【单选题】
依据《中国南方电网有限责任公司电力事故事件调查规程》,事故事件发生后,事故事件现场有关运行值班、检修维护、施工作业、现场管理等在场人员,以及各级电力调度机构值班人员,在掌握事故事件基本情况并作出初步判定后,应在第一时间、用最快捷的方式向()以及上级调度机构报告___
A. 值班负责人
B. 技术负责人
C. 现场负责人
D. 工作许可人
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
C
解析
暂无解析
相关试题
【单选题】
依据《电业安全工作规程 第1部分:热力和机械》,门口、通道、楼梯和平台等处,不准放置杂物;电缆及管道( )敷设在经常有人通行的地板上;地板上临时放有容易使人绊跌的物件(如钢丝绳等)时,必须设置明显的警告标志。___
A. 只能
B. 不应
C. 视情况可以
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,测量杆塔、配电变压器和避雷器的接地电阻,可在线路和设备带电的情况下进行。解开或恢复配电变压器和避雷器接地引线时,应戴()。不应直接接触与地电位断开的接地引线。___
A. 线手套
B. 帆布手套
C. 劳保手套
D. 绝缘手套
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,SF6电气设备发生大量泄漏等紧急情况时,人员应(),开启所有排风机进行排风。未配戴隔离式防毒面具或正压式呼吸器人员禁止入内。___
A. 立即隔离设备
B. 立即组织抢修
C. 迅速撤出现场
【单选题】
依据《云南电网有限责任公司现场电气操作票业务指导书(变电部分)(2017)》,填写现场电气操作票时,类型、发令单位、发令人、受令人、受令时间、操作开始时间、操作结束时间、操作项完成时间、备注栏均应由( )填写。___
A. 值班负责人
B. 操作监护人
C. 操作人
D. 变电站站长
【单选题】
依据《云南电网有限责任公司现场电气操作票业务指导书(变电部分)(2017)》,( ):是指电气设备故障后未经处理即行送电。___
A. 试送
B. 强送
C. 恢复送电
D. 送电
【单选题】
依据《中华人民共和国安全生产法》,从业人员应当接受安全生产教育和培训,掌握本职工作所需的安全生产知识,提高安全生产技能,增强事故预防和( )处置能力。___
A. 应急
B. 事故
C. 操作
D. 综合
【单选题】
依据《云南电网有限责任公司现场电气操作票业务指导书(变电部分)(2017)》,故障录波、行波测距、保信系统、通信装置( ):指装置本身功能正常,但功能未发挥作用时的状态。___
A. 投入状态
B. 退出状态
C. 停用状态
D. 投信号状态
【单选题】
依据《云南电网有限责任公司现场电气操作票业务指导书(变电部分)(2017)》,各分、子公司生产设备管理部是本单位现场电气操作票的( ),其职责是:指导、督促、检查本单位现场电气操作票的执行和管理工作;定期对现场电气操作票执行情况进行统计分析;协助本单位现场电气操作票培训工作。___
A. 归口管理部门
B. 监督部门
C. 培训与资格考核的归口管理部门
D. 执行部门
【单选题】
依据《云南电网有限责任公司现场电气操作票业务指导书(变电部分)(2017)》,班组( )组织本班组操作人、监护人进行一次手工开票。___
A. 每年
B. 每季度
C. 每月
D. 每周
【单选题】
依据《中国南方电网有限责任公司电力事故事件调查规程》,人身重伤是指使人肢体残废、毁人容貌、丧失听觉、丧失视觉、丧失其他器官功能或者其他对于人身健康有重大伤害的损伤,通常指事故发生后人员受伤且损失工作日等于和超过()日的失能伤害,依照国家法规及县级以上医疗机构诊断确定。___
A. 7
B. 30
C. 100
D. 105
E. 365
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,在厂站内10kV工作地点与带电设备距离1米的场所中工作,此时应选用哪类工作票:___
A. 一种
B. 二种
C. 三种
D. 抢修工作票
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,一队人员参观220kV变电站,该站有三个电压等级分别是220kV、110kV、10kV。运行人员进行安全交底是与设备的安全距离分别是220kV()、110kV()、10kV()。___
A. 5、1.5、1
B. 3、1.5、1
C. 3、1.5、0.7
D. 3、1、0.7
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,检修工作,在10kV、35kV高压开关柜内工作,母线不停电,柜内需要加装隔离措施,此时,工作负责人交代的安全距离为:10kV()、35kV()___
A. 0.7、1
B. 0.7(0.35)、1(0.6)
C. 0.45、0.6
D. 0.7、1.5
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,凡装有攀登装置的杆塔、变压器、融冰装置等,攀登装置上应设置()标示牌。___
A. 禁止攀登,高压危险
B. 禁止合闸,有人工作
C. 止步,高压危险
D. 禁止合闸,线路有人工作
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,10kV户外电力装置的裸露部分在跨越人行过道或作业区时,若导电部分对地高度小于()时,该裸露部分两侧和底部应装设护网。___
A. 2.7m
B. 2.8m
C. 2.9m
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,()审查工作票或调度检修申请单无误后,正确完整地组织实施各项安全措施并做好安全注意事项的提醒。___
A. 值班负责人
B. 工作人员
C. 工作负责人
【单选题】
依据《云南电网有限责任公司现场电气操作票业务指导书(变电部分)(2017)》,线路转为检修状态后,厂站运行人员应在可能来电侧的隔离开关或断路器的操作把手上、电压互感器二次空气开关(熔断器)上应悬挂( )标示牌。___
A. “禁止合闸,有人工作!”
B. “禁止合闸,线路有人工作!”
C. “止步,高压危险!”
D. “禁止合闸!”
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,持已许可的线路工作票或分组工作派工单进入厂站工作,厂站值班人员应先得到()同意,并与工作负责人明确工作地点及相关安全注意事项,在备注栏填写调度许可人姓名后由厂站值班人员和工作负责人双方签名,方可进行工作。___
A. 调度许可人
B. 值班负责人
C. 工作负责人
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,填写工作票前,复勘时发现原定位置不能挂接地线,应该如何处理:___
A. 在勘查记录上直接涂改,继续办理工作票
B. 重新进行进行勘察,重新办理工作票
C. 办理停电申请,做好记录即可
【单选题】
依据《云南电网有限责任公司现场电气操作票业务指导书(变电部分)(2017)》,断路器分(合)闸操作时,若发生断路器非全相分(合)闸,应立即检查( )等相关保护动作情况并汇报值班调度员,由值班调度员依据断路器闭锁分闸故障处置原则指挥处理,尽快消除三相不平衡电流,并隔离故障断路器。___
A. 失灵
B. 线路
C. 母差
D. 三相不一致
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,进行电容器停电工作时,应先(),使用专用放电器将电容器充分放电,接地后方可进行工作。___
A. 充分放电
B. 短路接地
C. 断开电源
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,绝缘隔板和绝缘罩应存放在室内干燥、离地面()mm以上的架上或专用的柜内。___
A. 180
B. 190
C. 200
D. 210
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,若一张工作票设多个分组工作,分组工作负责人即为该分组的()。___
A. 监护人
B. 工作票签发人
C. 工作许可人
D. 班员
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,在测量高压电缆各相电流时,电缆头线间距离应在()mm以上,且绝缘良好、测量方便的,方可进行。当有一相接地时,不应测量。___
A. 100
B. 200
C. 300
D. 400
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,若需增加工作任务,无需变更安全措施的,应由工作负责人征得工作票签发人和工作许可人同意,在原工作票上增加工作项目,并签名确认;若需变更安全措施应()。___
A. 得到调度许可
B. 征得值班负责人同意
C. 重新办理工作票
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,个人保安线是用于保护工作人员防止()的接地线,横截面()平方毫米。___
A. 感应电伤害、16
B. 跨步电压、16
C. 感应电伤害、25
D. 直流电击、15
【单选题】
依据《云南电网有限责任公司现场电气操作票业务指导书(变电部分)(2017)》,主变压器停送电操作:停电操作,一般按照( )的顺序停电(升压变压器和并列运行的变压器停电时可根据实际情况调整顺序);操作过程中可以先将各侧断路器操作到断开位置,再逐一按照( )的顺序操作隔离开关到拉开位置(隔离开关的操作须按照先拉变压器侧隔离开关,再拉母线侧隔离开关的顺序进行);送电操作时顺序应相反。___
A. 低压侧、中压侧、高压侧,由低到高
B. 低压侧、中压侧、高压侧,由高到低
C. 高压侧、中压侧、低压侧,由低到高
D. 高压侧、中压侧、低压侧,由高到低
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,在工作期间,工作票应始终保留在工作负责人手中。一个工作负责人不得同时执行()及以上工作票。___
A. 一张
B. 两张
C. 一种
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,充氮变压器、电抗器未经充分排氮(其气体含氧密度未达到()及以上时),严禁施工作业人员入内。___
A. 15%
B. 16%
C. 17%
D. 18%
【单选题】
依据《云南电网有限责任公司厂站工作票业务指导书》规定,值班员根据调度员或值班负责人的命令,按照( )要求实施安全措施。根据工作票的要求投切相关直流(空气开关、熔断器、连接片)、低压及二次回路。___
A. 上级
B. 工作负责人
C. 工作时设备状态
D. 签发人
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,按新(改)建设备投产方案进行操作时,若操作中出现问题,应由()重新核准后,方可继续操作。___
A. 方案审批人
B. 值班负责人
C. 工作监护人
【单选题】
依据《中国南方电网有限责任公司电力安全工作规程》,从SF6气体钢瓶引出气体时,应使用()。当瓶内压力降至9.8×104Pa(1个大气压)时,即停止引出气体,并关紧气瓶阀门,戴上瓶帽,防止气体泄漏。___
A. 普通气阀减压
B. 减压阀降压
C. 增压阀增压
【单选题】
依据《电力设备典型消防规程》,志愿消防员应熟知相关的灭火和应急疏散( ),发生火灾时能熟练扑救初起火灾、组织引导人员安全疏散及进行应急救援。___
A. 方法
B. 措施
C. 预案
D. 演练
推荐试题
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive