【多选题】
设备维修人员等岗位人员持续开展安全教育和技能培训,考核不合格的,应及时调整工作岗位。___
A. 列车驾驶员
B. 行车值班员
C. 调度员
D. 客运服务人员
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCD
解析
暂无解析
相关试题
【多选题】
抽查岗位人员安全教育和技能培训记录、签到表、考试试卷等,安全教育和技能培训 、 、 等要求应与运营单位的 培训计划和培训有关规定一致。___
A. 考试要求
B. 内容要求
C. 学时要求
D. 考核要求
【多选题】
列车停在区间需要区间乘客疏散时, 、 、 应处于开启状态,应通过广播告知车内、车站乘客,安抚乘客情绪。___
A. 列车车门
B. 站台门
C. 端门
D. 闸机扇门
【多选题】
针对车站、列车安全及服务标志标识错误、缺失、不规范等可能影响乘客应急疏散的风险,应在 、 、 等制度中规定有关标志标识使用、维护等要求。___
A. 车站巡视
B. 安全检查
C. 职责分工
D. 标志标识管理
【多选题】
车站、列车等设施设备或区域 、 、 、 等应完好清晰、醒目规范。___
A. 安全标识
B. 应急疏散标志
C. 安全使用须知
D. 应急操作指示
【多选题】
车辆维护人员应接受 、 、 、 等内容的培训。___
A. 车辆机械构造
B. 车辆电器设备
C. 专业工具操作使用
D. 车辆维修规程
【多选题】
运营单位应加强员工人文关怀、心理疏导,营造 良好的安全文化氛围,增强员工凝聚力和归属感。通过 , 等方式,抽查员工人文举措、安全文化建设、员工精神面貌。___
A. 员工问询
B. 问卷调查
C. 现场查勘车站、控制中心
D. 员工谈话
【多选题】
运营单位应按规定针对 、 、 开展应急演练,并参加相关部门和单位组织 的综合性应急演练,评估应急演练工作,总结经验教训。___
A. 应急演练计划
B. 综合应急预案
C. 专项应急预案
D. 现场处置方案
【多选题】
运营单位对本单位发生的运营险性事件按规定制作安全警示片等多种形式的安全警示材料,并开展警示教育活动。抽取运营险性事件案例,抽查相关岗位工作人员,询问、、等,相关人员应基本了解情况, 知晓警示目的。___
A. 运营险性事件概括
B. 事件原因
C. 经验教训
D. 处理措施
【多选题】
运营单位应根据岗位工作标准,对定岗人员进行专业技能培训,确保岗位工作人员熟悉有关 和 熟练掌握本岗位的安全操作技能,以及设备操作和维护技能。___
A. 安全规章制度
B. 安全类事故教训
C. 岗位职责
D. 安全操作规程
【多选题】
客流预警值设置应科学合理,并明确限流等大客流管控措施启动条件;预警值应符合 、 、 等。___
A. 站台设计容纳能力
B. 设施设备配置
C. 设备通行能力
D. 客流规律
【多选题】
核查信号系统故障记录,信号安全核心设备的可靠性和接口性能应达到技术规格书规定的指标要求,包括 、 、 等。___
A. 单通道可靠性与安全性指标
B. 单通道同步与无缝切换指标
C. 多通道同步与无缝切换指标
D. 系统输出和外部接口关系符合故障倒向安全原则
【多选题】
查阅设施设备运行维护管理制度和规程文件、维护技术档案等,有关 、 、 、 内容齐全,运行有效。___
A. 维护计划管理
B. 维护质量考核
C. 维护信息管理等制度
D. 维护规程
【多选题】
改变设施设备原设计结构、主要功能和架构、软件设计等应通过论证。新增的设施设备应通过 并按规定进行维护管理,投用前应完成相关岗位从业人员 和 。___
A. 核对
B. 验收
C. 安全生产知识
D. 操作技能培训
【多选题】
运营单位应按照维修管理制度、仓储管理制度进行维修备品备件管理工作,保证备品备件齐全有效;查阅维修备品备件的质量信息记录,有 、 和 。___
A. 分析
B. 纠正
C. 预防措施
D. 解决措施
【多选题】
针对桥梁疏散平台、声屏障、排水设施、护栏板、防撞与警示、防护网等附属设施失效导致的坠落、侵限、撞击、人员入侵等风险,应对桥梁附属设施进行 、 、 。___
A. 巡查
B. 养护
C. 维修
D. 清洁
【多选题】
轨道设施出现以下哪几种情况时应及时更换。___
A. 普通线路和无缝线路缓冲区的重伤和折断钢轨
B. 接头夹板出现折断、中央裂纹、 其他部位裂纹发展到螺栓孔等伤损
C. 扣件缺少
D. 护轮轨螺栓危及行车安全时
【多选题】
针对车辆运行过程中存在的安全功能失效可能导致行车事故或客伤的风险,应将制动失效或能力不足、超速运行及车辆运行过程中开门,以及电气设备 、 、 等功能的测试与试验、安全使用要求纳入相关岗位操作规程、维修规程。___
A. 过电压
B. 过电流
C. 过流保护
D. 过热保护
【多选题】
针对车辆运行过程中存在的乘客应急使用设备失效可能影响应急疏散的风险,应将 、 、 、 以及车门防夹装置等功能测试与试验、维护要求纳入车辆维修规程。___
A. 紧急报警装置
B. 车门紧急解锁装置
C. 紧急疏散门装置
D. 车门防夹装置
【多选题】
针对供电系统运行过程中存在的紧急情况下安全功能失效的风险,应将 、 、 等安全功能的测试 与试验纳入供电系统维修规程。___
A. 高压备自投
B. 越区供电
C. 低压备自投
D. 支援供电
【多选题】
供电系统设备相关安全工作规定应涵盖 、 、倒闸操作制度、 等。___
A. 人员安全等级制度
B. 工作票制度
C. 验电接地制度
D. 跳闸操作制度
【多选题】
自动售检票系统各种运行模式有效,抽查自动售检票系统 、 、 3种模式运行情况,抽查系统运行日志。___
A. 正常运行
B. 暂停运行
C. 降级运行
D. 紧急放行
【多选题】
抽查通信系统设备的操作规程、维修规程及工艺文件,应将 、通信光电缆、专用电话系统、 、视频监视系统、广播系统、 、 、时钟校准等子系统及部件的维护纳入维修规程。___
A. 传输系统运行
B. 无线通信系统
C. 通信告警系统
D. 电源及接地系统
【多选题】
与 。___
A. 分析
B. 整改
C. 查询
D. 修复
【多选题】
信号系统应保持超速防护、追踪防护、安全驾驶、进路防护、道岔防护和信号/表示器防护等安全功能的完整性和可靠性,并准确传递列车运行的 、 、 、 和报警等实时信息。___
A. 指挥
B. 控制
C. 调整
D. 现场表示
【多选题】
针对 调度命令等可能造成行车事故的风险,制定风险管控措施。___
A. 错发
B. 错传
C. 漏发
D. 漏传
【多选题】
发现有明显震感时,行车相关人员可视情况采取 等应急处置措施。___
A. 加强瞭望
B. 限速
C. 停运
D. 封站
【多选题】
运营单位应结合初期运营期间客流变化,优化调整列车运行计划,合理安排 ,尽量保证运力运量匹配。___
A. 运行交路
B. 运输能力
C. 运营服务时间
D. 行车间隔
【多选题】
书面命令要素应包含 。___
A. 发令日期、时间
B. 命令号码
C. 发令人
D. 命令内容、受令人
【多选题】
运营单位应根据施工作业特点、电客车和工程车类型及装载货物情况,落实 等具体要求,保证施工行车作业安全。___
A. 装卸标准
B. 防溜措施
C. 安全防护距离
【多选题】
针对车辆基地 等可能导致行车事故和人员伤亡的风险,在相关岗位操作规程、相关管理制度中制定风险管控措施。___
A. 接发列车;
B. 调车;
C. 停车;
D. 动车。
【多选题】
试车线限速标、停车标等标志标识应 。___
A. 醒目
B. 规范
C. 正确
D. 合理
【多选题】
运营单位应落实试车线 等安全规定,保证试车线作业安全。___
A. 限速
B. 安全防护
C. 停送电
D. 调试作业
【多选题】
人员非法进入轨行区时,列车驾驶员、行车值班员应及时报告,调度人员应视情况及时发布 等命令。___
A. 限速
B. 停车
C. 停电
D. 疏散
【多选题】
正式运营前安全评估开展前最后3个月全天运营时 间不应低于15小时,统计指标应符合以下规定 。___
A. 列车运行图兑现率不低于99.5%
B. 列车正点率不低于99%
C. 列车服务可靠度不低于20万列公里/次
D. 列车退出正线运行故障率不高于0.4次/万列公里
【多选题】
运营单位应编制完成初期运营报告,内容包括初期运营基本情况、 、应急管理等。___
A. 行车组织
B. 客运组织
C. 设施设备运行维护
D. 人员管理
【多选题】
运营单位的 、和安全经费投入应满足正式运营需要。___
A. 组织架构
B. 人员配置
C. 职责分工
D. 安全管理制度
【多选题】
抽取运营安全风险数据库中所列的风险点,可以通过 等方式。___
A. 现场查勘
B. 人员问询
C. 数据分析
D. 查阅资料
【多选题】
日常隐患排查每周不少于1次,并涵盖 、 保护区管理等各日常生产作业环节;___
A. 行车组织
B. 客运组织
C. 设施设备运行维护
D. 应急管理
【多选题】
隐患排查治理应实现 、等闭环管理,隐患治理各项措施运行有效。___
A. 排查发现
B. 整改落实
C. 效果验证
D. 数据分析
【多选题】
运营单位应结合初期运营期间系统运行情况,持续优化风险管控措施有效防控( )等问题。 ___
A. 设计缺陷
B. 设备可靠性差
C. 管理不协同
D. 专业间接口衔接不畅
推荐试题
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption