刷题
导入试题
【填空题】
52、JZ-7型空气制动机分配阀紧急制动位时,副阀部的作用是:副阀是制动位,保持阀使降压风缸压力保持为280-340kPa以提高机车与车辆缓解的一致性,其他各阀与___位相同。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
常用制动
解析
暂无解析
相关试题
【填空题】
53、JZ-7型空气制动机自阀运转位,单阀制动区时,总风缸向单独作用管充气,使___呈制动位。
【填空题】
54、JZ-7型空气制动机,当工作风缸压力降压与制动管压力相同后,工作风缸与制动管压力仍继续同时下降为工作风缸___。
【填空题】
55、JZ-7型空气制动机自阀重联柱塞阀,当自阀手柄在取柄位时,柱塞右移,沟通自锁→中均管4的通路,使中继阀___ 。
【填空题】
56、常用限压阀的限制压力为___ ,紧急限压阀的限制压力为450kPa。___
【填空题】
57、中继阀管座上有列车管,总风缸管,中均管,过充管,___共五根管。
【填空题】
58、JZ-7型制动机单阀有单独缓解位,运转位,___三个作用位置。
【填空题】
59、JZ-7型制动机自阀管座上有均衡风缸管、列车管、总风缸管、中均管、撒砂管、___ 、遮断伐管、单独缓解管、单独作用管共九根管。
【填空题】
60、制动装置由制动机、___和手制动机三部分组成。
【填空题】
61、更换闸瓦时,应关闭该组制动缸塞门,使其它组___,以保安全。
【填空题】
62、当空气压缩机停止工作时,止回阀可防止总风缸的压缩空气向___逆流,以减少压缩空气的泄漏。
【填空题】
63、分配阀紧急部主要由膜板活塞、柱塞杆、放风阀、放风弹簧及三个___等组成。
【填空题】
64、JZ-7型制动机由___、制动机及其辅助装置两大部分组成。
【填空题】
65、运行中冷却装置发生周期性“喀冬喀冬”声时为液压马达___破损。
【填空题】
66、运用中对轮对检查的技术要求中规定:轮箍踏面磨耗深度不超过7mm,使用报废限度为___mm。
【填空题】
67、内燃机车车体钢结构按承载方式,一般可分为承载车体和___。
【填空题】
68、DF4B型内燃机车柴油机活塞到达下止点前___的角度时,排气阀开。
【填空题】
69、机车在运行中油水温度不得超过___ ℃。
【填空题】
70、活塞环与环槽间隙过小时,活塞与活塞环受热膨胀后易将活塞环___在槽内,使其失去弹性和工作能力。
【填空题】
71、增、减载针阀开度过大,会使柴油机有载时大幅度___。
【填空题】
72、联合调节器在补偿活塞上方压力油通路上,设有___针阀,它控制联合调节器反馈系统的工作性能,使转速调节过程更趋于稳定。
【填空题】
73、在回手柄减负荷的过程中,柴油机有“飞车”迹象时,应将主手柄___,千万不要卸掉负荷。
【填空题】
74、燃油系统的功用是保证定量、定质、___地向气缸内供给燃油。
【填空题】
75、机车运行中,柴油机油水温度应保持在___℃之间。
【填空题】
76、无级调速装置的组成为新型司机控制器、___和传动装置。
【填空题】
77、无级调速机车主手柄提升位,5、6、7、8号触头___,柴油机转速上升。
【填空题】
78、当DLS线圈通电后,动铁芯被电磁吸力吸向静铁芯并带动尾杆下移,针阀关闭___,柴油机才能正常启动。
【填空题】
79、闭合5K,辅助发电机电压显示110V,蓄电池充电电流表显示放电的原因是启动接触器QC犯卡、烧结,不能___ 。
【填空题】
80、当控制电路发生正、负两点同时接地时,将引起保险、导线、___烧损。
【填空题】
81、东风4B型机车电阻制动在柴油机-发电机组的转速一定时,制动电流不随___的变化而变化。
【填空题】
82、如因牵引发电机本身故障造成发电机不发电的原因,一般是极间连线或引出线焊接脱焊,紧固不牢或折断等;励磁线圈在正负两端处短路或___;电枢线圈断线等。
【填空题】
83、启动柴油机时,按下1QA,___线圈和1SJ得电,QBC主触头接通QBD电路,启动机油泵投入工作。
【填空题】
84、当启动发电机电压升至127V时或充电电流大于100A时,___动作,自动转入固定发电。
【填空题】
85、QBC线圈得电动作后,其主触头闭合,接通启动机油泵电动机电源,启动机油泵向___充油。
【填空题】
86、启动发电机做为发电机时分为___ 和固定发电两种工况。
【填空题】
87、列车制动机为一次缓解型时,牵引时JZ-7型空气制动机双端的客货车转换手柄必须置于___。
【填空题】
88、JZ-7型空气制动机非操纵端自阀手柄误放运转位时,当操纵端自阀施行制动时,均衡风缸减压正常,制动管___,但操纵端中继阀排风口排风不止。
【填空题】
89、JZ-7型空气制动机自阀制动,机车制动缸压力不能按比例上升,且不能保压,工作风缸指示压力下降,为___ 泄漏。
【填空题】
90、JZ-7型空气制动机自阀的重联柱塞阀是连通或切断___与中继阀的联系。
【填空题】
91、JZ-7型空气制动机分配阀变向阀柱塞卡滞在单作管侧时,自阀制动___,单阀制动无效。
【填空题】
92、JZ-7型空气制动机主阀供气阀泄漏时,自阀前四位时,主阀排气口___,手柄后三位,机车制动缸压力增至限压阀所限制的压力时,主阀排气口停止排气。
推荐试题
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用