【单选题】
库内作业时,在时间紧任务重的情况下,可以不设置防护信号。 ___
A. 正确
B. 错误
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
人员下道避车时应面向列车认真瞭望,防止列车上的抛落,坠落物或绳索伤人。 ___
A. 正确
B. 错误
【单选题】
人员下道避车的同时,必须将作业机具,材料移出线路,放置,堆码牢固,不得侵入限界,两线间不得停留人员和放置机具,材料。 ___
A. 正确
B. 错误
【单选题】
车站内如必须走道心时,应在其前后设置专人防护。 ___
A. 正确
B. 错误
【单选题】
在站场上作业和行走时,要随时注意两邻线来往的机车车辆,防止被车上坠落物品,篷布绳索等击伤。 ___
A. 正确
B. 错误
【单选题】
进路信号辨认不清时,应及时下道避车。 ___
A. 正确
B. 错误
【单选题】
不准不打好脚手架,放稳梯登就开始作业。 ___
A. 正确
B. 错误
【单选题】
登高作业在使用椅子,高脚凳,升降台之前,应检查确认其完整良好。 ___
A. 正确
B. 错误
【单选题】
登高作业时,要思想集中,不得用力过猛和探身过远或高空跨越。 ___
A. 正确
B. 错误
【单选题】
登高作业时,升降台在上下升降或左右移动时,必须了望确认安全后才能开动。 ___
A. 正确
B. 错误
【单选题】
高空作业时,应佩戴安全带或采取有效防护措施,安全带应定期检验。 ___
A. 正确
B. 错误
【单选题】
工作前,必须检查工具,测量仪表,防护用具是否完好。 ___
A. 正确
B. 错误
【单选题】
三层平台登顶作业门禁口,1张门禁卡可允许多人进出作业。 ___
A. 正确
B. 错误
【单选题】
库内动车组有电预检或者有电作业时,作业人员随时可以从作业车底通过。 ___
A. 正确
B. 错误
【单选题】
车顶作业时工具,备品材料规范摆放,不得抛接工具,备品材料,防止坠落。 ___
A. 正确
B. 错误
【单选题】
升弓送电前,必须车内广播通知作业人员,防止触电。 ___
A. 正确
B. 错误
【单选题】
动车组在进行调车作业(含解编,重联作业)或出,入库作业时,必须关闭动车组所有侧门,窗。 ___
A. 正确
B. 错误
【单选题】
释放压缩空气时不得将空气喷口朝向身体。 ___
A. 正确
B. 错误
【单选题】
在更换弹簧和其它压缩件时,应使用专用工具拆装弹簧,压缩件,或确保弹簧,压缩件的弹性能量受到控制。 ___
A. 正确
B. 错误
【单选题】
电机,齿轮箱,车轮,制动部件和冷却器在运行期间温度较高,在对上述部件检修作业时,须注意防止被灼伤,烫伤。 ___
A. 正确
B. 错误
【单选题】
设备,工具或物品尖锐锋利的角边可能造成绊倒,挤伤事故以及皮肤割伤,在上述条件周围作业时,作业人员应注意自我防护。 ___
A. 正确
B. 错误
【单选题】
有限空间作业必须保证人员到位,作业现场负责人可由当班干部或工长担任,须认真检查确认作业工具和设备,作业人员防护用品穿戴,身体状况是否满足作业要求。 ___
A. 正确
B. 错误
【单选题】
有限空间作业前,作业现场应保持有限空间出入口畅通,设置明显的安全警示标志,作业前清点人员和工具,监护人员,作业人员要规范佩戴和使用劳动保护用品。 ___
A. 正确
B. 错误
【单选题】
从停留车辆的端部搬运材料、工具横越时,留有的安全距离不少于( )米。 ___
A. 3
B. 4
C. 5
D. 6
【单选题】
氧气瓶与乙炔瓶距明火应在 ( )米以上。 ___
A. 3
B. 5
C. 7
D. 10
【单选题】
凡超过2米高的各种脚手架、走台、扶梯等,应设有牢固的防护栏杆,其高度不低于( ) 米。 ___
A. 0.5
B. 1
C. 1.2
D. 1.5
【单选题】
移动照明灯应装有防护罩,电压不得超过( )V。 ___
A. 24
B. 36
C. 50
D. 110
【单选题】
易燃、易爆的作业场所、危险品库等处的照明灯,需装( )装置。 ___
A. 防护罩
B. 保护接地
C. 防爆
D. 短路开关
【单选题】
速度过160km/h以上至200km/h列车通过站台时,站台安全线与站台连缘距离为( )米。 ___
A. 1
B. 2
C. 2.5
D. 3
【单选题】
一切电动机械、工具,其电压在( )伏以上的,都要采取保护性接地或接零措施。 ___
A. 36
B. 50
C. 110
D. 110
【单选题】
使用手提式风钻、电钻作业时,钻孔高度不得超过工作者( )。 ___
A. 头部
B. 肩部
C. 腹部
D. 臀部
【单选题】
检修车辆时,使用脱轨器,前后两端防护距离不得少于 ( )米。 ___
A. 5
B. 10
C. 15
D. 20
【单选题】
电气化区段携带的任何物件与接触网设备的带电部分应保持 ( )米以上。 ___
A. 0.5
B. 1
C. 1.5
D. 2
【单选题】
从停留车辆的端部横过线路时;徒手不少于3米,搬运材料、工具时不少于( )米。 ___
A. 3
B. 4
C. 5
D. 6
【单选题】
电气化铁路所使用的接触网额定工作电压为 ( )KV。 ___
A. 4
B. 6
C. 8
D. 10
【单选题】
严禁扒乘机车 ( ),以车代步。 ___
A. 汽车
B. 拖拉机
C. 摩托车
D. 车辆
【单选题】
铁路职工违反规章制度,致使发生铁路运营安全事故,造成严重后果的,处 ( )年以下有期徒刑或者拘役;造成特别严重后果的,处三年以上七年以下有期徒刑。 ___
A. 3
B. 4
C. 5
D. 6
【单选题】
接触网导线折断、下垂搭在车辆上或其他物品与接触网接触时,任何人员不得进行处理,应保持 ( )米以上距离。 ___
A. 4
B. 6
C. 8
D. 10
【单选题】
轨边作业时,工具、材料、配件的堆放,必须与电气化有关设备隔开 ( )米以上的距离。 ___
A. 0.5
B. 1
C. 1.5
D. 2
【单选题】
汽车通过铁路平交道时,其装载高度不得超过4.2米和触动道口限界门的活动横板或吊链。严禁在装载高度超过 ( ) 米以上的货物上坐人。 ___
A. 0.5
B. 1
C. 1.5
D. 2
【单选题】
三级(段、车间、班组)安全教育的时间合计不得少于 ( )课时。 ___
A. 20
B. 32
C. 40
D. 48
推荐试题
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.