【判断题】
在高精度滑动轴承组的装配工艺要点中,检验轴套时,是沿孔长方向取两、三处,作相互平行方向上的检验
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
能控制生产机械运动行程和位置的方法称为位置控制
【判断题】
激光具有能量集中,方向性和相干性好等优点。因此,超长导轨的直线度,常采用激光准直仪进行测量
【判断题】
机械设备二级保养,设备维修人员为主,设备操作人员参加的对设备的定期大修,称为机械设备二级保养
【判断题】
三坐标测量机是利用点位测量原理工作的,机借助测量机采集零件表面上一系列有意义的空间点,然后通过数字处理,求得这些点组成的特定几何元素的位置及其范围
【判断题】
液压泵在吸油过程中,必须保证油箱与大气接通
【判断题】
调整Y225 型铣齿机床鞍镶条时,如果调整太松,会加快导轨面磨损,同时还会引起爬行和振动
【判断题】
精密环形圆导轨在加工时,外圆采用磨削,内孔珩磨可达精密的配合
【判断题】
垫铁的长度常为200 250 500 三种
【单选题】
甲烷化反应器R-301下游设有分离罐的目的是___
A. 脱除反应生成的全部水分
B. 脱除反应生成的大部分水
C. 脱除氢气中的重烃
D. 脱除反应中生成的油分
【单选题】
分离系统开车前,应具备的条件不包括___
A. 公用工程准备就绪
B. 甲醇注入系统氮气置换合格
C. 各连锁系统已经投用
D. 丙烯制冷压缩机已开车
【单选题】
关于装置吹扫的操作,下列说法正确的是___
A. 调节阀可以控制吹扫气源
B. 吹扫时候,调节阀要换成短接
C. 调节阀的旁路不需要吹扫
D. 止逆阀可以顺着气流吹扫
【单选题】
关于装置氮气置换,下列说法不正确的是___
A. 氮气置换现场排放时候,要注意防止窒息
B. 一个取样口氮气置换合格即可
C. 旁路管线一定要氮气置换
D. 设备低点的倒淋都要打开
【单选题】
裂解气深冷分离过程中的主要方法是___
A. 精馏法
B. 吸附法
C. 萃取法
D. 特殊精馏法
【单选题】
分子筛是在___状态下再生的
A. 高压低温
B. 高压高温
C. 低压低温
D. 低压高温
【单选题】
分离系统开车前,要确认的项目不包括___
A. 所有公用工程已经准备就绪
B. 系统完全氮封
C. 甲醇注入系统已经准备就绪
D. 所有控制阀和旁通阀打开
【单选题】
关于干燥剂的装填,下列说法正确的是___
A. 干燥剂的装填应保证没有水进入
B. 装填前对罐内氧含量没有要求
C. 装填时,不需要人员监护
D. 下部不需要格栅固定
【单选题】
关于裂解气中一氧化碳的危害,下列说法正确的是___
A. 影响冷箱操作
B. 会使冷箱冻堵
C. 会造成甲烷化反应器飞温
D. 影响脱甲烷塔操作
【单选题】
丙烯精馏塔开工过程中,停接丙烯应该在___
A. 塔釜出现液位之后
B. 回流罐液位达到80%
C. 塔顶建立回流之后
D. 全回流运转正常后
【单选题】
关于绿油的产生,下列说法正确的是___
A. 反应器运行初期绿油生成量大
B. 反应器运行末期绿油生成量大
C. 氢炔比小绿油生成量小
D. 床层温度低,绿油生成量大
【单选题】
当冷却水系统波动时候,分离首先表现出来的现象是___
A. 热区精馏塔塔压波动
B. 冷区精馏塔塔压波动
C. 热区精馏塔塔顶温度波动
D. 冷区精馏塔顶温波动
【单选题】
膨胀机在升速过程中,要尽快通过___
A. 临界转速
B. 低速止点
C. 高速止点
D. 1000转
【单选题】
热区正常停车的时候,碳三加氢反应器R-401最初的处理___
A. 切断氢气
B. 切断进料
C. 反应器走旁路
D. 切断氢气和进料
【单选题】
装置正常运行的时候,关于物料排放火炬,下列说法正确的是___
A. 操作员可以随意将物料排至火炬
B. 工艺空气可以排放到火炬
C. 排放低温物料时候速度不能太快
D. 重烃可以排放到火炬
【单选题】
碳二加氢反应器R-201开车时候,为了减少乙烯损失,控制最为关键的参数是___
A. 反应温度
B. 反应压力
C. 炔烃比
D. CO含量
【单选题】
冷箱PC-301壳体充氮气的目的是为了防止___进入
A. 湿空气
B. 氮气
C. 一氧化碳
D. 二氧化碳
【单选题】
碳二加氢反应器R-201飞温不会造成___
A. 催化剂晶格破坏
B. 反应器受损
C. 乙烯放火炬
D. 反应空速提高
【单选题】
可能造成丙烯精馏塔T-406、T-407塔顶温度过高的原因是___
A. 塔压低
B. 回流比过大
C. 采出比过大
D. 加热量过小
【单选题】
下列选项中,能使得碳二加氢催化剂永久性中毒的是___
A. 一氧化碳
B. 二氧化碳
C. 硫化氢
D. 粗氢
【单选题】
脱丁烷塔T-405混合碳四产品不合格,碳三含量偏高的原因是___
A. 脱丁烷塔T-405回流量偏低
B. 脱丁烷塔T-405釜加热量偏高
C. 脱丁烷塔T-405进料量过大
D. 低压脱丙烷塔灵敏板温度设定偏低
【单选题】
装置冷却水故障,分离系统作全面紧急停车处理,下列处理正确的是___
A. 乙烯精馏塔全回流操作
B. 碳二加氢反应器保温保压
C. 冷箱泄压
D. 各塔停止加热,塔压由放火炬控制
【单选题】
碳二加氢反应器R-201紧急停车的处理原则是___
A. 乙烯精馏塔不被乙炔污染
B. 乙烯精馏塔停车
C. 脱乙烷塔T-401停车
D. 冷区全线停车
【单选题】
碳二加氢反应器R-201分为三段加氢,其目的之一为___
A. 提高反应选择性
B. 降低反应选择性
C. 提高反应活性
D. 降低反应活性
【单选题】
在裂解气分离中,分离温度最低,冷量消耗最大,乙烯损失最高的地方是___。
A. 乙烯精馏塔
B. 脱甲烷塔
C. 脱乙烷塔T-401
D. 冷箱
【单选题】
工业上常用___表示含水气体中的水含量。
A. 百分比
B. 密度
C. 摩尔比
D. 露点
【单选题】
某蒸馏塔压差增大,回流罐液位高,塔釜液位低,该塔现象属___。
【单选题】
乙烯装置工艺空气的温度通常是___
A. 0℃
B. 常温
C. 10℃
D. 60℃
【单选题】
冷箱开车时,其露点必须___。
A. <-70℃
B. <-65℃
C. <-45℃
D. <-40℃
【单选题】
装置干燥最终所达到的露点取决于___
A. 干燥气体的种类
B. 干燥气体的露点
C. 干燥时间的长短
D. 干燥气体的密度
推荐试题
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen