【多选题】
地锚基坑前方地锚出线点(即钢丝绳穿过土层后露出地面处)前方坑深2.5倍范围及基坑两侧2m范围以内,不得有___。
A. 地沟
B. 电缆
C. 地下管道
D. 地下煤气管
E. 临时挖沟
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
ABCDE
解析
暂无解析
相关试题
【多选题】
脚手架所用钢管应采用Q23SA钢,此钢材的重要质量标准和性能是___。
A. 标准屈服强度不低于235N/mm2
B. 可焊性能好
C. 抗锈蚀性能好
D. 低温下抗冲击性好
E. 管壁厚度不均匀
【多选题】
脚手架所用钢管使用时,应注意:___。
A. φ48×3.5与φ51×3的钢管不得混用
B. φ48×3.5与φ51×3的钢管可以混用
C. φ51×3与φ32×2的钢管可以混用
D. 钢管上严禁打孔
E. 开孔不影响钢管的使用
【多选题】
设计承重脚手架时,应根据使用过程中可能出现的荷载取其最不利组合进行计算,因此___。
A. 对纵、横向水平杆的强度、变形计算应考虑:永久荷载+0.9(施工荷载+风荷载)的组合
B. 对纵、横向水平杆的强度、变形计算应考虑:永久荷载+施工荷载的组合
C. 对立杆稳定应考虑:永久荷载+施工荷载和永久荷载+0.9(施工荷载+风荷载)的两种组合
D. 对立杆稳定应考虑:永久荷载+施工荷载和永久荷载+施工荷载+风荷载的两种组合
E. 对立杆的稳定只考虑竖向荷载
【多选题】
计算脚手架立杆稳定时,应进行不同的荷载效应组合,它们是___。
A. 永久荷载+施工荷载
B. 永久荷载+0.9施工荷载
C. 永久荷载+施工荷载+风荷载
D. 永久荷载+0.9(施工荷载+风荷载)
E. 永久荷载
【多选题】
计算立杆稳定性时,应选取其危险部位(或称最不利部位),当脚手架以相同步距、纵距、横距和连墙件布置,且风荷载不大时,危险部位在___。
A. 脚手架顶层立杆段
B. 脚手架半高处立杆段
C. 脚手架底层立杆段
D. 双管立杆变截面处的单立杆段
E. 双管立杆的双管立杆段
【多选题】
脚手架连墙件的间距除应满足计算要求外,还应满足___。
A. 脚手架高度不大于50m时,竖向不大于3步距,横向不大于3跨距
B. 脚手架高度不大于50m时,竖向不大于4步距,横向不大于4跨距
C. 脚手架高度大于50m时,竖向不大于2步距,横向不大于3跨距
D. 脚手架高度大于50m时,竖向不大于2步距,横向不大于4跨距
E. 脚手架高度不大于50m时,竖向不大于5步距,横向大于5跨距
【多选题】
双排脚手架每—连墙件的覆盖面积应不大于___。
A. 架高不大于50m时,40m2
B. 架高不大于50m时,50m2
C. 架高大于50m时,30m2
D. 架高大于50m时,27m2
E. 架高大于50m时,60m2
【多选题】
一字形、开口形脚手架连墙件设置做了专门的规定,它们是___。
A. 在脚手架的两端必须设置连墙件
B. 在脚手架的两端宜设置连墙件
C. 端部连墙件竖向间距不应大于建筑物层高,并不应大于4m(两步)
D. 端部连墙件竖向间距不应大于建筑物层高,并不应大于6m(三步)
E. 连墙件的设置与封圈形脚手架相同
【多选题】
使用旧扣件时,应遵守下列有规定___。
A. 有裂缝、变形的严禁使用
B. 有裂缝、但不变形的可以使用
C. 有变形、但无裂缝的可以使用
D. 出现滑丝的必须更换
E. 螺栓锈蚀、变曲变形的可以使用
【多选题】
根据整架加荷试验得知,影响双排脚手架稳定承载能力的因素较多,其中主要的并反映在计算中的有___。
A. 立杆的步距、横距
B. 立杆的纵距
C. 脚手架的连墙件布置
D. 支撑设置
E. 走道板的设置
【多选题】
脚手架底部的构造要求是___。
A. 每根立杆底端应设底座或垫板,且应设纵向、横向扫地杆
B. 纵向扫地杆距底座上皮不大于200mm,并采用直角扣件与立杆固定
C. 纵向扫地杆距底座上皮不大于1000mm,并采用直角扣件与立杆固定
D. 横向扫地杆应采用直角扣件固定在紧靠纵向扫地杆下方的立杆上
E. 横向扫地杆设在距底面上0.8m处
【多选题】
连墙件设置要求有___。
A. 偏离主节点的距离不应大于300mm
B. 偏离主节点的距离不应大于600mm
C. 宜靠近主节点设置
D. 应从脚手架底层第一步纵向水平杆处开始设置
E. 应在脚手架底层第二步纵向水平杆处开始设置
【多选题】
纵向水平杆(大横杆)的接头可以搭接或对接。搭接时有以下具体要求___。
A. 搭接长度不应小于lm
B. 应等间距设置3个旋转扣件固定
C. 端部扣件盖板边缘至搭接杆端的距离不应小于500mm
D. 端部扣件盖板边缘至搭接杆端的距离不应小于100mm
E. 搭接长度应为0.5m
【多选题】
横向斜撑设置有如下规定___。
A. 一字形、开口形双排脚手架的两端必须设置横向斜撑
B. 高度24m以上的封圈形双排架除在拐角处设置外,中间应每隔6跨设置一道
C. 高度在24m以下的封圈形双排架可不设置
D. 高度在24m以下的封圈形双排架应在拐角处设置
E. 高度在24m以上的封圈形双排架仅需要在拐角处设置
【多选题】
连墙件的数量、间距设置应满足以下要求___。
A. 计算要求
B. 最大竖向、水平向间距要求
C. 每一连墙件覆盖的最小面积要求
D. 每一连墙件覆盖的最大面积要求
E. 没有覆盖面积的要求
【多选题】
纵向水平杆的对接接头应交错布置,具体要求是___。
A. 两个相邻接头不宜设在同步、同跨内
B. 各接头中心至最近主节点的距离不宜大于纵距的1/3
C. 各接头中心至最近主节点的距离不宜大于纵距的1/2
D. 不同步、不同跨的两相邻接头水平向错开距离不应小于500mm
E. 不同步、不同跨的两相邻接头水平向可在同一个平面上
【多选题】
脚手架作业层上的栏杆及挡脚板的设置要求为___。
A. 栏杆和挡脚板均应搭设在外立杆的内侧
B. 上栏杆上皮高度应为1.2m
C. 挡脚板高度不应小于120m
D. 挡脚板高度不应小于180m
E. 可以不设挡脚板
【多选题】
临边防护栏杆的上杆应符合下列哪些规定?___
A. 离地高度1.0~1.2m
B. 离地高度0.5~0.6m
C. 承受外力3000N
D. 承受外力2000N
E. 承受外力1000N
【多选题】
施工中对高处作业的安全技术设施发现有缺陷和隐患时,应当如何处置?___
A. 发出整改通知单
B. 必须及时解决
C. 悬挂安全警告标志
D. 危及人身安全时,必须停止作业
E. 追究原因
【多选题】
下列关于毛竹临边防护栏杆的规定,哪些是正确的?___
A. 毛竹横杆小头有效直径不应小于70mm
B. 栏杆柱小头直径不应小于60mm
C. 使用不小于16号的镀锌钢丝绑扎
D. 毛竹横杆小头有效直径不应小于80mm
E. 栏杆柱小头直径不应小于80mm
【多选题】
安全防护设施的验收,主要包括哪些内容?___
A. 所有临边、洞口等各类技术措施的设置状况
B. 技术措施所用的配件、材料和工具的规格和材质
C. 技术措施的节点构造及其与建筑物的固定情况
D. 扣件和连接件的紧固程度
E. 安全防护设施的用品及设备的性能与质量合格的验证
【多选题】
下列关于原木临边防护栏杆的规定,哪些是正确的?___
A. 原木横杆的上杆梢径不应小于65mm
B. 栏杆柱梢径不应小于75mm
C. 使用不小于12号的镀锌钢丝绑扎
D. 原木横杆的上杆梢径不应小于70mm
E. 栏杆柱梢径不应小于70mm
【多选题】
下列关于钢筋临边防护栏杆的规定,哪些是正确的?___
A. 钢筋横杆上杆的直径不应小于16mm
B. 下杆直径不应小于14mm
C. 栏杆柱直径不应小于18mm
D. 采用电焊或镀锌钢丝绑扎固定
E. 栏杆柱直径不应小于20mm
【多选题】
下列关于钢管临边防护栏杆的规定,哪些是正确的?___
A. 钢管横杆采用φ48×(2.75~3.5)mm的管材
B. 采用电焊固定
C. 栏杆柱采用φ48×(2.75~3.5)mm的管材
D. 采用镀锌钢丝绑扎固定
E. 采用扣件固定
【多选题】
下列关于临边防护栏杆的规定,哪些是正确的?___
A. 防护栏杆应由上、下两道横杆及栏杆柱组成
B. 上杆离地高度为1.5~1.8m
C. 下杆离地高度为0.5~0.6m
D. 上杆离地高度为1.0~1.2m
E. 下杆离地高度为0.6~0.8m
【多选题】
下列关于坡度大于1:2.2的屋面临边防护栏杆的设置,哪些是正确的?___
A. 自上而下使用密目式安全网封闭
B. 上杆离地高度为1.5m
C. 下杆离地高度为0.4~0.6m
D. 上杆离地高度为1.0~1.2m
E. 下杆离地高度为0.6~0.8m
推荐试题
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode