【单选题】
苯酚对皮肤和衣物都有较强的腐蚀性,其别名叫___。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
破乳剂能够改变水滴表面保护膜的稳定性,提高水滴沉降速度,加速脱水过程,它是一种___。
A. 缓蚀剂
B. 表面活性剂
C. 阻垢剂
D. 抗磨剂
【单选题】
通过三段汽化蒸馏装置可以生产各种燃料和润滑油馏分,该装置不包括___。
A. 预汽化
B. 常压
C. 减压
D. 催化裂化
【单选题】
航空煤油要限制___的含量,且要求不大于20%。
A. 烷烃
B. 环烷烃
C. 芳香烃
D. 烯烃
【单选题】
利用已知浓度的标准溶液与被测物质起作用,根据用去标准溶液的浓度和体积来计算被测物质含量的分析方法称为___。
A. 容量分析
B. 重量分析
C. 滴定分析
D. 仪器分析
【单选题】
水银温度计打破以后,应立即撒上一些___,以减少汞的挥发。
A. 石灰粉
B. 镁粉
C. 硫磺粉
D. 铝粉
【单选题】
汽油馏程的___说明汽油在发动机中蒸发的完全程度。
A. 初馏点
B. 10%馏出温度
C. 50%馏出温度
D. 90%馏出温度
【单选题】
下列物质能溶于过量的浓氨水的是___。
A. BaSO4
B. Mg(OH)2
C. Cu(OH)2
D. Ca(OH)2
【单选题】
液化气铜片腐蚀测定水浴应恒温在___。
A. 25±1℃
B. 40±0.5℃
C. 45±0.5℃
D. 50±1℃
【单选题】
电量法测定液化气总硫含量时,燃烧室温度控制在___℃。
A. 600
B. 750
C. 820
D. 900
【单选题】
电量法测定液化气总硫含量,配制硫含量少于10ug/g的标样时,所有溶剂的含硫量必须小于___ug/g。
A. 0.1
B. 0.2
C. 0.4
D. 0.5
【单选题】
测定液化气总硫是以___为标准物质。
A. 正丁基硫醚
B. 乙硫醇
C. Na2S
D. Na2SO4
【单选题】
液化气总硫含量用___表示。
A. g/m3
B. mg/m3
C. g/L
D. mg/L
【单选题】
当液化气总硫含量大于100毫克/立方米时,重复测定两次结果之差不应大于___。
A. 算术平均值的0.04倍
B. 较小结果的4%
C. 算术平均值的0.1倍
D. 较小结果的10%
【单选题】
测定液化气油渍观察值可选用___作溶剂。
A. 正己烷
B. 30~60℃石油醚_
C. 60~90℃石油醚
D. 乙醚
【单选题】
通常情况下,量筒按其标准容量分为___级。
A. 1、2
B. A、B
C. 1、2、3
D. A、B、C
【单选题】
测定催化剂含碳量时,两次平均结果的差数不应超过___。
A. 0.4%
B. 0.04%
C. 0.5%
D. 0.05%
【单选题】
催化剂孔体积的单位是___。
A. ml/g
B. g/ml
C. g/L
D. L/g
【单选题】
在常温下为气体的物质是___。
A. 甲醛
B. 环已烷
C. 丙酮
D. 溴乙烷
【单选题】
碳原子数相同时,下列烃类辛烷值最高的是___。
A. 正构烷烃
B. 芳香烃
C. 环烷烃
D. 正构烯烃
【单选题】
测定汽油___用以判断发动机燃料在使用时有无形成气阻的倾向。
A. 饱和蒸气压
B. 初馏点
C. 诱导期
D. 硫含量
【单选题】
碳原子数相同的下列烃类___十六烷值最高。
A. 正构烷烃
B. 异构烷烃
C. 正构烯烃
D. 异构烯烃
【单选题】
GB252-2000规定轻柴油灰分不应大于___。
A. 0.05%
B. 0.25%
C. 0.005%
D. 0.01%
【单选题】
高速柴油机使用的柴油在20℃时的运动粘度不能大于___厘斯。
【单选题】
对浅色石油产品的苯胺点测定,同一操作者重复测定两个结果之差不应大于___℃。
A. 0.1
B. 0.2
C. 0.3
D. 0.4
【单选题】
在深色石油产品苯胺点测定中,同一操作者重复测定两个结果之差不应大于___℃。
A. 0.1
B. 0.2
C. 0.3
D. 0.4
【单选题】
向紫色石蕊试液中加入过量的Na2O2粉末,充分震荡___。
A. 溶液仍为紫色
B. 溶液最后变为蓝色
C. 最后溶液颜色褪去
D. 整个过程中无气泡产生
【单选题】
为提纯FeCl2,从其酸性溶液中除去FeCl3,可采用的试剂为___。
A. 通入过量Cl2气
B. 通入过量H2S气体
C. 加入Cu屑
D. 加入NaOH溶液
【单选题】
某一溶液中存在大量的碳酸根离子,以下叙述中错误的是___。
A. 加入BaCl2溶液,产生白色沉淀
B. 滴入稀盐酸,有无色无味气体产生
C. 加入酸后产生的气体不能使石灰水变浑浊
D. 加入Ba(OH)2后,产生沉淀
【单选题】
用氢氧化钠处理过的Al条,浸入Hg(NO3)2片刻后,取出置于空气中,会长出“白毛”,“白毛”成分主要是___。
A. HgO
B. Al2O3
C. Al(OH)3
D. Al
【单选题】
在测定油品的运动粘度时,应根据试验的温度选用适当的粘度计,应使试样的流动时间不少于___秒。
A. 120
B. 180
C. 200
D. 350
【单选题】
用燃灯法测定油品的硫含量,当样品中硫含量少于0.1%时,重复测定两个结果间的差数不应超过___。
A. 0.003%
B. 0.006%
C. 0.008%
D. 0.01%
【单选题】
不能用“水封”防挥发的是___。
A. CS2
B. Br2
C. Hg
D. C2H5OH
【单选题】
下列不是通常所用的条件粘度的是___。
A. 恩氏粘度
B. 赛氏粘度
C. 震氏粘度
D. 雷氏粘度
【单选题】
当燃料十六烷值大于56时,由不同操作者,在不同试验室,同型装置上,对此同一试样进行测定,所得两个试验结果的差值不应超过___。
A. 2.6
B. 2.9
C. 3.3
D. 3.1
【单选题】
减压馏程蒸馏到终馏点停止加热,取下保温罩,待温度计自然冷却到___℃以下,再缓慢放空。
A. 50
B. 100
C. 150
D. 200
【单选题】
石油产品色度测定中,同一试验室同一操作者重复测定两个结果之间的差值不应大于___个色号。
【单选题】
卡尔·费休试剂的组成是___。
A. I2、SO2、吡啶、CH3OH
B. Br2、SO2、吡啶、CH3OH
C. I2、SO2、吡啶、C2H5OH
D. Br2、SO2、吡啶、C2H5OH
【单选题】
国标规定液化石油气的总硫含量不大于___毫克/立方米。
A. 343
B. 434
C. 340
D. 430
【单选题】
国标要求测定液化石油气组分C5及C5以上含量不大于___%。
A. 2.0
B. 2.5
C. 3.0
D. 3.5
推荐试题
【填空题】
44.中央军委下属机关有___个部<厅>、___个委员会、___个直属机构。
【填空题】
46.天基武器系统主要指攻击对方航天器用的卫星和卫星平台,包括 ___ 、 ___和___ 等。
【填空题】
47.中国人民解放军海军成立于___年。
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks