【单选题】
下列情况下,无人机系统驾驶员由局方实施管理: ___
A. 在融合空域运行的轻型无人机
B. 在融合空域运行的小型无人机
C. 在隔离空域内超视距运行的无人机、
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
飞行时间的含义是指:___
A. 从航空器自装载地点开始滑行直到飞行结束到达卸载地点停止运动时为止的时间
B. 自航空器开始起飞滑跑至着陆滑跑终止的时间
C. 从航空器起飞进入跑道至着陆脱离跑道的时间
【单选题】
高空飞行,按照飞行高度区分为:___
A. 4500米(含)至9000米(含)
B. 8000米(含)至12000米(含)
C. 6000米(含)至12000米(含)
【单选题】
起飞时间(陆上)的含义是指: ___
A. 航空器开始起飞滑跑轮子转动的瞬间
B. 航空器进入跑道对正在起飞的瞬间
C. 航空器起飞滑跑抬前轮的瞬间
【单选题】
关于桨叶的剖面形状说法错误的是:___
A. 桨叶的剖面形状称为桨叶翼型
B. 桨叶翼型常见的有平凸型.双凸型和非对称型
C. 一般用相对厚度、最大厚度位置、相对弯度、最大弯度位置等参数来说明桨叶翼型
【单选题】
飞行的组织与实施包括: ___
A. 飞行预先准备、飞行直接准备、飞行实施和飞行讲评四个阶段
B. 飞行直接准备、飞行实施和飞行讲评三个阶段
C. 飞行预先准备、飞行准备和飞行实施三个阶段
【单选题】
飞行的安全高度是避免航空器与地面障碍物相撞:___
A. 航图网格最低飞行高度
B. 最低飞行安全高度
C. 最低飞行高度
【单选题】
由于加载的电子地图与实际操作时的地理位置信息有偏差,需要在使用前对地图进行:___
【单选题】
参加理论考试或实践考试的申请人在参加考试前:___
A. 应当具有地面教员或飞行教员签注的已完成有关地面理论或飞行训练的证明
B. 应当具有地面教员和飞行教员推荐其参加考试的证明
C. 以上二者缺一不可
【单选题】
民用航空器因故确需偏离指定的航路或者改变飞行高度飞行时,应当首先:___
A. 得到机长的允许
B. 取得机组的一致同意
C. 取得空中交通管制单位的许可
【单选题】
下列哪种控制方式不属于无人机仪表飞行: ___
【单选题】
起落航线飞行开始一转弯和结束四转弯的高度一般不得低于:___
【单选题】
以下哪一种情景容易引起飞行员产生飞机比实际位置偏高的错觉:___
A. 常规跑道;
B. 向上带斜坡的地形;
C. 向下带斜坡的地形。
【单选题】
侧风中着陆,为了修正偏流,可以采用既修正了偏流,又使飞机的升阻比不减小的___
A. 侧滑法
B. 改变航向法和侧滑法相结合
C. 改变航向法
【单选题】
无人机前轮偏转的目的:___
A. 主要是为了地面拖飞机
B. 保证飞机滑行和修正滑跑方向
C. 前轮摆振时减小受力
【单选题】
无人机积水道面上起飞,其起飞距离比正常情况下:___
【单选题】
无人机左侧风中起飞,侧风有使飞机机头向______偏转的趋势___
A. 左
B. 右
C. 视风速的大小不同可能向左也可能向右
【单选题】
可能需要处置的危机情况不包括:___
A. 动力装置故障
B. 任务设备故障
C. 舵面故障
【单选题】
可能需要处置的紧急情况不包括:___
A. 飞控系统故障
B. 上行通讯链路故障
C. 控制站显示系统故障
【单选题】
可能需要执行的应急程序不包括:___
A. 动力装置重启操作
B. 备份系统切换操作
C. 导航系统重启操作
【单选题】
经验表明无人机每飞行___小时或者更少就需要某种类型的预防性维护,至少每______小时进行较小的维护。___
A. 20,50
B. 25,40
C. 30,60
【单选题】
无人机注册证书颁发给飞机所有者作为注册证明:___
A. 随时随机携带
B. 存放备查
C. 作为售出证明
【单选题】
无人机适航证书不可:___
A. 随飞机一起转让
B. 存放备查
C. 随无人机系统携带
【单选题】
无人机特殊飞行许可颁发前,由局方检察官或局方认证人员或_____进行检查以确定位于预期的飞行是安全的。___
A. 适当认证修理站
B. 经验丰富的无人机飞行员
C. 经验丰富的有人机飞行员
【单选题】
无人机的注册所有者或运营人应对保持无人机有最新的适航证书和_______负责___
A. 无人机安全飞行
B. 无人机注册证书
C. 无人机维修
【单选题】
无人机的注册所有者或运营人应将永久邮寄地址的变更、无人机的销售和_____等事项通知局方注册处。___
A. 试验试飞
B. 无人机注册证书丢失
C. 无人机维修
【单选题】
无人机系统无线电资源的使用_____局方无线电管理部门的许可证。___
【单选题】
如果无人机制造商使用编写的细节更加详细的《无人机驾驶员操作手册》作为主要参考《无人机飞行手册》。___
A. 由局方批准后可以替代
B. 不可替代
C. 一般情况下可以替代
【单选题】
无人机制造商编写的随机文档《无人机所有者/信息手册》____
A. 需经局方批准
B. 不需局方批准
C. 特殊飞行器需局方批准
【单选题】
无人机制造商编写的随机文档《无人机所有者/信息手册》___
A. 可以替代《无人机飞行手册》
B. 一般情况下可以替代《无人机飞行手册》
C. 不能替代《无人机飞行手册》
【单选题】
如果一本《无人机飞行手册》没有注明具体的无人机序号和注册信息,则:___
A. 手册可以作为该机飞行的参考指导
B. 手册只能用于一般学习用途
C. 手册可以部分作为该机飞行参考指导
【单选题】
无人机飞行前,无人机飞行员:___
A. 按照随机《无人机飞行手册》指导飞行
B. 按照积累的经验指导飞行
C. 重点参考《无人机所有者/信息手册》
【单选题】
无人机飞行手册中规定的过载表明:___
A. 飞行中允许的最大过载
B. 起飞时允许的最大过载
C. 着陆时允许的最大过载
【单选题】
无人机飞行员在操纵飞机平飞时,遇到强烈的垂直上升气流时,为了防止过载超规定应:___
A. 加大油门迅速脱离
B. 以最大上升率增大高度
C. 适当减小飞行速度
【单选题】
在装载时,由于飞机重心偏右,可导致在巡航飞行时,飞机的阻力:___
【单选题】
计算无人机装载重量和重心的方法不包括:___
【单选题】
当给大型无人机加油时,为预防静电带来的危害应注意:___
A. 检查电瓶和点火电门是否关断
B. 油车是否接地
C. 将飞机、加油车和加油枪用连线接地
【单选题】
起飞时,可操纵变距螺旋桨的桨叶角到什么状态:___
A. 小桨叶角及低转速
B. 大桨叶角及高转速
C. 小桨叶角及高转速
【单选题】
活塞发动机过热易出现在下列哪种过程中:___
【单选题】
活塞发动机在慢车状态下工作时间过长,易带来的主要危害是:___
A. 电嘴挂油积炭
B. 滑油消耗量过大
C. 气缸头温度过高
推荐试题
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config