相关试题
【单选题】
氧气压力调整器针形阀泄漏时,氢气压力调整器水位就___。
A. 升高;
B. 降低;
C. 两侧基本持平;
D. 两侧完全持平。
【单选题】
电解槽的电源采用___。
A. 直流电;
B. 交流电;
C. 交、直流两用;
D. 交、直流切换。
【单选题】
吸附式氢气干燥装置的工作原理是___。
A. 变温吸附;
B. 低温吸附;
C. 常温吸附;
D. 高温吸附。
【单选题】
吸附式氢气干燥装置的干燥器内装有___。
A. 硅胶;
B. 铝胶;
C. 分子筛;
D. 无水氯化钙。
【单选题】
吸附式氢气干燥装置正常工作时,两台吸附干燥器应___。
A. 一起运行;
B. 一起再生;
C. 一台运行,一台再生;
D. 一台加热,一台吹冷。
【单选题】
在直流电路中,我们把电流流出电源的一端叫电源的___。
A. 正极;
B. 负极;
C. 端电压;
D. 端电流。
【单选题】
整流柜的作用是为电解制氢装置提供___。
A. 控制信号;
B. 交流电源;
C. 直流电源;
D. 恒流电源。
【单选题】
禁止用两只手分别接触电解槽的___。
A. 两个不同电极;
B. 同一电极;
C. 中心点;
D. 端部。
【单选题】
制氢系统补入的水是___。
A. 生水;
B. 软化水;
C. 净水;
D. 除盐水。
【单选题】
氢气的排出管必须伸出厂房外___ ,而且应设防雨罩,以防雨水进入管内,形成水封,妨碍排氢。
A. 离地2m 以上;
B. 离地3m 以上;
C. 离地5m 以上;
D. 离地10m以上。
【单选题】
水电解制氢过程中“氢中氧”表计指示应小___才合格。
A. 0.2%;
B. 0.3%;
C. 0.4%;
D. 0.5%。
【单选题】
水电解制氢过程中“氧中氢”表计指示应小___才合格。
A. 0.8%;
B. 0.7%;
C. 0.6%;
D. 0.5%。
【单选题】
经氢气干燥装置后,氢气露点温度小于___ 才为合格。
A. -20℃;
B. -30℃;
C. -40℃;
D. -50℃。
【单选题】
水电解制氢装置的槽温、槽压、差压调节是通过___来进行的。
A. 压力信号;
B. 电流信号;
C. 气动信号;
D. 电压信号。
【单选题】
氢冷发电机检修前,必须进行冷却介质___。
A. 冲洗;
B. 排放;
C. 回收;
D. 置换。
【单选题】
电解室要保持良好的通风以防止氢气___。
A. 着火;
B. 燃烧;
C. 聚集;
D. 爆炸。
【单选题】
氢洗涤器的主要作用是___。
A. 氢气冲出碱液;
B. 淋洗;
C. 浴洗;
D. 冲洗。
【单选题】
电解液过滤器内的套筒上开有若干小孔,外包双层___滤网。
A. 铜丝;
B. 铁丝
C. 镍丝;
D. 不锈钢丝
【单选题】
.制氢站补水泵的启动与停止是由___ 决定的。
A. 氢综合塔液位;
B. 氧综合塔液位;
C. 补水箱液位;
D. 碱液箱液位
【单选题】
使空气中水蒸汽刚好饱和时的温度称为___。
A. 湿度;
B. 相对湿度;
C. 绝对湿度;
D. 露点。
【单选题】
分子筛的再生温度比硅胶高,一般可达到___℃。
A. 100;
B. 200;
C. 300;
D. 400。
【单选题】
氢气干燥器内吸附剂的再生实际上是___。
A. 恒温干燥;
B. 减温干燥;
C. 变温干燥;
D. 加热干燥。
【单选题】
二氧化碳置换排氢是从发电机的___。
A. 顶部进入;
B. 上部进入;
C. 中部进入;
D. 下部进入。
【单选题】
在制氢设备运行过程中,槽温过高的主要原因是___。
A. 补水量不足;
B. 冷却水量不足;
C. 电解液浓度低;
D. 整流柜输出电流大。
【单选题】
氢罐安全阀起座和回座压力的整定值均以___的规定为准。
A. 《 压力容器安全监察规程》 ;
B. 《 电力工业技术管理法规》;
C. 《 电力生产事故调查规程》 ;
D. 《 发电厂安全工作规程》。
【单选题】
检修后的制氢设备在启动投运前,应用氮气吹洗整个系统,从氢气取样门进行气体含氧量分析,直到含氧量小于___为止。
A. 0.5%;
B. 1.5%;
C. 2.0%;
D. 4.0%。
【单选题】
电解H20 时,要加入一定量的KOH,此时电解液中存在___等离子。
A. H+、OH-;
B. H+、K+;
C. H+、O2-、K+;
D. H+、K+、OH-。
【单选题】
电解槽产生的氢气纯度略高于氧气纯度,氢气中的主要杂质是___。
A. 氧气和水蒸气;
B. 二氧化碳和氧气
C. 二氧化碳和水蒸气;
D. 氮气和氧气。
【单选题】
氢冷发电机内气体的纯度指标:氢气的纯度不低于___。
A. 94%;
B. 95%;
C. 96%;
D. 97%。
【单选题】
槽压信号的取出点是在___。
A. 氢综合塔上部气侧;
B. 氧综合塔上部气侧;C、氢综合塔下部液侧; D、氧综合塔下部液侧。
【单选题】
氢气在发电机内湿度往往会增大,其水分的主要来源是___。
A. 氢气中原有的水分;
B. 发电机轴承密封系统透平油中的水分渗入;
C. 发电机内冷器泄漏;
D. 发电机内冷水的漏入。
【单选题】
不能作为中间气体的是___。
A. 氧气;
B. 氮气;
C. 二氧化碳;
D. 氦气。
【单选题】
屏蔽泵声音不正常的主要原因之一是___。
A. 电解液不清洁;
B. 测温点漏碱;
C. 石墨轴承磨损;
D. 碱液循环量不足。
【单选题】
因工作需要进入氢站的人员必须___, 并不得穿化纤服和带铁钉的鞋子。
A. 经有关领导批准;
B. 使用铜制工具;
C. 持用动火工作票;
D. 交出火种。
【单选题】
制氢站内必需进行动火作业时,一定要___。
A. 经有关领导批准;
B. 使用动火工作票;
C. 消防队同意;
D. 做好安全措施。
【单选题】
为提高水电解制氢的纯度,在电解液中应加入浓度为___的五氧化二矾。
A. 2%;
B. 0.2g/L;
C. 2mg/L;
D. 0.2%。
【单选题】
为防止可能有爆炸性气体,在制氢设备上敲打时,必须使用___工具。
A. 钢质;
B. 铜质;
C. 铁质;
D. 铝质。
【单选题】
储氢罐应装设压力表、___ ,并每年校验一次,以保证其正确性。
A. 排气阀;
B. 安全阀;
C. 疏水阀;
D. 减压阀。
【单选题】
.用硝酸银容量法测水中氯离子时,应在___溶液中测定。
A. 酸性;
B. 中性;
C. 碱性;
D. 弱酸性。
【单选题】
动火工作票级别一般分为___。
A. 一级;
B. 二级;
C. 三级;
D. 四级。
推荐试题
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases