【多选题】
下列属于矿井“五灾”的是___。
A. 水#
B. 火#
C. 瓦斯#
D. 顶板
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCD
解析
暂无解析
相关试题
【多选题】
个体防护的用具主要有___。
A. 防尘口罩#
B. 防尘风罩#
C. 风尘帽#
D. 防尘呼吸器
【多选题】
井工煤矿必须制定停工停产期间的安全技术措施,保证矿井___系统正常运行。
A. 供电#
B. 通风#
C. 排水#
D. 安全监控
【多选题】
井工煤矿必须按规定填绘___。
A. 巷道布置图#
B. 井上、下对照图#
C. 采掘工程平面图#
D. 通风系统图
【多选题】
井工煤矿应当向矿山救护队提供采掘工程平面图、___、( )、( )、灾害预防和处理计划,以及应急救援预案。
A. A、矿井通风系统图#
B. #C、#D、#B、井上下对照图#
C. 井下避灾路线图#
D. 辅助运输线路图
【多选题】
井工煤矿应向矿山救护队提供___灾害预防和处理计划,以及应急预案 。
A. 采掘工程平面图#
B. 矿井通风系统图#
C. 井上下对照图#
D. 井下避灾路线图
【多选题】
井工煤矿炮采工作面应采用湿式钻眼、___等综合防尘措施。
A. 冲洗煤壁#
B. 水炮泥#
C. 黄泥#
D. 出煤洒水
【多选题】
井工煤矿掘进机作业时,应采用___及通风除尘等综合措施。掘进机无水或喷雾装置不能正常使用时,必须停机。
A. 内喷雾#
B. 外喷雾#
C. 洒水灭尘#
D. 净化风流
【多选题】
井下___的支护和风门、风窗必须采用不燃性材料。
A. 爆炸物品库#
B. 机电设备硐室#
C. 检修硐室#
D. 材料库
【多选题】
井下一氧化碳的来源是___。
A. 井下火灾与瓦斯、煤尘爆炸#
B. 井下爆破#
C. 矿井内的风流#
D. 人的呼出
【多选题】
井下二氧化碳的主要来源是___。
A. 煤炭和坑木物质的氧化#
B. 碳酸性岩石与酸性水的分解作用#
C. 从煤层或围岩渗出,井下水灾或火区#
D. 瓦斯煤尘爆炸
【多选题】
井下下列___设备必须设置甲烷断电仪或者便携式甲烷检测报警仪。
A. 采煤机、掘进机、掘锚一体机、连续采煤机#
B. 梭车、锚杆钻车#
C. 采用防爆蓄电池或者防爆柴油机为动力装置的运输设备#
D. 其他需要安装的移动设备
【多选题】
井下不得带电检修电器设备。严禁带电搬迁非本安型___,采用电缆供电的固定式用电设备不受此限。
A. 电气设备#
B. 电缆#
C. 开关#
D. 移动
【多选题】
井下风门根据用途不同可分为___。
A. 普通风门#
B. 调节风门#
C. 自动风门#
D. 反向风门
【多选题】
井下火灾灭火的方法有___三类。
A. 直接灭火#
B. 隔绝灭火#
C. 联合灭火#
D. 间接灭火
【多选题】
井下引爆煤尘的高温火源有___。
A. 爆破火焰#
B. 电火花#
C. 井下火灾#
D. 明火
【多选题】
井下以下___地点必须设置甲烷传感器。
A. 采煤工作面及其回风巷和回风隅角,高瓦斯矿井采煤工作面回风巷长度小于1000m时回风巷中部#
B. 煤巷、半煤岩巷和有瓦斯涌出的岩巷掘进工作面及其回风流中,高瓦斯和突出矿井的掘进巷道长度大于1000m时掘进巷道中部#
C. 突出矿井采煤工作面进风巷#
D. 采用串联通风时,被串采煤工作面的进风巷;被串掘进工作面的局部通风机前
【多选题】
井下以下___地点必须设置甲烷传感器。
A. 采区回风巷#
B. 一翼回风巷#
C. 总回风巷#
D. 进风巷
【多选题】
井下用电池(包括原电池和蓄电池)串联和并联的电池组应保持___一致性。
A. 厂家
B. 型号#
C. 规格#
D. 数量
【多选题】
井下机电设备硐室必须设在进风风流中,该硐室采用扩散通风的,其___,并且无瓦斯涌出。
A. 深度不得超过6m#
B. 深度不得超过8m#
C. 入口宽度不得小于1.5m#
D. 入口宽度不得小于1.0m
【多选题】
井下各级配电电压和各种电气设备的额定电压等级,应当符合下列___要求。
A. 高压,不超过10000V#
B. 低压,不超过1140V#
C. 架线电机车直流电压,不超过380V#
D. 照明和手持式电气设备的供电额定电压,不超过36V
【多选题】
井下防止静电的主要措施有___。
A. 禁止使用高绝缘材料#
B. 将有可能产生静电的设备器材进行接地#
C. 工作人员禁止穿高绝缘的工作服化纤工作服等#
D. 加强洒水防尘,增加空气湿度
【多选题】
井下防爆电气设备的___,必须符合防爆性能的各项技术要求。
A. 运行#
B. 维护#
C. 修理#
D. 检查
【多选题】
井下作业人员必须熟练掌握___的使用方法。
A. 自救器#
B. 矿灯#
C. 瓦斯检定器#
D. 紧急避险设施
【多选题】
井下供电“三无”指___。
A. 无合格证#
B. 无“鸡爪子”#
C. 无“羊尾巴”#
D. 无明接头
【多选题】
井下供电“三无”指的是无___。
A. 鸡爪子#
B. 羊尾巴#
C. 明接头#
D. 老鼠洞
【多选题】
井下所有___都应保持一定的存煤,不得放空。
A. 储煤库#
B. 煤仓#
C. 装煤眼#
D. 溜煤眼
【多选题】
井下空气成分中,有害气体一氧化碳CO、硫化氢H2S最高允许浓度(按体积的百分比计算)分别为___%。
A. 0.00025#
B. 0.0024#
C. 0.00066#
D. 0.0005
【多选题】
井下巷道内的电缆,沿线每隔一定距离、拐弯或者分支点以及连接不同直径电缆的接线盒两端、穿墙电缆的墙的两边都应当设置注有___的标志牌。
A. 编号#
B. 用途#
C. 电压#
D. 截面
【多选题】
井下临时抽采瓦斯泵站抽出的瓦斯可引排到___,但必须保证稀释后风流中的瓦斯浓度不超限。
A. 地面#
B. 总回风巷#
C. 一翼回风巷#
D. 分区回风巷
【多选题】
井下配电系统同时存在___电压时,配电设备上应明显的标出其电压额定值。
A. 存有#
B. 2种#
C. 2种以上#
D. 写出
【多选题】
井下高瓦斯区每班检查时间为___。
A. 接班后#
B. 班中#
C. 交班前#
D. 下班后
【多选题】
井下高压电动机、动力变压器的高压控制设备,应当具有___保护。
A. 短路#
B. 过负荷#
C. 接地#
D. 欠压释放
【多选题】
井下高压电动机、动力变压器的高压控制设备,应具有___释放保护。
A. 短路#
B. 过负荷#
C. 接地#
D. 欠电压
【多选题】
井下密闭前应设置___。
A. 棚栏#
B. 警标#
C. 说明牌#
D. 检查记录牌
【多选题】
井下照明和信号的配电装置,应具有___的照明信号综合保护功能。
A. 短路#
B. 过负荷#
C. 断相#
D. 漏电保护
【多选题】
井下煤矿的特点是:作业地点___,地下开采技术复杂,生产环节多,工作面不断移动,地质条件常有变化,不安全因素很多。
A. 空间狭窄#
B. 阴暗潮湿#
C. 高温干燥#
D. 环境条件恶劣
【多选题】
井下爆炸物品库必须有独立的通风系统,回风风流必须直接引入矿井的___中。
A. 入风井筒#
B. 总回风巷#
C. 主要回风巷#
D. 回风绕道
【多选题】
井上、下配电系统图应注明设备的___、电流等主要技术参数及其他技术性能指标。
A. 规格#
B. 型号#
C. 容量#
D. 电压
【多选题】
井口房和通风机房附近20m内,不得有___取暖。
A. 烟火#
B. 火炉#
C. 电暖气#
D. 井口房
【多选题】
井巷中,用人车运送人员时,乘车人员必须遵守的规定有___。
A. 听从指挥#
B. 严禁超员乘坐#
C. 严禁扒车、跳车#
D. 人体及所携带的工具严禁露出车外
推荐试题
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality