【填空题】
110.和谐型电力机车冷却系统主要包括___系统冷却、主变流装置系统冷却、牵引电动机冷却、辅助电源装置冷却、空气压缩机的冷却及包括卫生间通风及车内换气等。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【填空题】
111.和谐型电力机车制动系统采用的是克诺尔的___型和法维莱制动机。
【填空题】
112.CCBⅡ型制动机主要由LCDM制动显示屏、EBV___、集成处理模块IPM、继电器接口模块RIM和电空控制单元EPCU等组成。
【填空题】
113.和谐型电力机车升弓前,首先需确定总风缸压力在___ kPa以上。
【填空题】
115.当牵引电动机通风机发生故障隔离时,只有对应的___和牵引电动机停止工作。
【填空题】
116.和谐型电力机车辅助变流器向牵引通风机电机和压缩机电机等辅助机器供给___交流电。
【填空题】
117.和谐型电力机车弹停装置动作,且弹停塞门___关闭时,如要缓解弹停装置,必须在走行部的___上进行手动缓解。
【填空题】
118.和谐型电力机车采用___方式,当负载分配不均匀时,均可以通过牵引变流器的控制进行适当补偿,以实现最大限度地发挥机车牵引力。
【填空题】
119.CCBⅡ制动机在___状态,自动制动手柄在制动区,如果列车管有泄漏,总风将不会自动给列车管补风。
【填空题】
120.主变压器油泵发生故障隔离时,其对应的___和牵引电动机全部停止工作。
【填空题】
121.当控制风压低时,由___提供升弓所需的风压。
【填空题】
122.合蓄电池开关后,电压不得低于___ V。
【填空题】
123.当使用动力制动时,牵引电动机作为___电机。
【填空题】
124.司机操纵台整体脚踏包括的脚动控制设备有无人警惕安全装置 、撒砂装置和___。
【填空题】
125.换端操纵时,非操纵端的大闸必须保证在“___”位。
【填空题】
126.无论牵引客、货车,均严禁使用制动机的“___”功能。
【填空题】
127.小闸放到全制动位制动缸压力上升到___kPa。
【填空题】
128.司机控制器是机车的主令控制电器,用来转换机车的___工况,改变机车的运行方向。
【填空题】
129.机车无火回送时,将制动柜内ERCP上的无火回送塞门打到___位。
【填空题】
130.和谐型机车供电制式为单相交流25kV,___Hz 。
【填空题】
131.停放制动作为一种___制动,用来防止机车停放时意外溜放。
【填空题】
132.轴端接地装置是一个用于实现网侧电路从电网到钢轨回路作用并且是轴向运行的滑行触头,其也用于机车___保护。
【填空题】
133.___装置是一个用于实现网侧电路从电网到钢轨回路作用并且是轴向运行的滑行触头,其也用于机车接地保护。
【填空题】
134.CCBII空气制动控制系统是一个为货运和客运机车设计的、以网络为基础的___空气制动系统。
【填空题】
135.CCB II合并了许多___功能,如果发生故障,CCB II具有独特的识别、重新配置、备份主要部件的能力。
【填空题】
136.机车的轮对驱动系统结构由___、轴箱、牵引电机、齿轮箱、抱轴承等零部件组成。
【填空题】
137.进入定速控制模式,机车将根据实际行驶速度与定速期望目标速度的差异,自动进行___的快速转换,控制机车行驶速度不变。
【填空题】
138.如果机车司机不能正确的操作无人警惕安全装置,在开始紧急制动之前将给出视觉和___报警。
【填空题】
139.HXD1C型电力机车在正常情况下,受电弓选择开关位应该在“___”位,升后弓。
【填空题】
140.HXD1C型电力机车如果空气制动施加且机车速度大于___km/h,牵引将切除。
【填空题】
141.HXD1C型电力机车在升弓命令最晚___分钟之后,必须闭合主断路器,否则降弓以保护蓄电池。
【填空题】
142.HXD1C型电力机车,在机车使用单独制动并且制动缸压力大于___ kPa时,电制动不可用。
【填空题】
143.HXD1C型电力机车,机械间通风支路的冷却空气由辅助逆变器柜___提供,冷却机械间后,经车顶通风窗和压缩机散热排风口排出车外。
【填空题】
144.HXD1C型电力机车,空气供应系统安装有一个低压保护装置,当总风缸压力低于___Pa时,低压保护装置经MMI显示屏发送一个信号给司机。
【填空题】
145.HXD1C型电力机车,停放制动没有缓解同时机车速度大于___ km/h将触发惩罚制动。
【填空题】
146.HXD1C型电力机车25T轴重时启动牵引力为___ kN。
【填空题】
147.HXD1C型电力机车最大速度为___ km/h。
【填空题】
148.HXD1C型电力机车,自动换端时,___分钟内没有司机室被再次占用,所有辅机和HVB应断开,同时受电弓应降下,然后“自动换端”程序结束。
【填空题】
149.HXD1C型机车的牵引电动机为交流异步电动机,额定功率___ kW。
【填空题】
150.HXD1C型机车的轮对驱动系统,牵引电机采用___悬挂,由轮对、轴箱、牵引电机、齿轮箱、抱轴等主要零部件组成。
【填空题】
151.HXD1C型电力机车,机车上有___个总风缸,总容量为1600 L。
推荐试题
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network