【单选题】
学生驾驶员在单飞之前必须在其飞行经历记录本上,有授权教员的签字,证明其在单飞日期之前______天内接受了所飞型号航空器的训练 ___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
依法取得中华人民共和国国籍的民用航空器,应当标明规定的国籍标志和:___
【单选题】
下列航空法律法规中级别最高的是:___
A. 《中华人民共和国飞行基本规则》
B. 《中华人民共和国民用航空法》
C. 《中华人民共和国搜寻援救民用航空器的规定》
【单选题】
执行昼间专业任务的航空器,在山区进行作业飞行时,起飞时间最早不得早于日出前:___
【单选题】
执行昼间专业任务的航空器,在平原、丘陵地区进行作业飞行时,起飞时间最早不得早于日出前:___
【单选题】
无人机飞行操作员在飞行时最应关注的是哪一区域: ___
【单选题】
航空器与ATC进行第一次无线电联络时,应当首先呼叫: ___
A. 所需联系的ATC的名称
B. 航空器的注册号
C. 航空器的机型
【单选题】
训练时间,是指受训人在下列方面从授权教员处接受训练的时间:___
A. 飞行中
B. 地面上、飞行模拟机或飞行训练器上
C. 飞行中、地面上、飞行模拟机或飞行练习器上
【单选题】
《中华人民共和国民用航空法》自______起施行 ___
A. 1996年1月1日
B. 1996年3月1日
C. 1997年1月1日
【单选题】
飞行任务书是许可飞行人员进行转场飞行和民用航空飞行的基本文件。飞行任务书由以下哪个单位签发:___
A. 驻机场航空单位或者航空公司的调度或签派部门
B. 驻机场航空单位或者航空公司的负责人
C. 驻机场航空单位或者航空公司的运行管理部门
【单选题】
关于“飞行管理”不正确的是:___
A. 在一个划定的管制空域内,可由两个空中交通管制单位负责空中交通管制
B. 通常情况下,民用航空器不得飞入禁区和限制区
C. 民用航空器未经批准不得飞出中华人民共和国领空
【单选题】
农业作业飞行的最低天气标准,平原地区是: ___
A. 云高不低于100米,能见度不小于3公里
B. 云高不低于150米,能见度不小于5公里
C. 云高不低于200米,能见度不小于5公里
【单选题】
在什么条件下飞行教员方可在学生驾驶员飞行经历记录本上签字,批准其单飞:___
A. 亲自或委托具备飞行教员资格和权限的飞行教员对该学生驾驶员提供了本规则授予单飞权利所要求的飞行训练,确认该学生驾驶员能够遵守飞行教员出于安全考虑而在飞行经历记录本上作出的任何限制,已经做好准备能够安全实施单飞
B. 亲自对该学生驾驶员提供了本规则授予单飞权利所要求的飞行训练,确认该学生驾驶员能够遵守飞行教员出于安全考虑而在飞行经历记录本上作出的任何限制,已经做好准备能够安全实施单飞
C. 亲自或委托具备飞行教员资格和权限的飞行教员对该学生驾驶员提供了本规则授予单飞权利所要求的飞行训练,确认该学生驾驶员能够遵守飞行教员出于安全考虑而在飞行经历记录本上作出的任何限制,已经做好准备能够安全实施单飞同时需得到检查教员的认可和批准
【单选题】
在下列哪种情况下民用航空器可以飞越城市上空:___
A. 指定的航路必需飞越城市上空时
B. 能见地标的目视飞行时
C. 夜间飞行时
【单选题】
无识别标志的航空器因特殊情况需要飞行的:___
A. 必须经相关管制单位批准
B. 必须经中国人民解放军空军批准
C. 必须经中国民用航空总局空中交通管理局批
【单选题】
我国民航飞行使用的时间为:___
A. 当地的地方时
B. 北京时
C. 世界协调时
【单选题】
下列情况下,无人机系统驾驶员由局方实施管理: ___
A. 在融合空域运行的轻型无人机
B. 在融合空域运行的小型无人机
C. 在隔离空域内超视距运行的无人机、
【单选题】
飞行时间的含义是指:___
A. 从航空器自装载地点开始滑行直到飞行结束到达卸载地点停止运动时为止的时间
B. 自航空器开始起飞滑跑至着陆滑跑终止的时间
C. 从航空器起飞进入跑道至着陆脱离跑道的时间
【单选题】
高空飞行,按照飞行高度区分为:___
A. 4500米(含)至9000米(含)
B. 8000米(含)至12000米(含)
C. 6000米(含)至12000米(含)
【单选题】
起飞时间(陆上)的含义是指: ___
A. 航空器开始起飞滑跑轮子转动的瞬间
B. 航空器进入跑道对正在起飞的瞬间
C. 航空器起飞滑跑抬前轮的瞬间
【单选题】
关于桨叶的剖面形状说法错误的是:___
A. 桨叶的剖面形状称为桨叶翼型
B. 桨叶翼型常见的有平凸型.双凸型和非对称型
C. 一般用相对厚度、最大厚度位置、相对弯度、最大弯度位置等参数来说明桨叶翼型
【单选题】
飞行的组织与实施包括: ___
A. 飞行预先准备、飞行直接准备、飞行实施和飞行讲评四个阶段
B. 飞行直接准备、飞行实施和飞行讲评三个阶段
C. 飞行预先准备、飞行准备和飞行实施三个阶段
【单选题】
飞行的安全高度是避免航空器与地面障碍物相撞:___
A. 航图网格最低飞行高度
B. 最低飞行安全高度
C. 最低飞行高度
【单选题】
由于加载的电子地图与实际操作时的地理位置信息有偏差,需要在使用前对地图进行:___
【单选题】
参加理论考试或实践考试的申请人在参加考试前:___
A. 应当具有地面教员或飞行教员签注的已完成有关地面理论或飞行训练的证明
B. 应当具有地面教员和飞行教员推荐其参加考试的证明
C. 以上二者缺一不可
【单选题】
民用航空器因故确需偏离指定的航路或者改变飞行高度飞行时,应当首先:___
A. 得到机长的允许
B. 取得机组的一致同意
C. 取得空中交通管制单位的许可
【单选题】
下列哪种控制方式不属于无人机仪表飞行: ___
【单选题】
起落航线飞行开始一转弯和结束四转弯的高度一般不得低于:___
【单选题】
以下哪一种情景容易引起飞行员产生飞机比实际位置偏高的错觉:___
A. 常规跑道;
B. 向上带斜坡的地形;
C. 向下带斜坡的地形。
【单选题】
侧风中着陆,为了修正偏流,可以采用既修正了偏流,又使飞机的升阻比不减小的___
A. 侧滑法
B. 改变航向法和侧滑法相结合
C. 改变航向法
【单选题】
无人机前轮偏转的目的:___
A. 主要是为了地面拖飞机
B. 保证飞机滑行和修正滑跑方向
C. 前轮摆振时减小受力
【单选题】
无人机积水道面上起飞,其起飞距离比正常情况下:___
【单选题】
无人机左侧风中起飞,侧风有使飞机机头向______偏转的趋势___
A. 左
B. 右
C. 视风速的大小不同可能向左也可能向右
【单选题】
可能需要处置的危机情况不包括:___
A. 动力装置故障
B. 任务设备故障
C. 舵面故障
【单选题】
可能需要处置的紧急情况不包括:___
A. 飞控系统故障
B. 上行通讯链路故障
C. 控制站显示系统故障
【单选题】
可能需要执行的应急程序不包括:___
A. 动力装置重启操作
B. 备份系统切换操作
C. 导航系统重启操作
【单选题】
经验表明无人机每飞行___小时或者更少就需要某种类型的预防性维护,至少每______小时进行较小的维护。___
A. 20,50
B. 25,40
C. 30,60
【单选题】
无人机注册证书颁发给飞机所有者作为注册证明:___
A. 随时随机携带
B. 存放备查
C. 作为售出证明
【单选题】
无人机适航证书不可:___
A. 随飞机一起转让
B. 存放备查
C. 随无人机系统携带
推荐试题
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL