刷题
导入试题
【多选题】
触发BB12的信号有___
A.
B. EA-BED母线电压<2.52KV,延时60秒; B. BBA-BBD母线电压<2.52KV,延时60秒;
C. BBA-BBD母线频率<47.4Hz,延时60秒;
D. BEA-BED母线频率<47.4Hz,延时60秒。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AD
解析
暂无解析
相关试题
【多选题】
下列关于BB12信号描述正确的是___
A. 母线BEA-BED电压(4v4)<2.52KV,延时60秒;
B. 母线BEA-BED频率(4v4)<47.4Hz,延时60秒;
C. BB12保护动作时在后备盘上使用专用的钥匙复位;
D. BB12保护动作时的报警声音与AA17动作时不同;
【多选题】
下列保护可以手动触发_________
A. EP
B. APP
C. PP1
D. PP2
【多选题】
AC21的触发信号有_________
A. EP
B. ATWS
C. 所有主泵全停
D. 主泵运行环路的热腿温度小于274度
E. PP1信号长于5秒
【多选题】
机组功率>75%Nnom的情况下,以下信号中会触发APP保护动作的是_________
A. 发电机出口开关断开
B. 机组孤岛运行
C. 多于两个主汽门关闭
D. 主给水流量与反应堆功率严重不匹配
【多选题】
DC11中启动KAA系统的信号有_________
A. 一回路饱和温度与任一环路热段温度之差小于10℃
B. 安全壳内压力大于0.129MPa
C. 来自CA11命令
D. 来自CD15命令
【多选题】
造成正反应性误引入事故的初始事件有哪些_________
A. 硼酸浓度的误稀释
B. 控制棒组件的不可控上移
C. 控制棒组件从堆芯弹出
D. 主蒸汽快速隔离阀的误关闭
【多选题】
以下信号中,触发第一类预保护(PP1)动作的信号有_________
A. 中子通量变化周期小于20s
B. 一回路热段(1v4)温度高于323℃
C. 堆芯上部压力大于16.2MPa
D. 主蒸汽集管压力大于6.86MPa
【多选题】
以下信号中,触发第二类预保护(PP2)动作的信号有_________
A. 堆芯上部压力大于16.2MPa
B. 燃料棒线功率密度大于max1(max1=PP1限值×0.98)
C. 偏离泡核沸腾裕度DNBR小于min1(min1=1.35)
D. 单束控制棒落入堆芯
【多选题】
功率运行时一定引起跳堆的事件_________
A. 切除三台主泵
B. 控制棒驱动机构380V电源丧失,延时3秒
C. SGTR
D. 汽轮机停机
【多选题】
发生误稀释事故时,触发“反应堆紧急停堆”保护动作信号有_________
A. 反应堆周期<10s
B. 反应堆功率大于操纵员设定的功率限值
C. 反应堆功率大于根据反应堆冷却剂泵运行状态自动生成的功率限值
D. 最大线功率密度超过限值
【多选题】
控制棒意外落棒事故,可能触发“反应堆紧急停堆”保护动作信号有_________
A. 反应堆周期<10s
B. 反应堆功率>75%时,一回路压力小于14.7MPa
C. 一回路热段温度大于260℃时,没有cooldown时一回路压力<13.73MPa
D. 一回路热段温度大于328℃
【多选题】
发生SGTR启动JDH系统后,当满足下列条件之一,JDH泵停运___
A. P1k <7.5MPa(H=0.5MPa)
B. JDH泵启动信号存在,但稳压器液位>9.4m(H=0.1m)
C. SGTR信号消失后,操纵员手动复位
D. KAA泵停运
【多选题】
下列属于CE11“地震时系统隔离”动作的是:___
A. 关闭蒸汽发生器主给水
B. 关闭LBA10-40AA501,101,102
