【多选题】
建筑倒塌事故处置程序与措施主要包括___。
A. 侦察检测
B. 进行人员和任务分工,快速展开救援行动
C. 救生排险
D. 做好保障
E. 现场急救
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
ACE
解析
暂无解析
相关试题
【多选题】
建筑物倒塌事故处置中,救生排险的主要措施有___。
A. 迅速清除现场障碍,确保现场拥有一个急救平台和供救援车辆出入的通道
B. 立即疏散建筑结构受到影响,有可能倒塌的建筑物内人员
C. 协助供水、供电、供气部门切断倒塌建筑的水、电、气供应
D. 对现场有可能再次发生倒塌的建筑物要采取加固或事先拆除等措施
E. 使用开花或喷雾水枪扑灭事故次生火灾
【多选题】
建筑倒塌事故处置的行动要求为___。
A. 消防部队应加强同公安、医疗救护、水、电、燃气、交通、民政等部门合作,共同实施救援行动。
B. 救援人员要加强行动安全,不应进入建筑结构已经明显松动的建筑物内部;不得登上已受力不均衡的阳台、楼板、屋顶等部位;不准冒险进入非稳固支撑的建筑废墟下面。
C. 加强现场监护工作,严防倒塌事故再次发生。
D. 严禁站在建筑废墟上从上至下进行施救,防止被埋压人员受到二次挤压伤害。
E. 为了尽可能的挽救遇险人员的生命,救援初期,不得直接使用大型铲车、吊车、推土机等施工机械。
【多选题】
扑救该起高层建筑火灾可采取的供水方法有___。
A. 沿楼梯蜿蜒铺设水带供水
B. 利用建筑内部消防水泵向消防竖管供水
C. 利用水泵接合器向室内管网补充供水
D. 沿外墙垂直铺设水带供水
【多选题】
公安消防部队的性质、职业活动的特点和主要职责,决定了消防职业道德具有丰富的内容。其中最主要的内容是:___。
A. 政治民主,服务群众,热爱岗位,英勇善战
B. 公正执法,清正廉洁,爱兵如子,文明守纪
C. 政治坚定,服务人民,爱岗敬业,英勇顽强
D. 秉公执法,清正廉洁,尊干爱兵,文明守纪
【多选题】
消防员的职业守则内容为:“___”。
A. 热爱敬业、忠于祖国、关爱生命,救人第一、科学救人
B. 爱岗敬业、忠于职守、关爱生命,救人第一、科学施救、
C. 安全环保、听从指挥,团结协作、英勇顽强,竭诚奉献
D. 安全第一、听从指挥,团结协作、英勇顽强,竭诚奉献
【多选题】
《中华人民共和国消防法》规定,任何单位、个人不得___。
A. 损坏、挪用或者擅自拆除、停用消防设施、器材
B. 埋压、圈占、遮挡消火栓或者占用防火间距
C. 占用、堵塞、封闭疏散通道、安全出口、消防车通道
D. 在任何场所设置影响逃生和灭火救援的障碍物
E. 阻拦报警
【多选题】
机关、团体、企业、事业单位应当依法履行下列___消防安全职责。
A. 制定消防安全制度
B. 组织防火检查
C. 落实消防安全责任制
D. 建立消防档案
E. 组织进行有针对性的消防演练
【多选题】
发生危险化学品事故,有关地方人民政府应当立即组织___等有关部门,按照本地区危险化学品事故应急预案组织实施救援,不得拖延、推诿。
A. 安全生产监督管理
B. 环境保护
C. 公安
D. 卫生
E. 交通运输
【多选题】
自然灾害、事故灾难或者公共卫生事件发生后,履行统一领导职责的人民政府可以采取下列一项或者多项应急处置措施:___
A. 组织营救和救治受害人员
B. 封锁危险场所,划定警戒区
C. 禁止或者限制使用有关设备、设施
D. 保障食品、饮用水、燃料等基本生活必需品的供应
E. 采取防止发生次生、衍生事件的必要措施
【多选题】
危险化学品是指___感染、放射性等危险性质,在运输、储存、生产、经营、使用和处置中,容易造成人身伤亡、财产损毁或环境污染而需要特别防护的物品。
A. 有爆炸
B. 易燃
C. 毒害
D. 腐蚀
【多选题】
化学品安全技术说明书中的“消防措施”主要表示___。
A. 化学品的物理和化学特殊危险性
B. 适合的灭火介质、不适合的灭火介质
C. 消防人员个体防护
D. 包括危险特性、灭火介质和方法、灭火注意事项
【多选题】
消防车登高操作场地与厂房、仓库、民用建筑之间不应设置___等障碍物和车库出入口。
A. 妨碍消防车操作的树木
B. 架空管线
C. 场地坡度不宜大于3%
D. 直通室外的楼梯
【多选题】
火灾自动报警系统的作用___
A. 是人们为了早期发现和通报火灾,并及时联动各种消防设施
B. 及时引导人员疏散
C. 接收设备的反馈信号而设置在建(构)筑物中或其他场所的一种自动消防设施
D. 是建筑消防安全系统的核心组成部分
推荐试题
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode