相关试题
【单选题】
垂直磨耗在钢轨顶面宽___(距标准工作边)测量。
A. 1/2处
B. 1/3处
C. 1/4处
D. 1/5处
【单选题】
铺设非标准长度钢轨或再用轨,无厂制缩短轨时,钢轨接头可采用相错式,其相错量不得小于___。
【单选题】
轨道线路曲线半径R≤150时,轨距加宽标准为___。
A. 5mm
B. 10mm
C. 15mm
D. 不设加宽
【单选题】
在测量轨道线路曲线正矢时,应在钢轨踏面下___处测量正矢。
A. 14mm
B. 15mm
C. 16mm
D. 17mm
【单选题】
50kg/m钢轨7号单开道岔及5.0m交叉渡线道岔牵引点动程为___。
A. 152mm
B. 160mm
C. 168mm
D. 80mm
【单选题】
正线道岔(直向)与曲线之间的直线段长度,不得短于___。
A. 15m
B. 20m
C. 25m
D. 30m
【单选题】
温度应力式无缝线路,固定区长度不得短于___。
A. 25m
B. 50m
C. 100m
D. 150m
【单选题】
在温度应力式无缝线路上,铝热焊缝距轨枕边不得小于___。
A. 25mm
B. 30mm
C. 35mm
D. 40mm
【单选题】
混凝土枕地段应调整不同号码扣板、轨距挡板,并可用加垫片的方法调整尺寸,但厚度不得超过___。
A. 0.5mm
B. 1mm
C. 1.5mm
D. 2mm
【单选题】
使用打磨地铁列车成段进行打磨后钢轨踏面用1m直尺测量,不平度应小于___。
A. 0.2mm
B. 0.3mm
C. 0.4mm
D. 0.5mm
【单选题】
我国钢轨的标准长度为___和( )两种。
A. 12m,25m
B. 12.5m,25m
C. 6m,25m
D. 7m,25m
【单选题】
P60kg/m钢轨普通夹板螺栓孔直径为___。
A. 26mm
B. 27mm
C. 28mm
D. 29mm
【单选题】
P60kg/m钢轨普通夹板第一孔至第二孔距离为___。
A. 140mm
B. 150mm
C. 110mm
D. 160mm
【单选题】
8.8级螺栓直径为___。
A. 20mm
B. 22mm
C. 24mm
D. 26mm
【单选题】
10.9螺栓直径为___。
A. 20mm
B. 22mm
C. 24mm
D. 26mm
【单选题】
轨枕上面支承钢轨的部分称为承轨槽,做成___的轨底坡,以适应轨底坡的要求。
A. 0.055555556
B. 0.0625
C. 0.069444444
D. 0.076388889
【单选题】
我国铁路规定,对木枕轨道,每公里最多为___根。
A. 1920
B. 1840
C. 1667
D. 1440
【单选题】
我国铁路规定,对混凝土枕轨道,每公里最多为___根。
A. 1920
B. 1840
C. 1667
D. 1440
【单选题】
我国铁路规定,每公里最少均为___根。
A. 1920
B. 1840
C. 1667
D. 1440
【单选题】
我国地铁正线规定,每25米配置___根轨枕。
【单选题】
混凝土枕钢筋或钢丝外露,钢筋未锈蚀,长度超过___,判定为重伤。
A. 80mm
B. 90mm
C. 100mm
D. 120mm
【单选题】
碎石道床砟肩宽度为轨枕端部至道砟顶面外侧的水平距离,一般不小于___。
A. 0.2m
B. 0.3m
C. 0.4m
D. 0.5m
【单选题】
线路中心线之间的垂直距离称为线间距,地面线的线间距一般为___。
A. 4.5~5m
B. 5~5.5m
C. 5.5~6m
D. 6~6.5m
【单选题】
混凝土枕碎石道床顶面应与轨枕中部顶面平齐,木枕碎石道床顶面应低于木枕顶面___。
A. 10mm
B. 20mm
C. 30mm
D. 40mm
【单选题】
排水沟的纵向坡度应与线路坡度一致,线路平坡地段,排水沟纵向坡度不宜小于___。
A. 0.02
B. 0.03
C. 0.04
D. 0.05
【单选题】
桥梁上钢轨扣件失效率不得大于___,且不得有隔一或连二失效扣件。
A. 0.1
B. 0.15
C. 0.2
D. 0.25
【单选题】
不是钢轨的主要功用的为___
A. 支持引导机车车辆的车轮
B. 使列车按正确的方向运行
C. 固定轨枕形成框架结构
D. 将来自车辆的压力传送给轨枕
【单选题】
25m,60kg/m钢轨普通线路,10.9级螺栓扭力矩应达到___。
A. 600N•m
B. 700N•m
C. 800N•m
D. 900N•m
【单选题】
不同类型的钢轨互相联结时,应使用___。
A. 鱼尾型夹板
B. 平直夹板
C. 双头式夹板
D. 异型夹板
【单选题】
下列设备零件中,___尺寸对最大轨缝限制值(即构造轨缝)没有影响。
A. 钢轨
B. 接头夹板
C. 接头螺栓
D. 轨枕扣件
【单选题】
线路上的伤损钢轨应用白铅油做好标记,连续轻伤有发展的标记是___。
A. ▕←△→▏
B. ▕←△△→▏
C. ↑△
D. ↑△△
【单选题】
线路上的伤损钢轨应用白铅油做好标记,___的标记是↑△△△。
A. 连续重伤
B. 局部重伤
C. 连续轻伤
D. 局部轻伤
【单选题】
曲线正矢应用20m弦在钢轨踏面下___测量
A. 14mm处
B. 14mm范围内
C. 16mm处
D. 16mm范围内
【单选题】
个别更换夹板后放行列车___。
A. 不限速
B. 限速5km/h
C. 限速25km/h
D. 限速45km/h
【单选题】
曲线实设最大超高,在单线上不得大于___。
A. 125mm
B. 135mm
C. 145mm
D. 150mm
【单选题】
道岔护轨轮缘槽标准宽度为42mm,容许误差为___。
A. ﹢3,-1mm
B. ﹢3,-2mm
C. ±2mm
D. ±3mm
【单选题】
为平衡列车在曲线运行时产生的___,需要在曲线段将外轨抬高,使车体内倾。
A. 向心力
B. 离心力
C. 向心速度
D. 离心速度
【单选题】
不会引起线路爬行的为___。
A. 钢轨在车轮作用下的波浪形弯曲
B. 钢轨温度变化
C. 列车制动
D. 钢轨轨距误差超限
【单选题】
线路轨距超限或变化率不合要求,以及拨道后有个别碎弯,应进行___作业。
A. 起道
B. 改道
C. 拨道
D. 矫直钢轨
【单选题】
___是根据线路变化情况,在全年度和线路全长范围内进行的有计划、有重点的养护,以保持线路质量经常处于均匀状态。
A. 综合维修
B. 经常保养
C. 临时补修
D. 线路中修
推荐试题
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first