C. 关闭LCU正常供应,即关闭LCU02,03AA103,LCU00AA101
D. 关闭SGC02向非抗震厂房的供给
【多选题】
关于安全壳一级隔离的说法哪些是正确的:___
A. 安全壳内压力大于0.105MPa,信号消失后即可复位
B. 安全壳内放射性水平大于Max1,信号保持10min后可复位
C. 操纵员手动触发,可以立即复位
【多选题】
触发安全壳一级隔离的命令有:___
A. 安全壳内压力大于0.105MPa
B. 安全壳内放射性水平大于Max1
C. 安全壳内放射性水平大于Max2
D. 操纵员手动触发
【多选题】
SGTR后,在开启非事故蒸汽发生器大气释放阀信号消失的前提下,何时将其转为维持压力工况___
A. 一回路压力小于7.9Mpa
B. 手动
C. 蒸汽发生器压力低于4.9Mpa
D. 蒸汽发生器压力低于5.0Mpa
【多选题】
CD15保护动作的结果是___
A. 启动JDH泵对堆芯应急注硼
B. 发信号至DC11,DC12,启动KAA,PEB
C. 停运JEF电加热器
D. 关闭KBA60AA110和KBA69AA101
【多选题】
关于发生SGTR时蒸汽发生器的隔离的说法哪些是正确的___
A. 关闭所有蒸汽发生器的汽侧阀门LBA10、20、30、40AA501,101,102
B. 关闭事故蒸汽发生器的大气释放阀LBU10(20,30,40)201和前置隔离阀LBU10(20,30,40)AA101
C. 关闭事故蒸汽发生器排污阀门LCQ15(25,35,45)AA801、802;LCQ16(26,36,46)AA801、802
D. 关闭事故蒸汽发生器给水阀门LAB10(20,30,40)AA111、113、801
【多选题】
CB12安全壳二级隔离时,将安全壳隔离阀分成四组,分别为:___
A. 无延时关闭a组
B. 延时11秒关闭a组
C. 无延时关闭b组
D. 延时11秒关闭b组
【多选题】
CD15发生SGTR时强制降低一回路压力 功能完成准则为___
A. JDH至少两列运行
B. 向稳压器汽空间喷淋的JDH水流量不低于8Kg/S
C. 硼酸浓度不低于40g/l
D. 降低一回路压力到7.5兆帕
【多选题】
触发CD21(切除相应环路主泵)信号有___
A. 隔离故障蒸汽发生器水侧信号(CD12)
B. SGTR隔离信号(CD13)
C. 一回路热腿温度大于260℃时,误关闭主蒸汽快速隔离阀
D. 一回路热腿温度大于260℃时,单台SG液位低于正常液位0.5m,并且没有两台SG液位低于正常液位0.3m。
【多选题】
发生SGTR启动JDH系统后,JDH泵何时切除___
A. 一回路压力小于7.9MPa
B. SGTR信号消失后,操纵员手动复位
C. JDH泵启动信号存在,但稳压器液位超过9.4m
D. 一回路压力小于7.5MPa
【多选题】
当安全壳一级隔离CB11动作时,动作命令有___
A. 关闭KLD10AA801~804
B. 关闭KLD20AA801~804
C. 关闭KTF40AA801
D. 关闭KTF60AA801,802
【多选题】
下列属于CE11“地震时系统隔离”动作的是___
A. 关闭LBA10-40AA501,101,102
B. 关闭SG排污LCQ15,16AA801,802
C. 关闭一回路下泄阀门KBA11,12AA101,102
D. 关闭所有安全壳隔离阀
【多选题】
触发化学喷淋的信号有___
A. 安全壳内压力和放射性水平分别大于0.129MPa和Max2
B. 不是由于二回路导致的安全壳压力大于0.167MPa
C. 操纵员手动触发
【多选题】
复位化学喷淋的信号有___
A. 安全壳内压力小于0.09MPa
B. 触发化学喷淋信号25min后
C. 操纵员手动触发
【多选题】
CB12动作后,关于信号复位描述正确的包括___
A. 事故信号持续30min后,才能复位2a组
B. 事故触发信号消失后,才能复位2b组
C. 事故触发信号消失后,才能复位2a组
D. 事故信号持续30min后,才能复位2b组
【多选题】
启动BD11保护信号有(与门)___
A. 蒸汽发生器液位低于正常液位0.9m
B. 任一环路热段温度大于150
C. 没有隔离故障蒸汽发生器水侧信号CD12
D. 蒸汽发生器液位低于正常液位0.65m
【多选题】
事故情况下启动辅助给水泵,自动打开的阀门有___
A. LAB10-40AA111
B. LAH30AA101(高加后)
C. LAH31AA101(高加前)
D. LAB10-40AA113
【多选题】
下列蒸汽发生器液位相关逻辑正确的有:___
A. 当汽轮机主汽门打开,蒸汽发生器液位高于设定值 0.15 m,关闭蒸汽发生器液位调节阀门LAB10(20,30,40)AA211、212。
B. 当蒸汽发生器液位高于设定值 0.3 m,关闭液位调节阀门前的截止阀LAB10(20,30,40)AA111、113和隔离阀门LAB10(20,30,40)AA801。
C. 当蒸汽发生器的液位下降到比正常液位高 0.08m 时,重新打开液位调节阀门前的截止阀LAB10(20,30,40)AA111、113和隔离阀门LAB10(20,30,40)AA801。
D. 当一回路任意热段温度大于260℃时,蒸汽发生器液位高于正常液位 0.45m ;或者当出现任意停堆跳堆信号时,汽轮机保护跳闸。
【多选题】
关闭蒸汽发生器排污阀门(BD22)的信号有:___
A. 蒸汽发生器液位低于正常液位300mm;
B. 反应堆功率小于额定功率的30%;
C. 一回路温度大于150℃;
D. 蒸汽发生器排污系统扩容箱液位大于0.62m。
【多选题】
关于BE24保护描述正确的是___
A. 保护中涉及到得阀门是通过硬接线方式与后备盘连接的;
B. 只能在后备盘中操作JEF15AA101,102或KTB20AA103,113,123;
C. OM画面上也能操作JEF15AA101,102或KTB20AA103,113,123;
D. 该保护的目的是紧急情况下给一回路降压;
【多选题】
关于BE25保护描述正确的是___
A. 触发信号是反应堆上部压力大于18.6MPa,且两个热腿冷却剂温度大于278℃。
B. 会启动辅助给水泵
C. 开启LAB10-40AA113/212
D. 切除汽机
【多选题】
DA21信号动作后逻辑顺序如下_________
A. BDA(BDC)电压<2.52KV延时2秒
B. 根据分级启动程序投入用户
C. 当柴油机转速>1000rpm&柴油发电机出口电压>6.3KV时合Q5
D. 断开Q3,Q4并且启动相应通道的机组柴油机
【多选题】
AB22――第二类预保护PP1触发条件_________
A. 工作量程测得的中子通量变化周期小于40s
B. 工作量程测得的中子通量密度超过允许值1.5%
C. 堆芯上部压力大于16.2MPa
D. 单束控制棒落入堆芯(&没有APP信号)
【多选题】
可能引起反应堆功率限制AB24动作的事件有_________
A. 切除主泵
B. 汽轮机主蒸汽阀关闭
C. 失去正常给水
D. 误稀释导致功率上升
【判断题】
BA11动作后会打开JNK10/40AA101/102,防止JNK水箱出现负压现象
A. 对
B. 错
【判断题】
当操纵员从后备盘手动触发BA11功能时,相应通道的KAA并不会自动启动
A. 对
B. 错
【判断题】
手动触发BA11、BA12时,随时均可在后备盘进行复位
A. 对
B. 错
【判断题】
二回路的破口造成安区壳内压力升高不触发BA11
A. 对
B. 错
推荐试题
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用