场行进时可以用直流水枪射流冲击前行路线的地面,通过声音辨别路面情况
A. 对
B. 错
【判断题】
公安消防部队组织指挥通常分为消防局、总队、支队、大队、中队、班六个层次
A. 对
B. 错
【判断题】
高层民用建筑系指10层及10层以上的居住建筑或建筑高度超过24m的公共建筑;高层工业建筑是指2层及2层以上、建筑高度超过24米的厂房或库房
A. 对
B. 错
【判断题】
封堵是灭火战斗中对地下建筑实施封闭灭火的战法
A. 对
B. 错
【判断题】
火场温度达到200℃至300℃时,玻璃会破裂,烟气从门窗的缺口处向室外和走廊蔓延
A. 对
B. 错
【判断题】
在设有消防控制中心的建筑物发生火灾时,侦察人员应首先进入消防控制中心,可通过电视屏幕观察火势燃烧情况与各类消防设施的运行情况
A. 对
B. 错
【判断题】
扑救钢结构建筑火灾,要尽量增加登高和进入室内的灭火人员
A. 对
B. 错
【判断题】
公安消防部队灭火战斗中的作战原则是先控制、后消灭,集中兵力、救人第一、科学施救、固移结合
A. 对
B. 错
【判断题】
各级公安消防部队应当及时掌握本辖区消防水源设施情况,发现问题,及时督促市政府应急救援办公室进行处理
A. 对
B. 错
【判断题】
公安消防部队灭火战术方法有堵截、突破、夹攻、合击、分割、围歼、排烟、破拆、封堵、监护、撤离
A. 对
B. 错
【判断题】
可燃气体或蒸气只有达到一定浓度时,才会发生燃烧或爆炸
A. 对
B. 错
【判断题】
对于一般可燃固体,将其冷却到其燃点以下,燃烧反应就会中止
A. 对
B. 错
【判断题】
对于可燃液体,将其冷却到其燃点以下,燃烧反应就会中止
A. 对
B. 错
【判断题】
移动式供气源4个气瓶与同一个减压阀连接,允许每次换掉2个空瓶而不中断供气
A. 对
B. 错
【判断题】
消防安全绳按设计负载可分为轻型安全绳与通用型安全绳两类
A. 对
B. 错
【判断题】
云梯车在操作或作业中,若任一个支腿出现回缩(软腿)现象则报警,此时支腿灯闪烁且电喇叭鸣响
A. 对
B. 错
【判断题】
举高消防车不允许水平支腿在全缩和全伸两个极限位置之间使用
A. 对
B. 错
【判断题】
消火栓栓口的静水压力不应大于0.5Mpa
A. 对
B. 错
【判断题】
在辖区消防安全重点单位内部消防水源情况时,要掌握单位附近1500 米范围内可利用消防水源的种类、数量、距离、位置、容量、取水方法及好用情况
A. 对
B. 错
【判断题】
深入火场侦察时,可以由2名以上熟悉火场情况的人员作向导,带领侦察人员进入火场内部侦察
A. 对
B. 错
【判断题】
通过烟的气味、颜色、浓度、流动方向等特征,消防人员可以大致判断燃烧物质的种类、火灾阶段、火势蔓延方向等
A. 对
B. 错
【判断题】
判定伤员有无脉搏的最可靠、最简便的方法是试测颈动脉有无搏动
A. 对
B. 错
【判断题】
心肺复苏成功的关键是立即开放气道
A. 对
B. 错
【判断题】
头部损伤的伤员,应取斜坡卧位或侧卧位运送
A. 对
B. 错
【判断题】
如有伤口和出血者,应先止血,再包扎伤口,然后固定
A. 对
B. 错
【判断题】
消防无线通信网宜采用单频单工和异频单工(半双工)调度指挥网的模式组网
A. 对
B. 错
【判断题】
消防一级网主要用于保障灭火作战中火场各级指挥员手持电台之间的通信联络
A. 对
B. 错
【判断题】
消防二级网,适用于保障灭火救援作战现场范围内,各级消防指挥人员手持电台之间的通信联络
A. 对
B. 错
【判断题】
高层建筑火灾对密闭房间进行排烟时,应迅速开启排烟口,并用大量开花水枪掩护,防止发生轰燃
A. 对
B. 错
【判断题】
在进入室内等场所灭火进攻时,为防止门、窗开启瞬间发生轰燃、回燃、爆燃伤人,进攻人员应在门、窗一侧低姿快速开启门窗,也可边射水边开启门窗
A. 对
B. 错
【判断题】
因螺栓松动引起法兰泄漏时,可使用无火花工具,紧固螺栓,制止泄漏;若法兰垫圈老化导致带压泄漏,可利用专用法兰夹具夹卡法兰,并高压注射密封胶堵漏
A. 对
B. 错
【判断题】
建筑高度超过50m的高层民用建筑属于一类高层民用建筑
A. 对
B. 错
【判断题】
对于临时高压给水系统,触发启泵按钮,稳(增)压泵应停止运行
A. 对
B. 错
【判断题】
疏散用的应急照明,其地面最低照度应达到正常照明的照度
A. 对
B. 错
【判断题】
高层建筑疏散楼梯间、防烟楼梯间前室、消防电梯间及其前室、合用前室应设应急照明
A. 对
B. 错
【判断题】
一类高层民用建筑与耐火等级一、二级丙类厂(库)房的防火间距不应小于(25)米
A. 对
B. 错
推荐试题
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface