相关试题
【多选题】
数控设备运行的方式有___
A. Auto
B. JOG
C. MDA
D. HND
【多选题】
产品质量是由各种要素所组成的,这些要素亦被称为产品所具有的特征和特性,通常包括___
A. 产品的使用性能
B. 产品的安全性
C. 产品的可靠性
D. 产品的可维修性
【多选题】
质量三不原则是指___
A. 不产生不合格
B. 不产生报废品
C. 不接收不合格
D. 不传递不合格
【多选题】
家用汽车产品销售时应当具有下列随车文件:___
A. 中文的产品合格证或相关证明
B. 产品使用说明书
C. 三包凭证
D. 维修保养手册
【多选题】
对不合格品可以采取纠正的方式进行处置,下列_______不属于纠正___
【多选题】
生产操作岗位上应具备的工艺、质量文件是___
A. 工序卡
B. 检验作业指导书
C. 设备操作规程
D. TPM检查表
【多选题】
进货检验的控制方式包括___
A. 每批检验
B. 验证
C. 免检
D. 二次检验
【多选题】
导致tulip防尘盖压装后有毛刺的原因___
A. TULIP防尘盖处的倒角太大
B. 过盈配合量太大
C. 表面的粗糙度
D. 未放置平整
【多选题】
产品责任用于描述生产者或他方对因产品造成的与人员伤害,财产损坏或其它损害有关的损失赔偿责任的通用术语。___
A. 产品责任贯彻责任倒置原则
B. 存档文件和资料必须采用碳素墨水笔或黑色签字笔记录
C. 每12个月至少审核一次
D. 相关文件、资料和记录至少保存15年
【多选题】
防错验证的目的___
A. 确保防错/错误探测装置正常工作
B. 防止制造中传递不合格品
C. 为每台防错装置建立历史档案以指示何时需要对其进行预防性维护或维修
D. 在整个过程中对使用防错装置过程中培养良好的行为规范
【多选题】
圆柱度公差可以同时控制___
A. 圆度
B. 素线直线度
C. 径向全跳动
D. 同轴度
【多选题】
游标卡尺测量误差产生的原因以下正确的有___
A. 零点漂移
B. 量爪磨损
C. 测量力太大
D. 卡尺摆放倾斜
【多选题】
外径千分尺测量误差产生的原因以下正确的有___
A. 零点漂移
B. 测杆摆放不当
C. 棘轮有适当的测量力
D. 视差
【多选题】
测量设备和测量方法的选用原则一般应考虑下述方面___
A. 测量精度
B. 测量效率
C. 测量设备的量程
D. 测量成本
【多选题】
FMEA用于的时机包含___
A. 产品/过程出现失效时
B. 新产品/过程设计时
C. 产品/过程修改时
D. 顾客提出抱怨投诉时
【多选题】
对于特殊特性的管理,应___
A. 使用SPC进行监控
B. 与顾客规定的定义和符号相符合
C. 在控制计划、FMEA及作业指导书中进行标注
D. 包括在控制计划中
【多选题】
不合格品控制,关键要点是及时:___
A. 记录和标识
B. 隔离
C. 评审
D. 处置
【多选题】
下列数据_______是计量数据___
A. 工时利用率
B. 开箱合格率
C. 轴长
D. 一个总成上有2个外观缺陷
【多选题】
下列特性中,属于软件质量特性的有___
A. 可靠性
B. 保证性
C. 可维护性
D. 易使用性
【多选题】
在批量生产阶段,企业可以采用 等方法对供应商进行质量控制。___
A. 监控供应商的过程能力指数和过程性能指数
B. 监控供应商的测量系统
C. 评价供应商生产能力
D. 进货质量检验
【多选题】
记录控制的主要目的是为了___
A. 提供证据
B. 实现“可追溯性”
C. 易于识别和检索
D. 控制记录的版本
【多选题】
在Xbar-R图中,_______被判定为异常情况___
A. 1界外----点子出界
B. 7单侧---连续7点落在中心线同一侧
C. 6连串---连续6点递增或递减
D. 12交替---连续12点相邻点上下交替
【多选题】
探伤道序中,________对探伤的有效性有影响。___
A. 探伤液浓度
B. 电流强度
C. 紫外线强度
D. 喷淋的范围
【多选题】
三销轴叉花键有效长度短会引起以下哪些问题___
A. 移动节(变速箱端)脱落
B. 传动轴固定节端异响
C. 传动轴移动节端无法装配到位
D. 移动节三销轴叉花键断裂
【多选题】
换产品生产时,外星轮回火后硬度偏高,可采取以下哪些措施调整再确认___
A. 提高回火温度
B. 降低回火温度
C. 增加回火时间
D. 重新首件检验
【多选题】
以下关于“纠正”和“纠正措施”的理解正确的是___
A. 纠正措施是为消除已发现的不合格或其它不期望情况的原因所采取的措施
B. 纠正是为消除已发现的不合格所采取的措施
C. 纠正是为消除已发生的不合格并就其产生的原因所采取的措施
D. 纠正和纠正措施是有区别的
【多选题】
以下关于预防措施的理解正确的是:___
A. 为消除潜在不合格或其它潜在不期望情况的原因所采取的措施
B. 采取预防措施是为了防止再发生
C. 采取预防措施是为了防止发生
D. 预防措施和纠正措施没有区别
【多选题】
和管理评审都是组织建立自我评价、促进自我改进机制的手段。___
A. 分层审核
B. 第二方审核
C. 多方审核
D. 内部审核
【多选题】
质量管理体系要求所有从事影响产品质量工作的人员应有能力胜任所在岗位的工作,这种能力是基于适当的___
【多选题】
关于“内部审核”,下列说法正确的是___
A. 内部审核是组织自我评价、促进自我改进的一个重要手段
B. 内部审核程序应该形成文件
C. 内部审核程序应包括审核的策划、实施、结果报告和记录
D. 组织可随意实施内部审核
【多选题】
“PDCA”也叫做“戴明环”,它循环的特点是___
A. 不断提高的循环
B. 大环套小环
C. 小环分离大环
D. 四个阶段缺一不可
【多选题】
变化点管理项目中的“方法变更”包括以下哪些项目___
A. 作业标准变更
B. 加工工序变更
C. 设备维修变更
D. 工具变更
【多选题】
PPAP是指生产零件的批准程序,下列何状态变化需要向主机厂用户重新提交并认可___
A. 产品设计发生变化
B. 加工工艺发生变化
C. 生产场地发生变化
D. 分供方发生变化
【多选题】
PPAP过程流程图中顾客的要求主要包括 ,供方需要向顾客提交的PPAP批准中得到体现。___
A. 顾客的采购订单/特殊要求
B. 顾客零件设计要求
C. 顾客过程设计要求
D. 顾客的规范和顾客物流要求
【多选题】
关于生产件样品与标准样件的说法正确的是___
A. 生产件样品和标准样件均是在PPAP有效的生产条件下生产的
B. 标准样件取自于生产件样品
C. 标准样件是从全尺寸检测件中抽取的一件样件
D. 标准样件与生产件样品是同一件,只是说法不一而已
【多选题】
对于标准样件的要求有___
A. 与生产件批准的记录保存相同的时间
B. 在标准样品上必须作出标识,标出顾客批准的日期
C. 必须得到顾客书面批准,才能改变或放弃对标准样品的保留要求
D. 直到生产出一个用于顾客批准,而且是相同顾客零件编号的新的标准样件为止
【多选题】
标准样件的作用是___
A. 帮助确定生产标准
B. 特别用于数据含糊的情况,或缺乏充分的细节来完全再现初始批准状态下的零件时
C. 在设计记录、控制计划或检验准则要求的地方,存放标准样件,作为参考或标准
D. 以上均不是
【多选题】
PPAP担保书中零件的重量(质量)的理解是___
A. 要发运的零件重量
B. 除非另有规定,否则以千克为单位,小数点后保留4位
C. ,零件重量不包括运输时的保护装置、包装材料和装配辅具
D. 随机选取10件的平均值重量
【多选题】
对顾客的PPAP批准状态的理解正确的是___
A. 批准、临时批准和拒收三种状态
B. 批准、拒绝二种状态
C. 临时批准是在有限时间、有限数量内交付生产需要的零件,要达到批准状态,需要再次提交PPAP
D. ,拒收是不符合顾客要求,零件不能交运。必须得到纠正,得到顾客的批准
【多选题】
关于控制计划的理解正确的是___
A. 零件和过程控制系统的书面描述,不同的控制计划覆盖三个不同的阶段
B. 样件:在样件制造过程中,对尺寸测量,材料和性能测试的描述
C. 试生产:在样件之后,批量生产之前,对尺寸测量,材料和性能测试的描述
D. 大量生产过程中,对产品/过程特性,过程控制,测试,测量系统的综合描述
推荐试题
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive