刷题
导入试题
【单选题】
通常把由于___变化而引起发电机组输出功率变化的关系称为调节特性。
A. 频率;
B. 电压;
C. 运行方式;
D. 励磁。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
正常情况下,发电机耐受___的额定电压,对定子绕组的绝缘影响不大。
A. 1.3倍;
B. 1.5倍;
C. 1.8倍;
D. 2倍。
【单选题】
变压器泄漏电流测量主要是检查变压器的___。
A. 绕组绝缘是否局部损坏;
B. 绕组损耗大小;
C. 内部是否放电;
D. 绕组绝缘是否受潮。
【单选题】
电除尘器的工作原理是___。
A. 利用烟速降低后,灰的自然沉降作用除尘的;
B. 利用灰的粘结性粘附在收尘板上进行除尘的;
C. 利用高电压产生的场强使气体局部电离,并利用电场力实现粒子与气流的分离;
D. 利用高电压产生的电解作用使粒子与气流的分离。
【单选题】
并联运行的变压器,所谓经济还是不经济,是以变压器的___来衡量的。
A. 运行方式的灵活性;
B. 总损耗的大小;
C. 效率的高低;
D. 供电可靠性。
【单选题】
变压器油的粘度说明油的流动性好坏,温度越高,粘度___。
A. 越小;
B. 越大;
C. 非常大;
D. 不变。
【单选题】
变压器铭牌上的额定容量是指___。
A. 有功功率;
B. 无功功率;
C. 视在功率;
D. 平均功率。
【单选题】
变压器油中的___对油的绝缘强度影响最大。
A. 凝固点;
B. 粘度;
C. 水分;
D. 硬度。
【单选题】
变压器运行时,温度最高的部位是___。
A. 铁芯;
B. 绕组;
C. 上层绝缘油;
D. 下层绝缘油。
【单选题】
变压器套管是引线与___间的绝缘。
A. 高压绕组;
B. 低压绕组;
C. 油箱;
D. 铁芯。
【单选题】
在有载分接开关中,过渡电阻的作用是___。
A. 限制分头间的过电压;
B. 熄弧;
C. 限制切换过程中的循环电流;
D. 限制切换过程中的负载电流。
【单选题】
分裂绕组变压器低压侧的两个分裂绕组,它们各与不分裂的高压绕组之间所具有的短路阻抗___。
A. 相等;
B. 不等;
C. 其中一个应为另一个的2倍;
D. 其中一个应为另一个的3倍。
【单选题】
感应电动机的转速,永远___旋转磁场的转速。
A. 大于;
B. 小于;
C. 等于;
D. 不变。
【单选题】
异步电动机是一种___的设备。
A. 高功率因数;
B. 低功率因数;
C. 功率因数是1;
D. 功率因数是0。
【单选题】
电动机定子电流等于空载电流与负载电流___。
A. 之和;
B. 之差;
C. 之比;
D. 相量之和。
【单选题】
规定为星形接线的电动机,而错接成三角形,投入运行后___急剧增大。
A. 空载电流;
B. 负荷电流;
C. 三相不平衡电流;
D. 零序电流。
【单选题】
规定为三角形接线的电动机,而误接成星形,投入运行后___急剧增加。
A. 空载电流;
B. 负荷电流;
C. 三相不平衡电流;
D. 负序电流。
【单选题】
电动机运行电压在额定电压的___范围内变化时其额定出力不变。
A. -10%~+5%;
B. -5%~+10%;
C. -10%~+10%;
D. -10%~+15%。
【单选题】
在大电流接地系统中的电气设备,当带电部分偶尔与结构部分或与大地发生电气连接时,称为___。
A. 接地短路;
B. 相间短路;
C. 碰壳短路;
D. 三相短路。
【单选题】
在1lOkV及以上的系统中发生单相接地时,其零序电压的特征是___最高。
A. 在故障点处;
B. 在变压器中性点处;
C. 在接地电阻大的地方;
D. 在离故障点较近的地方。
【单选题】
强行励磁装置在发生事故的情况下,可靠动作可以提高___保护动作的可靠性。
A. 带延时的过流;
B. 差动;
C. 匝间短路;
D. 电流速断。
【单选题】
当电流超过某一预定数值时,反应电流升高而动作的保护装置叫做___。
A. 过电压保护;
B. 过电流保护;
C. 电流差动保护;
D. 欠电压保护。
【单选题】
距离保护是以距离___元件作为基础构成的保护装置。
A. 测量;
B. 启动;
C. 振荡闭锁;
D. 逻辑。
【单选题】
以SF6为介质的断路器,其绝缘性能是空气的2 ~ 3倍,而灭弧性能为空气的___倍。
A. 50;
B. 100;
C. 150;
D. 500。
【单选题】
为保证在检修任一出线断路器时相应的回路不停电,可采用的方法为___。
A. 母线分段;
B. 双母线接线;
C. 单元接线;
D. 主接线中加装旁路设施。
【多选题】
交流电的三要素指___
A. 频率;
B. 幅值;
C. 电压;
D. 电流;
E. 初相位。
【多选题】
电网并列操作必须满足以下条件:___
A. 相序、相位一致;
B. 频率相同,偏差不得大于0.2Hz;
C. 电压相等,调整困难时,500kV电压差不得大于10%,220kV及以下电压差不得大于20%;
D. 拉开全厂唯一合上的一组接地开关 (不包含变压器中性点接地开关) 或拆除全厂仅有的一组使用接地。
【多选题】
下列情况下,必须停用断路器自动重合闸装置:___
A. 重合闸装置异常时;
B. 断路器灭弧介质及机构异常,但可维持运行时;
C. 断路器切断故障电流次数超过规定次数时;
D. 线路带电作业要求停用自动重合闸装置时。
【多选题】
允许使用隔离开关进行下列操作:___
A. 拉开、合上无故障的电压互感器及避雷器;
B. 在系统无故障时,拉开、合上变压器中性点隔离开关;
C. 拉开、合上无阻抗的环路电流;
D. 用屋外三联隔离开关可拉开、合上电压在10kV及以下,电流在9A以下的负荷电流;超过上述范围时,必须经过计算、试验,并经主管单位总工程师批准。
【多选题】
变压器并联运行的条件为___:
A. 电压比相同;
B. 阻抗电压相同;
C. 接线组别相同;
D. 频率相同。
【多选题】
有关变压器有载调压分接开关操作描述正确的有:___
A. 三相水平排列者,停电时应先拉开中相,后拉开边相 ;
B. 禁止在变压器生产厂家规定的负荷和电压水平以上进行主变压器分接头调整操作 ;
C. 并列运行的变压器,其调压操作应轮流逐级或同步进行,不得在单台变压器上连续进行两个及以上的分接头变换操作 ;
D. 多台并列运行的变压器,在升压操作时,应先操作负载电流相对较小的一台,再操作负载电流较大的一台,以防止环流过大;降压操作时,顺序相反。
【多选题】
GIS组合电气合接地开关前,必须满足以下条件:___
A. 相关隔离开关必须拉开;
B. 在二次上确认应接地设备无电压;
C. 线路接地前必须与调度核实该线路确已停电;
D. 拉开、合上无阻抗的环路电流。
【多选题】
倒闸操作应坚持操作之前“三对照”:___
A. 对照操作任务和运行方式填写操作票;
B. 对照模拟图审查操作票并预演;
C. 对照设备名称和编号无误后再操作;
D. 对照线路确已停电。
【多选题】
多端电源的线路停电检修时,必须先拉开 ___ ,然后方可 (D ) ,送电时顺序相反。
A. 各端断路器;
B. 各端断路器及相应隔离开关;
C. 开展工作;
D. 装设接地线或合上接地开关。
【多选题】
并列运行中的变压器中性点接地开关需从一台倒换至另一台运行变压器时,应先 ___ 另一台变压器的中性点接地开关,再 (C ) 原来的中性点接地开关。
A. 卡死;
B. 合上;
C. 拉开;
D. 锁定。
【多选题】
变压器停电操作过程中,一般可以先将各侧断路器按照 ___ 的顺序操作到断开位置,再逐一按照由低到高的顺序操作隔离开关到断开位置,隔离开关的操作须按照先拉 ( C ) 隔离开关,再拉 ( D ) 隔离开关的顺序进行。
A. 由低到高;
B. 由高到低;
C. 变压器侧、
D. 母线侧。
【多选题】
线路送电操作顺序,应先合上 ___ ,后合上 (D ) ,再合上 (A ) ,停电时操作顺序相反。
A. 断路器;
B. 母线侧隔离开关;
C. 对侧断路器;
D. 线路侧隔离开关 。
【多选题】
倒母线应考虑各组母线的 ___ 与电源 ( D ) 的合理性。
A. 电流;
B. 负荷;
C. 功率;
D. 分布。
【多选题】
14、电压互感器停电操作时,先拉开 ___ 后拉开 ( B )。送电操作顺序相反。
A. 二次空气开关 (或取下二次熔断器);
B. 一次隔离开关 ;
C. 母线断路器;
D. 电压互感器所在母线的开关 。
【多选题】
在已停电的设备上验电前,除确认验电器完好、有效外,还应在相应电压等级的 ___ 上检验报警正确,方能到需要 (C ) 上验电。禁止使用电压等级不对应的验电器进行验电。
A. 带电设备;
B. 停电设备;
C. 接地的设备;
D. 试验设备。
【多选题】
操作票中“操作任务”的填写应明确 ___ 由一种状态转为另外一种状态,或者 ( C ) 由一种运行方式转为另一种运行方式。
A. 设备的故障;
B. 设备;
C. 系统;
D. 设备的异常。
推荐试题
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用