更多“One of the following is not a integral part of ship security plan.______.A.Internal and external communicationB.Restricted areasC.Access to shipD.Non of the above”相关问题
  • 第1题:

    Pollution of the waterways may result from the discharge of ______.

    A.sewage

    B.the galley trash can

    C.an oily mixture of one part per million

    D.All of the above


    正确答案:D
    水道的污染可能是由于生活污水、厨房垃圾箱、含油百万分之一的混合物排放引起的。

  • 第2题:

    Who is responsible for the development of the ship security plan?________.

    A.The company security officer

    B.The classification society

    C.The port facility security officer

    D.The ship security officer


    正确答案:A
    谁负责开发船舶安全计划?公司安全检查人员。

  • 第3题:

    第三组:Following a security incident, in which the response measures outlined in the Ship Security Plan (SSP) have been activated, there will be a thorough review of their effectiveness and details will be made available, on request, to persons duly authorized by the Ship&39;s Flag State Administration. The Ship Security Plan is not subject to detailed inspection (other than confirming its existence on the ship) by duly authorized officials of a port State unless there are "clear grounds" to believe that the ship is not in compliance with the requirements of SOLAS or the ISPS Code, and the only means to verify or rectify the non-compliance is to review the relevant sections of the Plan. In such cases, access to the Restricted parts of the Plan relating to the non-compliance is exceptionally allowed, but only with the consent of the Flag State, or the master. If the master, in his professional judgment, believes that such "clear grounds" exist, and allowing access to relevant sections of the Restricted part of the Plan might resolve the situation, such access can be exceptionally granted. However, this should be immediately reported by the ship to the Company Security Officer (CSO). If access to the Restricted part of the Plan is denied by the master, this should be immediately reported by the ship to the Company Security Officer for guidance and reference to the Flag State.

    The Confidential part of a SSP cannot be subject to non-flag State inspection unless otherwise agreed by the contracting governments concerned. Any such request or demand by port state officials to view sections of the Confidential part of the Plan will be immediately reported by the ship to the Company Security Officer for guidance and reference to the flag State before any details are revealed to non-flag State officials. The Confidential provisions, which from an integral part of this Plan, are held by the Ship Security Officer (SSO)

    After a security incident, the revision of the SSP will made by____.

    A.the CSO

    B.the SSO

    C.persons duly authorized by the Ship&39;s Flag State Administration

    D.information not given


    正确答案:C

  • 第4题:

    材料:

    Ships entering piracy risk areas must be aware of the risk of attack and should take appropriate measures to increase the level of surveillance(监督)and security on board and devise means of responding to attacks.A clear and comprehensive Ship Security Plan and the training of crews in security measures and response techniques are essential.Without clearly defined and rigorously practiced procedures,the risk of an uncoordinated response during the inevitable confusion of an attack increases the danger faced by those on board the ship.While a Ship Security Plan and crew training may not prevent an attack they should help reduce the risks if an attack takes place.

    Attacks by pirates or armed robbers pose an immediate threat to the safety of a ship and individual crew members.When responding to attacks,masters and crews should seek to minimize the risk to those on board and maintain effective control over the safe navigation of the ship. Finally,it is important that all incidents of piracy and armed robbery,even minor incidents,are reported in detail to the appropriate authorities as soon as practicable.Accurate knowledge of the type and extent of piracy and armed robbery of ships is valuable for assessing the risk and formulating a comprehensive response.

    问题:

    The passage implies the following except ______.

    A.Safety of lives onboard and the control of the safe navigation of the ship are the priority considerations when making decisions in responding to attacks

    B.A clear and comprehensive Ship Security Plan can be developed by notifying the appropriate authorities of piracy-related information

    C.The risk of an uncoordinated response during the inevitable confusion of an attack could be decreased by clearly defined and well practiced procedures

    D.The communication of piracy-related information is a useful mechanism for anti-piracy Actions

    Without clearly defined and rigorously practiced procedures,the risk of an uncoordinated response during the inevitable confusion of an attack increases the danger faced by those on board the ship.A.frequently

    B.perioically

    C.occasionally

    D.strictly

    Which of the following is not mentioned as the measures taken for anti-piracy ___________.A.Risk assessment and Ship Security Plan

    B.security alarming system onboard

    C.Practices of procedures

    D.communication of piracy- or security- related information

    Which of the following is correct according to the passage ___________.A.A Ship Security Plan can always define clear and comprehensive procedures

    B.Rigorously practiced procedure can always prevent a piracy attack

    C.A well-designed Ship Security Plan and the training of crews are significant for anti-piracy

    D.A well-designed Ship Security Plan and the training of crews can always prevent the ship from being attacked

    请帮忙给出每个问题的正确答案和分析,谢谢!


    问题 1 答案解析:B


    问题 2 答案解析:D


    问题 3 答案解析:B


    问题 4 答案解析:C

  • 第5题:

    Which one of the following commands would you enter to terminate a VTY line session?()

    • A、close
    • B、disable
    • C、disconnect
    • D、suspend
    • E、exit
    • F、None of the above

    正确答案:E

  • 第6题:

    which one of the following best where layer can be used?()

    • A、form 
    • B、page 
    • C、subform 
    • D、all of the above

    正确答案:B

  • 第7题:

    For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()

    • A、Strategic security planning
    • B、Disaster recovery
    • C、Implementation security
    • D、Operations security

    正确答案:D

  • 第8题:

    单选题
    () means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    In the () refrigeration compressor one end of the crank shaft extends through the crankcase house for connection, via a coupling or pulley, to an external drive motor.
    A

    open-type

    B

    hermetic

    C

    semi-hermetic

    D

    all the above


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    The ship security assessment is an essential and integral part of the process of developing and updating()
    A

    the ship security plan

    B

    the company security plan

    C

    the port security plan

    D

    the national security plan


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which one of the following is the most commonly used layer 2 network device?()
    A

    Hub

    B

    Bridge

    C

    Switch

    D

    Router

    E

    Repeaters

    F

    None of the above


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    ()means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ship’s stores or the ship from the risks of a security incident.
    A

    Ship security plan

    B

    Company security plan

    C

    Port facility security plan

    D

    National security plan


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Ship security officer is __________.

    A.the guard posted on the vessel

    B.a person responsible for implementation of international ship and port security code on board ship

    C.the master of the vessel

    D.All the above


    正确答案:B
    船舶保安员是一个人在船上负责执行国际船舶和港口保安规则的人。

  • 第14题:

    The ship security officer shall have knowledge and have received training, taking into account the guidance given in Part B of ____ .

    A.the ISM Code

    B.the ISPS Code

    C.the IBC Code

    D.the IGC Code


    正确答案:B

  • 第15题:

    Oil Record Book Part I shall be provided to every oil tanker of 150 tons gross tonnage and above and every ship of 400 tons gross tonnage and above, ______oil tankers, to record relevant machinery space operations.

    A.as well as

    B.as long as

    C.rather than

    D.other than


    正确答案:D

  • 第16题:

    Which of the following is true about Outbound Malware Scanning?() 

    • A、 It has its own policy table.
    • B、 It is configured as part of Access Policies.
    • C、 It is configured as part ofIronPort data Security.
    • D、 It only has global configuration.

    正确答案:B

  • 第17题:

    Which one is the most important based on the following common elements of a network design?()

    • A、Business needs
    • B、Risk analysis
    • C、Security policy
    • D、Best practices

    正确答案:A

  • 第18题:

    Which one of the following is the most commonly used layer 2 network device?()

    • A、Hub
    • B、Bridge
    • C、Switch
    • D、Router
    • E、Repeaters
    • F、None of the above

    正确答案:C

  • 第19题:

    You have an Exchange Server 2010 organization for a company named Contoso, Ltd. Contoso has the following security policy:  .Messages that contain the word budget cannot be sent to external recipients .Messages that contain the name Northwind Traders must be sent to the legal department automaticallyYou need to recommend a solution to meet the security policy.  What should you recommend?()

    • A、Create two transport rules.
    • B、Create two message classifications.
    • C、Create one transport rule and configure a legal hold.
    • D、Create one message classification and configure a legal hold.

    正确答案:A

  • 第20题:

    单选题
    ()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    When the ship security alert system is activated, it shall not()
    A

    initiate a ship-to-shore security alert

    B

    transmit a ship-to-shore security alert

    C

    initiate an alert identifying the ship, its location

    D

    raise a security alarm on-board the ship indicating that the ship is under threat


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    According to the ISPS Code, for a sailing ship, the following except()should be onboard.
    A

    a ship security plan

    B

    a ship security officer

    C

    a company security officer

    D

    certain onboard equipments


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Cylinder linings constructed as an integral part of the block, are characterized by which of the following disadvantages?()
    A

    They conduct heat poorly

    B

    They are expensive

    C

    They cannot be replaced

    D

    They require special tools for removal


    正确答案: A
    解析: 暂无解析