【简答题】
带电工作工具应定期进行电气试验及机械试验,其试验周期是多少?
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
(1)电气试验:预防性试验每年一次,检查性试验每年一次,两次试验间隔半年。 (2)机械试验:绝缘工具每年一次,金属工具两年一次。 (见《变电安规》 9.13.3.1)
解析
暂无解析
相关试题
【简答题】
在带电设备周围禁止使用哪些工具进行测量工作?
【简答题】
工作期间工作负责人若因故暂时离开、长时间离开工作现场时,有何规定?
【简答题】
进行线路停电作业前,应做好哪些安全措施?
【简答题】
试述哪些工作地点需悬挂标示牌和装设遮栏(围栏)?
【多选题】
预留银行印鉴卡应填写账号、( )、地址、( )、联系电话、( )、账户性质等,预留印鉴必须清晰、完整。___
A. 户名
B. 联系人
C. 启用日期
D. 法人代表
【多选题】
在下列( )情况中,存款人可以申请开立临时存款账户。___
A. 设立临时机构
B. 异地临时经营活动
C. 异地采购
D. 注册验资
【多选题】
存款人申请开立一般存款账户,应向银行出具( )。___
A. 存款人因向银行借款需要,应出具借款合同
B. 存款人因其他结算需要,应出具有关证明
C. 存款人因支现需要,应出具有关证明
D. 基本存款账户开户登记证
【多选题】
一般存款账户用于办理存款人( )资金收付。___
A. 借款转存
B. 借款归还
C. 其他结算
D. 现金业务
【多选题】
下列哪些资金账户可以支取现金,但在开户时应报中国人民银行当地分支行批准?___
A. 金融机构存放同业资金
B. 证券交易结算资金
C. 期货交易保证金
D. 更新改造资金
【多选题】
人民币银行结算账户管理办法所称存款人,是指在中国境内开立银行结算账户的( )等。___
A. 团体
B. 部队
C. 事业单位
D. 个体工商户
【多选题】
单位存款人申请更换预留公章及财务专用章,但无法提供原预留公章及财务专用章的,应出具( )___
A. 原印鉴卡片
B. 开户许可证
C. 营业执照正本
D. 司法部门证明
【多选题】
银行应对存款人的开户申请书填写的事项和证明文件的( )进行认真审查。___
A. 真实性
B. 完整性
C. 合规性
D. 及时性
【多选题】
下列( )专用存款账户不得支取现金。___
A. 财政预算外资金
B. 证券交易结算资金
C. 期货交易保证金
D. 信托基金专用存款账户
【多选题】
汇票专用章的使用范围( )。___
A. 签发全国银行汇票和省辖银行汇票时,在“出票人签章”处签章;
B. 申请人为银行的银行承兑汇票办理转贴现、再贴现时,在汇票背面“背书人签章”处签章;
C. 承兑银行承兑汇票时,在“承兑人签章”处签章;
D. 中国人民银行规定的其他使用范围。
【多选题】
结算专用章的使用范围( )。___
A. 发出委托收款和托收承付时,在托收凭证第三联“收款人开户银行签章”处签章;
B. 贴现、转贴现银行向承兑银行提示付款时,在汇票背面“背书人签章”处签章;
C. 跨行使用银行承兑汇票查询(复)书时,在查询(复)书“查询(复)行签章”处签章;
D. 在提交他行的跨行网上银行支付结算凭证上签章;
【多选题】
票据票面要素审核要求包括( )。___
A. 是否是统一印制的凭证,是否到期;
B. 票据要素是否齐全,记载事项是否完整、规范、合法;
C. 背书是否连续;
D. 粘单是否符合标准;
【多选题】
汇票(包括银行承兑汇票、商业承兑汇票和银行汇票)主要审核防伪点包括( )___
A. 纸张为满版梅花及“PJ”字母变形图案的黑白水印无荧光防涂改纸,纸张中含有无色荧光纤维,紫外光下显红蓝双色;纸张中采用全埋式安全线
B. 采用蓝绿双色底纹、彩虹印刷、微缩文字、变形曲线等防伪印刷设计
C. 大写金额栏采用水溶性红色荧光油墨印制,在紫外灯光下发出微弱的红色荧光,涂改后会发生变化
D. 号码采用棕黑色渗透性油墨印制,号码正面为棕黑色,背面有红色渗透效果。
【多选题】
票据交换业务处理范围主要包括( )___
A. 提出借贷方票据
B. 提入借贷方票据
C. 同城电子交换
D. 电子银行业务的数据交换
【多选题】
票据交换主要处理的票据与凭证包括( )___
A. 支票
B. 汇票
C. 本票
D. 汇兑凭证
【多选题】
提出借方票据主要包括( )环节。___
A. 票据受理
B. 票据审核
C. 账务处理
D. 票据处理
【多选题】
提出贷方票据主要包括( )环节。___
A. 票据受理
B. 票据审核
C. 账务处理
D. 票据处理
【多选题】
提出借方、贷方票据应遵循的原则是( )___
A. 他行票据,收妥进账,银行不垫款。
B. 谁的钱进谁的账,由谁支配。
C. 转账业务,先借后贷
D. 恪守信用,履约付款。
【多选题】
同城电子交换提出业务主要包括( )。___
A. 业务受理
B. 票据审核
C. 查找行号
D. 账务处理
【多选题】
电子验印系统具有( )等功能。___
A. 用户管理
B. 印鉴库管理
C. 验印操作
D. 日志管理
【多选题】
预留银行印鉴卡应填写( )等,预留印鉴必须清晰、完整。___
A. 账号
B. 户名
C. 地址
D. 联系人
【多选题】
票据活动应当遵守( ),不得损害社会公共利益。___
A. 中国人民银行制度规定
B. 中国农业银行制度规定
C. 法律
D. 行政法规
【多选题】
票据权利,是指持票人向票据债务人请求支付票据金额的权利,包括( )。___
A. 代理权
B. 付款请求权
C. 追索权
D. 赔偿权
【多选题】
票据上的签章,为( )。___
A. 指印
B. 签名
C. 盖章
D. 签名加盖章
【多选题】
票据( )不得更改,更改的票据无效。___
A. 金额
B. 日期
C. 付款人账号
D. 收款人名称
【多选题】
因( )可以依法无偿取得票据的,不受给付对价的限制。___
A. 税收
B. 转让
C. 继承
D. 赠与
【多选题】
持票人对票据债务人行使票据权利,应当在票据当事人的( )内进行。___
A. 银行机构
B. 营业场所
C. 营业时间
D. 住所
【多选题】
持票人因( )因而丧失票据权利的,仍享有民事权利。___
A. 超过票据权利时效
B. 变造票据
C. 变造签章
D. 票据记载事项欠缺
【多选题】
通过( )向付款人提示付款的,视同持票人提示付款。___
A. 委托收款银行
B. 票据交换系统
C. 电话提示
D. 短信提示
【多选题】
汇票的( )对持票人承担连带责任。___
A. 出票人
B. 背书人
C. 承兑人
D. 保证人
【多选题】
中国人民银行支付结算办法所称结算方式,包括( )。___
A. 汇兑
B. 承兑
C. 托收承付
D. 委托收款
【多选题】
( )是办理支付结算的工具。___
A. 印章
B. 票据
C. 支付密码
D. 结算凭证
【多选题】
支付结算实行( )和( )相结合的管理体制。___
A. 集中管理
B. 集中统一
C. 分级管理
D. 分级实施
【多选题】
单位在票据上的签章应为( )___
A. 该单位的财务专用章加其法定代表人的签名或者盖章
B. 该单位的公章加其法定代表人的签名或者盖章
C. 该单位的财务专用章加其法定代表人授权的代理人的签名或者盖章
D. 该单位的公章加其法定代表人授权的代理人的签名或者盖章
【多选题】
票据背书转让时,由背书人( )。___
A. 在票据背面签章
B. 记载收款人名称
C. 记载被背书人名称
D. 背书日期
【多选题】
背书连续,是指( )。___
A. 票据第一次背书转让的背书人是票据上记载的收款人
B. 前次背书转让的背书人是后一次背书转让的背书人
C. 前次背书转让的被背书人是后一次背书转让的被背书人
D. 最后一次背书转让的被背书人是票据的最后持票人
推荐试题
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config