刷题
导入试题
【单选题】
367___是指大客流换乘站或连续几个区段中列车满载率最高的车站,负责向控制中心申请启动及取消单线或线网级客流控制。
A. 辅控站
B. 折返站
C. 换乘站
D. 主控站
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
368车站大客流组织预案分为自然站大客流组织预案和___大客流组织预案。
A. 中间站
B. 终点站
C. 火车站
D. 换乘站
【单选题】
369城市轨道交通单位运能匹配分析是指通过对___、列车满载率进行分析,掌握客流与运能的匹配情况,为制定符合客流现状的运输计划和客流组织方案提供数据支持。
A. 列车准点率
B. 列车周转率
C. 断面客流
D. 峰时客流
【单选题】
370轨道交通标志的照明可采用___。
A. 内部照明和外部照明
B. 内部照明和应急照明
C. 外部照明和应急照明
D. 一般性照明
【单选题】
371城市轨道交通运营的车站应有___或自助查询设备,并应标示问询点现时的工作状态。
A. 客服中心
B. 售票处
C. 咨询台
D. 人工咨询
【单选题】
372广告宣传灯箱及灯光的使用应不影响标志标识、指示牌、公告、通知以及___的辨认和使用。
A. 设施设备
B. 票务设备
C. 服务设施
D. 行车设备
【单选题】
373每个车站至少保证有___个出入口设置垂直电梯或升降平台,专为残疾人和行走有困难的乘客服务。
A. 1
B. 2
C. 3
D. 4
【单选题】
374车站、列车车厢、空调系统、___等直接与乘客接触的服务设施应定期清洁、消毒。
A. 客服中心
B. 车控室
C. 警务室
D. 公共卫生间
【单选题】
375发生火灾时,对于垂直电梯描述正确的是___。
A. 继续运行,疏散乘客
B. 自动停在基站,打开电梯门
C. 停在任意位置
D. 停在顶层
【单选题】
376城市轨道交通单位可采用乘客满意度进行服务评价,乘客满意度应通过___获得,服务组织或监督机构可委托第三方进行乘客满意度测评。
A. 抽样分析和统计调查
B. 取样调查和统筹分析
C. 抽样调查和统计分析
D. 取样分析和统计调查
【单选题】
377线路客运强度等于___。
A. 线路日均客运量/线路运营长度
B. 线路日均客运量 *线路运营长度
C. 线路日均客运周转量/线路运营长度
D. 线路日均客运周转量 * 线路运营长度
【单选题】
378辅控站是是通过分析线路或线网OD客流、___等,选取对主控站影响较大的车站,通过辅控站客流控制来缓解主控站大客流压力。
A. 日均客流
B. 轨道交通运能
C. 列车准点率
D. 列车满载率
【单选题】
379从运营组织整体秩序角度考虑,基于___的原则,通过客流组织分析,结合线网客流组织方法和车站硬件优化,可以更科学地不断完善各车站点、线、面客流联控机制。
A. 以客流定运能控制
B. 以运力定流量控制
C. 运能及满载率相匹配
D. 运能及准点率相匹配
【单选题】
380突发大客流是指受地铁周边大型活动或地铁出现应急事件等情况影响,在短时间内车站聚集大量客流,对___造成较大冲击。
A. 车站客流秩序
B. 车站票务运作
C. 车站行车安全
D. 车站人员、设施设备
【单选题】
381站外导向标志中的城市轨道交通位置标志应符合相关___的规定,不得使用企业徽标代替。
A. 企业现行标准
B. 国家现行标准
C. 地方现行标准
D. 政府现行标准
【单选题】
382列车旅行速度是指列车在运营线路上运载乘客时的速度,___是决定列车旅行速度的主导因素。
A. 车站停站时间
B. 列车间隔时间
C. 列车长度
D. 车站面积
【单选题】
383不属于地铁通信传输内容的是___。
A. 语音通信
B. 手机信号
C. 图像视频
D. 数据信息
【单选题】
384信号系统中ATP表示___。
A. 列车自动驾驶
B. 列车自动控制
C. 列车自动监控
D. 列车自动防护
【单选题】
385具有AFC设备的操作与管理能力、处理票务报表与台帐、对车站票务事件处理能力和对票务员监督和管理能力是___的岗位能力要求。
A. 行车值班员
B. 客运值班员
C. 售票员
D. 厅巡
【单选题】
386断面客流统计时长一般为___。
A. 5分钟
B. 10分钟
C. 1小时
D. 2小时
【单选题】
387组织进站客流上车应当引导乘客___。
A. 先上后下
B. 同上同下
C. 先下后上
D. 抢上抢下
【单选题】
388未安装屏蔽门在车站,遇乘客掉落大件物品侵入限界影响列车运营时,第一时间应当___。
A. 立即按压紧急停车按钮
B. 做好乘客安抚工作
C. 报告行调
D. 到站台上捡取掉落物
【单选题】
389甲站为 A 线和 B 线的换乘站,同时也是两条线路的中间站,从换乘客流分析来看,甲站内共有___个换乘方向。
A. 4
B. 6
C. 8
D. 10
【单选题】
390在重大级客流疏散中,必要时最好采取___。
A. 电梯停运模式
B. 女乘客先出
C. 出口限行
D. AFC紧急放行模式
【单选题】
391站外疏导乘客时,以下描述不正确的是___。
A. 积极宣传疏导,减少乘客误解,争取乘客理解
B. 对乘客宣传时要表示出人多,没有办法,只能慢慢排
C. 限流情况,面对乘客不满,要耐心劝解
D. 限流情况,面对不冷静乘客,要尽快处理,降低影响范围
【单选题】
392客流疏导工作应以“___、客流有序、秩序可控、疏散有力、 路网限流、区域联动,节点控制”为原则。
A. 乘客出入有序
B. 优先出站乘客为主
C. 乘降有序
D. 流量服从安全
【单选题】
393在非正常情况下客流组织中,如发生恶性传染病人,必须采取___。
A. 隔离措施
B. 疏散
C. 清客
D. 引导上车
【单选题】
394车站中发生乘客之间纠纷时,应当遵循的原则是___。
A. 关注事态发展,不可控时报警
B. 保持冷静 引导进车控室处理
C. 及时劝阻 报告公安,协助处理受伤乘客
D. 冷眼旁观
【单选题】
431当废票积累到一定数量时,须上交车票主管部门重新进行___。
A. 销毁
B. 清洁
C. 初始化
D. 以上均是
【单选题】
432___是AFC系统的核心部分。
A. 车站SC
B. B OM
C. 中心AFC系统
D. 自动售票机
【单选题】
433以下___车票,不对外销售。
A. 单程票
B. 储值票
C. 纪念车票
D. 车站工作票
【单选题】
434单程票限当日当站在规定时间内___次使用。
A. 1
B. 2
C. 3
D. 4
【单选题】
435单程票按不同___收费。
A. 车站
B. 乘距
C. 乘客
D. 地区
【单选题】
436___的主要功能之一是进行线路间的票款清分和客流统计。
A. 售票系统
B. 清分系统
C. 检票系统
D. 查询系统
【单选题】
1967年,世界上第一套AFC 系统在___地铁安装使用成功。
A. 伦敦
B. 巴黎
C. 莫斯科
D. 柏林
【单选题】
AFC系统采用封闭式票务管理模式,使用___将车站站厅公共区划分为付费区和非付费区。
A. 隔离栏杆
B. 票亭
C. 闸机
D. 闸机和隔离栏杆
【单选题】
439___交通运输部《交通一卡通运营服务质量管理办法[试行]》施行,其对交通一卡通的职责分工、发行、数据管理、运营管理等多方面均做了详细的规定。
A. 2017年2月
B. 2017年10月
C. 2018年2月
D. 2018年4月
【单选题】
440全国交通一卡通互联互通卡标有___样式。
A. 交通互联
B. 交通联合
C. 全国互联
D. 公交互联
【单选题】
441在自动售检票系统中,能按照模糊查询[输入拼音首字母查询]方式发售单程票的设备是___。
A.
B. OM B. T V M
C. E QM
D. AG
【单选题】
442自动售检票系统英文简称为___。
A.
B. OM B. T V M
C. AFC
D. AG
【单选题】
443以下不属于车站终端设备的有___。
A. 自动查询机
B. 车站计算机
C. 自动售票机
D. 便携式检票机
推荐试题
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用