相关试题
【判断题】
无损检测技术,是指在破坏或改变被测物体前提下,利用物质因存在缺陷而使其某一物理性能发生变化的,完成对该物体的检测与评价的技术手段的总称
【判断题】
对齿轮齿部进行表面硬化处理是为了提高齿部表面的硬度和耐磨性
【判断题】
在布置链传动时,一般应使两轮中心联线水平布置,使紧边在上,松边在下
【判断题】
随机误差的产生原因多无法一一查明,但可以控制
【判断题】
TE2710 型 A、B 胶是一种特种环氧胶,最适合用于粘接铜、不锈钢工件,加温 固化迅速,温度越高固化速度越快,300℃时,可几十秒钟固化,25℃时,8 个小时固化
【判断题】
当采用刮研工艺修复多瓦式动压轴承的轴瓦时,可用主轴轴颈作为研具精刮轴瓦内表面
【判断题】
声级计分为普通声级计和精密声级计,普通声级计频率范围为20~8 000Hz,固有误差为±1.5Db,精密声级计频率范围,20~12 500Hz,固有误差为±0.7HZ
【判断题】
常用的光学平直仪的最大测量工作距离为5—6 米
【判断题】
选题原则“先难后易”,注重在现场和岗位上解决的课题,选的课题过大,久攻不克,会挫伤小组成员和积极性
【判断题】
启动进给箱电动机,应用纵向、横向及升级进给逐级运转试验及快速移动试验,各进给量的运转时间不少于2min,在最低进给量运转稳定温度时,各轴承温度不应超过50°C
【判断题】
电焊机外客必须有良好的接地线,焊工的手或身体可以触及导电体,对于具有较高空载电压的焊机,以及在潮湿地点操作时,(应铺设橡胶绝缘垫),将焊机垫平
【判断题】
对齿轮齿部进行表面硬化处理是为了提高齿部表面的硬度和耐磨性,其常用的表面硬化方法有高频淬火、表面镀铬、表面渗碳等
【判断题】
在电火花成型加工中,电极与工件有时接触有时不接触
【判断题】
一般应成立一个由领导、工程技术人员和专家学者组成的评委会负责成果的评估,小组内部的成果发表会,可由组长主持,并做好记录,由组员进行交流评价
【判断题】
当所有增环都为最小极限尺寸,而减环都为最大极限尺寸时,则封闭环必为最大极限尺寸
【判断题】
传动链误差主要来源于传动元件的加工精度及安装精度
【判断题】
提出活动课题,技术人员主要是为生产服务的,活动课题一般围绕提高产品质量,保证设备正常运转而提出
【判断题】
齿轮泵的吸油腔就是轮齿逐渐啮合的那个腔
【判断题】
当淬硬镶钢滚动导轨表面只发生磨损时,通常用修刮的方法修复其表面
【判断题】
如果反光镜的平面与物镜光轴垂直,返回到分划板的“十字像”即重合,则证明导轨没有误差
【判断题】
系统的无阻尼固有频率只与系统的质量和刚度有关,与系统受到的激励无关
【判断题】
声音是由物体的振动动而产生的,不论是什么状态的物体在周期性位置变化时都可以发声,振动的固体,液体或气体称为声源,一般工厂发声的机械设备都称为噪声源
【判断题】
开关通常是指用手来操纵,时电路进行接通或断开的一种控制电器
【判断题】
曲柄摇杆机械中,只要存在极位夹角θ,机构就具有急回特性
【判断题】
减小电枢电压的超动是在是机起动时人为的将加在电机电枢两端的电压降低
【判断题】
合像水平仪由于水准器的位置不可调整所以测量精度高,读数准确量程大
【判断题】
在内容方面,职业道德总是要鲜明地表达职业义务、职业责任以及企业文化上的道德准则
【判断题】
检查高速机械转子弯曲值时,时域波形为余弦波时,将会发生转子弯曲
【判断题】
测量两圆弧型面交点尺寸时,可以通过塞尺直接测量
【判断题】
在修复大、小齿轮时,如果出现断齿现象,小齿轮可以更换,大齿轮则可以采用金属喷涂的方法修复
【判断题】
正确选择量、检具,在选择量具时必须考虑测量精确度,因为测量误差一般只允许占被检查项目公差的10%~25%
【判断题】
转子上的同轴度误差以及垂直度误差,均可在转子安装在轴承上以后进行调整
【判断题】
机床导轨表面电接触加热自冷淬火是利用中频感应炉来加热导轨表面以达到局部淬火目的
【判断题】
磨床液压系统进入空气,不仅会造成工作台运动时出现爬行,还会产生噪声
【判断题】
水平仪垫铁90°角两面可与被测导轨配刮,并与顶面保持平行度公差为0.1mm
【判断题】
滚动导轨的横向调平后,床身导轨平行度的检测方法是水平仪沿 X 轴方向放在溜板上
【判断题】
选用 M1、M2 较大的传感器,使两个栅距微位移内的加速度变化较小,以减小测量误差
推荐试题
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
【单选题】
以下关于数据处理的叙述中,不正确的足___。
A. :数据处理不仅能预测不久的未来,自时还能影响未
B. :数据处理和数据分析可以为决策提供真知灼见
C. :数据处理的重点应从技术角度去发现和解释数据蕴涵的意义
D. :数据处理足从现实世界到数据,冉从数据到现实世界的过程