刷题
导入试题
【判断题】
异步电动机的旋转磁场的转速大小只与磁极对数有关
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
段修时,发电机悬吊装置的吊销须探伤
A. 对
B. 错
【判断题】
大修后,餐车电冰箱控制箱的金属外壳须换新品
A. 对
B. 错
【判断题】
露点温度等于湿球温度
A. 对
B. 错
【判断题】
毛细管可将高温高压液体变成低温低压液体
A. 对
B. 错
【判断题】
KP-2A型控制箱中晶闸管SCR1的控制角大于导通角
A. 对
B. 错
【判断题】
接线图中所有电气元件及其引线标注与电气原理图中相一致的文字符合及接线号一样
A. 对
B. 错
【判断题】
电压互感器副边线圈的一端和铁芯必须接地
A. 对
B. 错
【判断题】
极板处于不同浓度的电解层,会使蓄电池自放电严重
A. 对
B. 错
【判断题】
硅二极管的死区电压一般为0.2V
A. 对
B. 错
【判断题】
串激直流电动机的负载特性是电动机转矩增大时,转速上升较快
A. 对
B. 错
【判断题】
同一发电车各发电机组要均衡使用,各个机组运转时差最大不得超过100H
A. 对
B. 错
【判断题】
随着列车速度的提高,发电机的线电压也随着上升
A. 对
B. 错
【判断题】
在运行途中,测量KP-2A型控制箱失控,摘下RD3,电机仍发电,说明SCR1短路
A. 对
B. 错
【判断题】
运用客车鉴定中,某辆母车发电机定检标记打错,则定其为三级车
A. 对
B. 错
【判断题】
单元式空调机组中修周期为三年
A. 对
B. 错
【判断题】
DC600V供电列车运用列车绝缘要求是用1000V兆欧表测量,在相对湿度大于60℅时,线间电阻≥4兆欧,线地间电阻≥2兆欧
A. 对
B. 错
【判断题】
DC600V供电列车运用列车绝缘要求是用1000V兆欧表测量,在相对湿度小于85℅时,线间电阻≥1兆欧,线地间电阻≥0.5兆欧
A. 对
B. 错
【判断题】
DC600V供电列车运用单车绝缘要求是在相对湿度小于85℅时,线间电阻≥0.38兆欧,线地间电阻≥0.22兆欧
A. 对
B. 错
【判断题】
DC600V供电列车运用单车绝缘要求是用1000V兆欧表测量,在相对湿度大于60℅时,线间电阻≥2兆欧,线地间电阻≥4兆欧
A. 对
B. 错
【判断题】
AC380V供电列车运用列车绝缘要求是用500V兆欧表测量,在相对湿度大于60℅时,线间电阻≥4兆欧,线地间电阻≥2兆欧
A. 对
B. 错
【判断题】
AC380V供电列车运用列车绝缘要求是用500V兆欧表测量,相对湿度小于85℅时,线间电阻≥1兆欧,线地间电阻≥0.5兆欧
A. 对
B. 错
【判断题】
AC380V供电列车运用单车绝缘要求是用500V兆欧表测量,在相对湿度大于60℅时,线间电阻≥4兆欧,线地间电阻≥2兆欧
A. 对
B. 错
【判断题】
AC380V供电列车运用单车绝缘要求是用500V兆欧表测量,在相对湿度小于85℅时,线间电阻≥1兆欧,线地间电阻≥0.5兆欧
A. 对
B. 错
【判断题】
客车速度传感器与轴箱端部测速齿轮顶径向间隙TFX1型速度传感器为1±0.5mm
A. 对
B. 错
【判断题】
蒸发器太脏会造成压缩机刚启动就停机
A. 对
B. 错
【判断题】
空调总电源开关合上后,控制柜所有工作和故障灯亮是由于电源零线断开
A. 对
B. 错
【判断题】
制冷剂不足时会造成全封闭压缩机烫手
A. 对
B. 错
【判断题】
制冷系统制冷剂过多会造成蒸发器结霜或结浮霜
A. 对
B. 错
【判断题】
DC600V供电的列车的集控41号线是供电请求线,197号线是供电允许线
A. 对
B. 错
【判断题】
防滑系统出现故障的客车,不准编入25T型列车
A. 对
B. 错
【判断题】
真空集便装置因故障不能使用的客车,可以编入25T客车
A. 对
B. 错
【判断题】
KZS/M-1型轴温报警器显示屏上所有轴位显示“+++”,则可能是仪器故障,可以尝试更换轴温报警器中的传感器智能接口模块
A. 对
B. 错
【判断题】
在使用钳型电流表测量电流时,在测量过程中可以切换量程
A. 对
B. 错
【判断题】
安装进水过滤器时,必须按照过滤器上的箭头方向垂直安装在进水管路中
A. 对
B. 错
【判断题】
用兆欧表测量绝缘电阻,测量前应将被测量设备的电源切断,并进行短路放电
A. 对
B. 错
【判断题】
一旦一侧转向架的轴温传感器的2根信号线和公用线混淆,则只能用万用表或兆欧表来重新分清
A. 对
B. 错
【判断题】
KZS/M-Ⅰ型轴温报警装置仪器能与数字式传感器兼容,但不能和模拟式传感器兼容
A. 对
B. 错
【判断题】
KZS/M-Ⅰ型轴温报警装置联网使用时对广播有干扰
A. 对
B. 错
【判断题】
KZS/M-Ⅰ型轴温报警装置采用数字式传感器,可以去除由于线路带来的温度测量误差,仪器的抗干扰能力得以提高
A. 对
B. 错
【判断题】
KZS/M-Ⅰ型轴温报警装置的联网采用分布式结构,任意仪器就可构成网络,但如果某一台仪器发生故障,会影响其他仪器的正常使用
A. 对
B. 错
推荐试题
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用