相关试题
【单选题】
容易发生婴儿缺铁性贫血的是在___个月时。
A. 2-6
B. 9-12
C. 6-24
D. 1-5
【单选题】
婴儿有虚弱,无力,面色苍白,脾气急躁的表现,说明缺乏___。
A. 维生素C
B. 维生素K
C. 维生素E
D. 叶酸
【单选题】
为患病婴儿测___的部位是腋窝、口腔、肛门。
【单选题】
给婴儿滥用耳毒性抗生素,会引起___。
A. 药物中毒性耳聋
B. 中耳炎
C. 耳出血
D. 耳鸣
【单选题】
婴儿缺乏___,主要表现为指甲发白,没精神,眼结膜发白等。
A. 叶酸
B. 维生素K
C. 维生素B2
D. 维生素C
【单选题】
婴儿缺乏___,主要表现为口角炎,口唇干裂,舌色红紫,眼疼等。
A. 维生素B2
B. 维生素K
C. 维生素C
D. 叶酸
【单选题】
2周岁以内最好不看电视,用___给婴儿洗脸,以防眼病。
A. 流动水
B. 盆接水
C. 脏水
D. 药水
【单选题】
婴儿缺乏维生素B2主要表现为___,口唇干裂,舌色红紫,眼疼等。
A. 口角炎
B. 全身骨头疼
C. 血色素低
D. 吸收力差
【单选题】
___包括食物、药物两大类。
A. 营养物
B. 生活用品
C. 学习用品
D. 水
【单选题】
婴儿生长监测___主要包括,身长测量,头围与胸围的测量。
A. 体重测量
B. 智力测评
C. 情绪测评
D. 环境测评
【单选题】
婴儿___主要包括,体重测量,身长测量,头围与胸围的测量。
A. 生长监测
B. 心理监测
C. 发育监测
D. 日常生活
【单选题】
学习___知识能够早期发现婴儿异常并对常见疾病进行及时处理。
A. 生长监测
B. 意外伤害护理
C. 心理
D. 教育
【单选题】
每次测量体重要连续测三次,用两个相近的数字的平均数作为记录数字,体重数字记录到小数点后___。
【单选题】
婴儿生长监测包括生长发育的知识,人体测量学常用参数,___。
A. 生长发育监测方法
B. 营养曲线
C. 学习习惯
【单选题】
用一个有代表性的跨距来说明整个锚段的( ),即当量跨距。___
A. 长度
B. 张力
C. 长度变化规律
D. 张力变化规律
【单选题】
在接触网计算中,只有先计算确定了锚段的( )后,才能进行安装曲线的计算绘制。___
A. 当量跨距
B. 额定张力
C. 实际长度
D. 计算负载
【单选题】
当气象条件发生变化时,当量跨距下导线()与锚段内各跨距线索张力变化规律相同。___
A. 长度变化规律
B. 张力变化规律
C. 长度
D. 张力
【单选题】
简单悬挂要求接触线应有(),并有较好的稳定性。___
A. 较小的张力和较小的弛度
B. 较小的张力和较大的弛度
C. 较大的张力和较小的弛度
D. 较大的张力和较大的弛度
【单选题】
吊弦有因()的痕迹,说明该吊弦已不正常应及时更换或主导电回路也有问题,必须及时检查。___
A. 闪络
B. 接触不良
C. 击穿
D. 导流发热
【单选题】
所谓“非正常的电流转换”没有保证牵引电流通过的必要的(),所以就发生了设备零部件的烧损。___
A. 电气连接
B. 电连接
C. 线索连接
D. 机械连接
【单选题】
受电弓对硬点碰撞和产生电弧造成接触网和受电弓的(),影响取流,对电动列车和电器产生不良影响,严重时会造成弓网事故。___
A. 机械损伤
B. 电弧烧伤
C. 机械损伤和电弧烧伤
D. 电压不稳定
【单选题】
剐网是由()的原因引起弓网故障现象。___
A. 电动列车受电弓
B. 接触网
C. 定位点位移
D. 风偏
【单选题】
离线时产生拉弧,烧损接触线,严重时可使接触线()急剧下降,造成接触线被拉断的事故。___
A. 电气强度
B. 载流量
C. 机械强度
D. 抗拉强度
【单选题】
接触悬挂传给支柱的风负载是指()。___
A. 接触线风负载
B. 承力索风负载
C. 支柱承担的附加导线
D. 以上均是
【单选题】
当线索下锚时,下锚支线索由于改变方向对转换柱产生的水平分力,称为线索的()。___
A. “之”字力
B. 曲线力
C. 下锚分力
D. 转换分力
【单选题】
()是软横跨的主要构件,承力索受各股道纵向接触悬挂的全部垂直负载。___
A. 支柱
B. 上下部定位绳
C. 横向承力索
D. 直吊弦
【单选题】
多股道接触悬挂通过横向线索悬挂在线路两侧的支柱上的装配方式称为()___
A. 简单悬挂
B. 链型悬挂
C. 硬横跨
D. 软横跨
【单选题】
非绝缘软横跨的()对地绝缘。___
A. 上、下部定位绳
B. 横向承力索
C. 支柱
D. 直吊弦
【单选题】
在软横跨结构中,没有以下哪个部分。()___
A. 横向承力索
B. 腕臂
C. 上、下部定位绳
D. 承力索
【单选题】
横向承力索是软横跨的主要构件,承力索受各股道纵向接触悬挂的全部()。___
A. 垂直拉力
B. 水平拉力
C. 垂直负载
D. 水平负载
【单选题】
上部固定绳的作用是固定各股道的(),并将它的水平负载传递给支柱。___
A. 纵向承力索
B. 横向承力索
C. 接触线
D. 架空地线
【单选题】
()的作用是固定各股道的纵向承力索,并将它的水平负载传递给支柱。___
A. 下部固定绳
B. 上部固定绳
C. 横向承力索
D. 直吊弦
【单选题】
在软横跨中,()承力索通过直吊弦承受全部悬挂的重量。___
【单选题】
在一定的负荷情况下,如果横向承力索弛度增大,横向承力索悬挂点处水平张力减小了,但要求支柱要()。___
A. 增加刚度
B. 增加容量
C. 增加强度
D. 增加高度
【单选题】
横向承力索和上、下部定位索均不得有接头、断股和补强,其机械强度()应符合有关规定。___
A. 安全系数
B. 刚度
C. 数值
D. 拉力
【单选题】
上、下部定位应水平,允许有平缓的(),5股道及以下者不超过100mm,5股道以上者不超过200mm。下部定位索距接触线的垂直距离不得小于250mm。___
A. 正弛度
B. 负弛度
C. 拉出值
D. 之字值
【单选题】
软横跨结点3、4表示软横跨在()上的装配形式。___
A. 钢支柱
B. 混凝土支柱
C. 非工作支定位
D. 工作支定位
【单选题】
软横跨结点5在()时,悬挂承力索的鞍子改为滑轮。___
A. 简单悬挂
B. 链形悬挂
C. 半补偿链形悬挂
D. 全补偿链形悬挂
【单选题】
硬横跨刚度好,稳定性高能改善弓网受流,降低()。___
A. 接触线高度
B. 离线率
C. 实际负载
D. 受力状态
【单选题】
硬横跨跨越能力强,能有效(),做到既满足刚度又满足稳定性。___
A. 提高支柱高度
B. 降低支柱高度
C. 增加支柱强度
D. 增加机械强度
推荐试题
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions