【单选题】
液态静压轴承在各种相对运动速度下,都具有较高的承载能力,速度变化对油膜的刚度___。
A. 影响小
B. 影响大
C. 无影响
D. 无法确定
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
在体静压轴承在空载时,两相对油腔压力相等,薄膜处于平直状态,轴浮在___。
A. 上边
B. 中间
C. 下边
D. 上边或下边
【单选题】
对于精刮导轨面的要求是:每 25mm×25mm 在 16 点以上,研磨导轨面的粗糙度 Ra 为___。
A. 0.01~0.02μm
B. 0.02~0.04μm
C. 0.04~0.08μm
D. 0.08~0.16μm
【单选题】
多段床身导轨拼装时,对于基准导轨上的同组滑块,应将此顶面及侧面跳动允许控制在___以内。
A. 1~10μm
B. 10~20μm
C. 20~30μm
D. 30~45μm
【单选题】
典型的丝杠装置由螺杆、螺母和___组成。
【单选题】
下列___是高副机构高副形状误差引起的机械振动。
A. 冲床、锻床产生冲击力,使机械设备引起的机械振动
B. 机械设备上外载荷的变化引起的机械振动
C. 内燃机运转不平衡引起的机械振动
D. 凸轮表面误差引起的机械振动
【单选题】
液压系统回油路中背压___时,将会产生液压系统的振动而影响加工工件的精度。
A. 很小
B. 很大
C. 适当
D. 无法确定
【单选题】
在振动检测方法的分类中,按振动信号的转换方式分为电测法机械测振法和___。
A. 接触式
B. 光测法
C. 相对式
D. 惯性式
【单选题】
在消除或减少振动的措施中,采取隔振措施的有:隔离振源和___。
A. 增加阻尼
B. 减小阻尼
C. 隔离响应
D. 扩散阻尼
【单选题】
在轴颈上钻孔时,先将定心工具夹持在钻床主轴上找正 V 型铁的中心并固定,然后把 轴卧放在 V 型铁中,用___按工件端面中心线找正并固定,最后移动钻头就可以钻孔了。
A. 宽座角尺
B. 钢板直尺
C. 刀口尺
D. 水平仪
【单选题】
对于较大的工件且钻孔直径在 10mm 以上时,可用___装夹进行钻孔。
A. 平口钳
B. 压板夹持
C. 三爪卡盘
D. 手虎钳夹持
【单选题】
刮削原始平板时,在正研刮削后还需要进行对角研的刮削,其目的是为了___。
A. 增加接触点数
B. 纠正对角部位的扭曲
C. 使接触点分布均匀
D. 提高对角部位的对称度
【单选题】
在用单条 V 型导轨型面平板来配磨显点刮削 V 型导轨与平面导轨副时,首先通过刮削消除___
A. V 型导轨在垂直面内的不直度
B. V 型导轨在水平面内的不直度
C. 平面导轨对 V 型导轨的不平行度
D. 平面导轨自身的不直度
【单选题】
以下关于光学平直仪用途的叙述,正确的是___。
A. 光学平直仪只能测量 V 型导轨在垂直面内的直线度误差
B. 光学平直仪只能测量 V 型导轨在水平面内的直线度误差
C. 光学平直仪能测量 V 型导轨在垂直面和水平面内的直线度误差
D. 光学平直仪不能测量 V 型导轨在垂直面和水平面内的直线度误差
【单选题】
在刮削大型坐标镗床的立柱时,要求立柱导轨面的直线度达到___ mm/全长。
A. 0.003
B. 0.005
C. 0.007
D. 0.009
【单选题】
牛头刨床的横梁由水平导轨和升降导轨组成,在装配和修理时可通过测量和刮削消除这两组导轨之间的___误差。
A. 倾斜度
B. 垂直度
C. 平行度
D. 对称度
【单选题】
刮削机床底座环形导轨时,可用与它配合的工作台导轨来进行配磨显点,同时要注意导轨的___。
A. 表面粗糙度
B. 尺寸精度
C. 形状精度
D. 位置精度
【单选题】
轴承预紧就是安装时使轴承内部滚动体与内外组圈之间产生一定的___。目的是提高轴承支承的刚度,提高轴的旋转精度,降低轴的振动和噪声。预紧分为轴向预紧和径向预紧。
A. 预拉力和弹性变形
B. 预压力和弹性变形
C. 预压力和塑性变形
D. 预拉力和塑性变形
【单选题】
在轴组的装配中,常在轴两端的支承点上用轴承盖单向固定,分别限制轴组两个方向的轴向移动。为避免轴受热伸长而使轴承卡住,在右端轴承外圈与端盖间应留有 ___间 隙,以便游动。
A. 0.05~0.1mm
B. 0.1~0.2 mm
C. 0.5~1 mm
D. 1~2 mm
【单选题】
造成轴承在工作时发出隆隆声的原因是___。
A. 轴承间隙过小,润滑不良
B. 轴承内有杂物
C. 轴承滚动体或轴承圈破裂
D. 轴承内、外圈槽磨损剥落
【单选题】
对于长期高速运转的转子轴,首先要进行探伤检验,以防在零件的轴颈处出现内伤、裂纹等缺陷,如果转子轴出现裂纹现象,可采取___的方法修复。
【单选题】
当滑动轴承转子轴颈磨损很大,需要恢复的尺寸在0.6mm以上时,可采用___的方法修复。
A. 振动堆焊
B. 镀铬
C. 精车
D. 锉削
【单选题】
修复精密高速设备的床身导轨时,要求床身导轨具有很高的___。
A. 制造精度
B. 工作精度
C. 几何精度
D. 装配精度
【单选题】
高精度、高速设备运动部件刮削目的是使床身导轨达到所要求的___。
A. 装配精度
B. 工作精度
C. 几何精度
D. 安装精度
【单选题】
喷焊前一般碳钢金属基体的预加热温度要在___。
A. 50~100℃
B. 100~200℃
C. 200~300℃
D. 300~500℃
【单选题】
需要在通风、阴凉、干燥处密封保存,保质期是___。
【单选题】
下列对上下水管道阻力表述不正确的是___。
A. 上下水管道的阻力分沿程摩擦阻力和局部阻力
B. 上下水管道的阻力与管壁的粗糙度有关
C. 上下水管道的阻力与管径有关,管径大,阻力小
D. 上下水管道的阻力与水的流速无关
【单选题】
___锉削法是钳工对凸凹模腔精修加工的常用方法。
A. 划线
B. 压印
C. 样板检查
D. 测量
【单选题】
大型机床工件台的爬行现象对工件加工质量影响最大的是___。
A. 尺寸精度
B. 形状精度
C. 表面粗糙度
D. 位置精度
【单选题】
大型机床床身拼装安装完成后,都必须进行检测,如果不符合规定的精度要求,就必须进行___。
A. 调整
B. 修整床身
C. 修整导轨表面
D. 修整垫片
【单选题】
安装龙门刨床的连接梁时,当一端已固定好,需用___测量连接梁另一端与立柱间的间隙尺寸,以便配制垫片。
【单选题】
齿侧间隙检验铅线直径不宜超过最小间隙的___倍。
【单选题】
齿轮每转一周的最大转角误差,影响齿轮___。
A. 传动的平稳性
B. 运动的准确性
C. 承载能力
D. 齿圈径向圆跳动
【单选题】
几个支承点重复限制同一个自由度叫___。
A. 完全定位
B. 不完全定位
C. 过定位
D. 欠定位
【单选题】
41.以过定位方式进行定位,工件夹紧时,工件与定位元件会产生___。
【单选题】
42.工件的精度取决于夹具精度,一般将夹具制造公差定为工件相应尺寸公差的___。
A. 1倍
B. 1/2
C. 1/3~1/5
D. 1/10
【单选题】
43.工件设计基准与定位基准重合时,基准不重合误差等于___。
【单选题】
185.松键连接键的长度方面与轴槽有___mm的间隙。
A. 0.02
B. 0.05
C. 0.2
D. 0.1
【单选题】
平键在轴槽中应保证与槽底紧贴,而键顶面与轮X底应___。
A. 留适当空隙
B. 紧帖
C. 过盈
D. 留较大空隙
【单选题】
紧键连接的工作面是___。
A. 上下面
B. 两侧面
C. 端面
D. 全部面
推荐试题
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header