刷题
导入试题
【单选题】
南京地铁通信用UPS是( )。
A. 后备式(OFF LINE)
B. 在线式(ON LINE)
C. 在线互动式(LINE INTERACTIVE)
D. 以上都不是
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
请挑出下面关于开关电源的说法正确的一句( )。
A. 开关电源可以达到的输出电压范围非常广,可以从几伏到几百伏
B. 一台成品开关电源的工作频率是固定的
C. 开关电源不需要变压器
D. 开关电源的输入只能是交流电
【单选题】
请问下面哪个级别的用户能够对南京地铁一号线通信电源屏网管数据进行修改( )。
A. 管理员
B. 值班员
C. 巡检员
D. 访客
【单选题】
如果用万用表测得二极管的阻值很小或为0,则表示该二极管 ( )。
A. 内部短路
B. 内部断路
C. 性能差
D. 正常
【单选题】
一般电气设备上常标有L、N字样,N代表的含义是( )。
A. 火线
B. 地线
C. 零线
D. 保护地线
【单选题】
以下不是一号线交流电源屏交流切换单元的基本功能是( )。
A. 检测两路交流电压,将数据传送给主监控装置。
B. 采集两路接触器的状态,将数据传送给主监控装置。
C. 根据采集的电压信息(正常、故障)和主监控的设置参数信息实现切换。
D. 检测两路交流电流,将数据传送给主监控装置
【单选题】
一般电气设备上常标有L、N字样,L代表的含义是( )。
A. 火线
B. 地线
C. 零线
D. 保护地线
【单选题】
UPS输入为交流三相五线制380V,波动范围为( )。
A. 10%-15%
B. 5%-15%
C. 15%-15%
D. 10%-10%
【单选题】
UPS逆变器故障时,UPS将转为( )。
A. 蓄电池供电
B. 静态旁路供电
C. 手动旁路供电
D. 停止供电
【单选题】
一号线OCC网管高屏开关电源有( )块整流模块
A. 3
B. 4
C. 5
D. 6
【单选题】
一号线交流配电屏正常运行时,自动/手动转换开关应置于( )。
A. 自动
B. 手动
C. 强制一路
D. 强制二路
【单选题】
一号线通信交流屏每屏共有( )只数显电压表。
A. 1
B. 2
C. 3
D. 4
【单选题】
一号线通信交流屏每屏共有( )只数显电流表。
A. 1
B. 2
C. 3
D. 4
【单选题】
通信机房接地,联合地阻应不大于( )Ω。
A. 1
B. 5
C. 10
D. 20
【单选题】
我国交流电的频率是( )Hz。
A. 0
B. 50
C. 60
D. 100
【单选题】
无功功率的单位是( )。
A. W
B. var
C. kW•h
D. kvar•h
【单选题】
人体承受的感应电压所造成的触电叫( )触电。
A. 直接
B. 接触电压
C. 感应电压
D. 剩余电荷
【单选题】
在保护接零系统中,零线导电能力不得低于相线的( )。
A. 0.25
B. 0.333333333
C. 0.5
D. 1
【单选题】
带电装卸熔断器时,应站在( )上。
A. 绝缘垫
B. 水泥地板
C. 木板
D. 钢板
【单选题】
设备发生火灾时,要立即( )。
A. 进行灭火
B. 通知上级
C. 断开蓄电池
D. 切断电源
【单选题】
直流电的频率是( )Hz。
A. 0
B. 50
C. 60
D. 100
【单选题】
一号线每台南瑞交流配电屏具有( )块时间继电器。
A. 1
B. 2
C. 3
D. 4
【单选题】
电气设备金属外壳保护接地线,接地干线可按相应电源相线截面积的( )选用。
A. 0.5
B. 0.333333333
C. 0.25
D. 0.2
【单选题】
交流接触器是一种广泛使用的开关电器,在正常条件下可以用来实现远距离控制和频繁( )主电路。
A. 接通
B. 断开
C. 连接
D. 接通和断开
【单选题】
低压断路器的脱扣器其中电磁脱扣器又称短路脱扣器或瞬时过流脱扣器,起( )保护作用。
A. 欠压
B. 失压
C. 过载
D. 短路
【单选题】
为保证电气设备能可靠地运行,将电力系统中的变压器低压侧中性点接地,称为( )。
A. 保护接地
B. 重复接地
C. 工作接地
D. 防雷接地
【单选题】
电子式时间继电器是通过电子线路控制电容器充放电的 原理制成的。它的特点是体积小,延时范围可达( )。
A. 1-300s
B. 1-600s
C. 0.1-360s
D. 0.1-3600s
【单选题】
保护接零的作用是,当单相短路时,使电路中的保护装置(如熔断器、漏电保护器等)迅速动作,将( )切断,确保人身安全。
A. 电源
B. 零线
C. 地线
D. 保护线
【单选题】
( )话务量的单位叫:“爱尔兰”(Erlang)或“小时呼”。
A. 话务量只和用户呼叫次数有关
B. 话务量只和占用时间有关
C. 话务量既和用户呼叫次数有关,又和每次呼叫的占用时间有关
D. 话务量既和用户呼叫次数无关,又和每次呼叫的占用时间无关
【单选题】
NO.7信令系统是( )的公共信道信令系统,能满足呼叫控制、遥控、管理和维护等信令传递要求的电信网,并能在各种业务网中作多方面的应用。
A. 国际标准化
B. 中国标准化
C. 邮电标准化
D. 通信标准化
【单选题】
阿尔卡特模拟话机立即转移功能代码为( )。
A. *64
B. *60
C. *68
D. *69
【单选题】
创建外网号时显示的First Internal Number与First External Number分别表示( )。
A. 外线号码与内线号码
B. 内线号码与外线号码
C. 内线号码与设置范围
D. 外线号码与设置范围
【单选题】
公务电话查一个板子上各端口状态应使用命令( )。
A. bascul
B. listerm
C. swinst
D. mgr
【单选题】
关于以太网防环机制描述正确的是( )。
A. 是三层网络的需要,没有防环机制则无法实现路由选择
B. 有效的提高网络可用性和带宽利用率
C. 集线器(HUB)也具有防环机制
D. 可以为用户提供透明的接入方式
【单选题】
交换系统的服务质量指标可由下列那些指标来衡量( )。
A. 话务量,话音响度
B. 呼损指标,接续时延
C. 话音响度,通话时长
D. 话音清晰度,杂音
【单选题】
局间信令按技术或传送方式又可分为随路信令和( )两种方式。
A. 地址信令
B. 公共信道信令
C. 线路信令
D. 记发器信令
【单选题】
模拟话音信号数字化通过( )过程实现。
A. 量化 取样 编码
B. 编码 取样 量化
C. 取样 量化 编码
D. 取样 编码 量化
【单选题】
评价一台交换机性能如何,除了话务量这一质量指标以外,还有一个重要指标就是控制部件的( )。
A. 呼叫处理能力
B. 接续能力
C. 交换能力
D. 通信能力
【单选题】
全互连的组网方式带来的优势是( )。
A. 经济成本降低
B. 更多的路由选择,更强的物理线路容错性
C. 物路线路上相对均衡的衰减
D. 更为简单的组网
【单选题】
市话电缆的色谱为:大组:( )
A. 白、橙、黑、绿、灰
B. 蓝、橙、绿、综、灰
C. 白、红、黑、黄、紫
D. 白、绿、黑、黄、紫
【单选题】
信令是各交换局在完成( )的一种通信语言。
A. 呼叫接续中
B. 通话
C. 全过程
D. 呼叫结束时
推荐试题
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用