【单选题】
S11与S12供电臂的绝缘锚段关节的位置位于黄贝站___
A. 上行A端
B. 上行B端
C. 下行A端
D. 下行B端
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
X12与X13供电臂的绝缘锚段关节的位置位于新秀站___
A. 上行A端
B. 上行B端
C. 下行A端
D. 下行B端
【单选题】
X08与X09供电臂的绝缘锚段关节的位置分别位于福田站___
A. 上行A端
B. 上行B端
C. 下行A端
D. 下行B端
【单选题】
S05与S06供电臂的绝缘锚段关节的位置分别位于世界之窗站___
A. 上行A端
B. 上行B端
C. 下行A端
D. 下行B端
【单选题】
蛇口西车辆段哪个股道无接触网结构___
A. 33道
B. 34道
C. 19道
D. 28道
【单选题】
蛇口西车辆段哪个股道无接触网结构___
A. 26道
B. 30道
C. 31道
D. 21道
【单选题】
蛇口西车辆段除练兵线、赤段联1及赤段联2外共设置有几个电动隔离开关___
【单选题】
下列表述正确的是___。
A. 建筑限界<车辆限界<设备限界
B. 建筑限界<设备限界<车辆限界
C. 建筑限界>设备限界>车辆限界
D. 建筑限界>车辆限界>设备限界
【单选题】
正线及辅助线钢轨宜采用___钢轨,车场线宜采用( )钢轨。
A. 60kg/m;50kg/m
B. 50kg/m;60kg/m
C. 50kg/m;50kg/m
D. 55kg/m;50kg/m
【单选题】
钢轨曲线的最大超高宜为___,当设置的超高值不足时,一般可允许有不大于61mm的欠超高。
A. 90mm
B. 100mm
C. 110mm
D. 120mm
【单选题】
露天正常线路接触线距轨面的最低高度为___。
A. 4200mm
B. 4400mm
C. 4600mm
D. 4800mm
【单选题】
架空接触网在空旷的地面区段与高架桥区段每隔___处应设置避雷器。
A. 200m
B. 300m
C. 500m
D. 600m
【单选题】
避雷器与放电问隙的工频接地电阻应不大于___。
A. 20Ω
B. 10Ω
C. 5Ω
D. 30Ω
【单选题】
M16*225化学锚栓埋深不应小于___。
A. 125mm
B. 100mm
C. 120mm
D. 110mm
【单选题】
埋入杆件的化学锚固螺栓深度允许偏差为___。
A. ±10mm
B. ±8mm
C. -3/+5mm
D. ±5mm
【单选题】
埋入杆件成组杆件个体相对间距允许偏差为___。
A. ±6mm
B. ±5mm
C. ±3mm
D. ±2mm
【单选题】
分段绝缘器中心对受电弓中心允许误差为___。
A. 20mm
B. 30mm
C. 40mm
D. 50mm
【单选题】
"高压危险"标志牌设置高度距地面___。
A. 1.6-2.0m
B. 1.2-1.8m
C. 1.2-1.5m
D. 1.0-2.0m
【单选题】
化学锚杆安装___后方可进行拉拔试验,加载应匀速,一般以每分钟 10KN 的速率增加。。
A. 3h
B. 6h
C. 12h
D. 24h
【单选题】
通常所说的交流电压220V是指它的___。
A. 有效值
B. 平均值
C. 最大值
D. 瞬时值
【单选题】
电路主要由负载、线路、电源、___组成。
A. 变压器
B. 开关
C. 发电机
D. 仪表
【单选题】
二极管的主要特性就是___。
A. 整流
B. 稳压
C. 单向导通
D. 反向击穿
【单选题】
基尔霍夫第一定律又叫节点电流定律,说的是___。
A. 流入某节点电流的和为零
B. 流出某节点电流的和为零
C. 流入节点的电流等于流出节点的电流
D. 一个回路中各处电流相等
【单选题】
下列关于电流的说法正确的是___。
A. 通过的电量越多,电流就越大
B. 通电时间越长,电流就越大
C. 通电时间越短,电流就越大
D. 通过一定电量时,所需时间越小,电流越大
【单选题】
用电压表测得电路端电压为0V,这说明___。
A. 外电路断路
B. 外电路短路
C. 外电路上电流较小
D. 电源内阻为零
【单选题】
《公民道德建设实施纲要》 中明确提出并大力提倡的职业道德的五个要求是___
A. 爱国守法、明礼诚信、团结友善、勤俭自强、敬业奉献
B. 爱岗敬业、诚实守信、办事公道、服务群众、奉献社会
C. 尊老爱幼、反对迷信、不随地吐痰、不乱扔垃圾
D. 爱祖国、爱人民、爱劳动、爱科学、爱社会主义
【单选题】
从我国历史和国情出发,社会主义职业道德建设要坚持的最根本的原则是___
A. 人道主义
B. 爱国主义
C. 社会主义
D. 集体主义
【单选题】
下列关于职业技能构成要素之间的关系,正确的说法是___
A. 职业知识是关键,职业技术是基础,职业能力是保证
B. 职业知识是保证,职业技术是基础,职业能力是关键
C. 职业知识是基础,职业技术是关键,职业能力是保证
D. 职业知识是基础,职业技术是保证,职业能力是关键
【单选题】
在无人监督的情况下,仍能坚持道德观念去做事的行为被称之为___
【单选题】
《公民道德建设实施纲要》提出,要充分发挥社会主义市场经济机制的积极作用,人们必须增强___。
A. 个人意识、协作意识、效率意识、物质利益观念、改革开放意识
B. 个人意识、竞争意识、公平意识、民主法制意识、开拓创新精神
C. 自立意识、竞争意识、效率意识、民主法制意识、开拓创新精神
D. 自立意识、协作意识、公平意识、物质利益观念、改革开放意识
【单选题】
下列关于爱岗敬业的说法中,你认为正确的是___
A. 市场经济鼓励人才流动,再提倡爱岗敬业已不合时宜
B. 即便在市场经济时代,也要提倡“干一行、爱一行、专一行”
C. 要做到爱岗敬业就应一辈子在岗位上无私奉献
D. 在现实中,我们不得不承认,“爱岗敬业”的观念阻碍了人们的择业自由
【单选题】
在恶劣天气应急出动预案中, 按照灾害的严重性和紧急程度,颜色依次为___。
A. 蓝色、黄色、橙色和红色
B. 黄色、蓝色、红色和橙色
C. 橙色、黄色、蓝色和红色
D. 橙色、蓝色、黄色和红色
【单选题】
为保证人身安全,除专业人员按规定作业外,任何人员所携带的物件(包括长杆、扶梯等)与接触网1500V带电部位需保持___以上的距离。
【单选题】
手提式干粉灭火器有效期一般为___年。
【单选题】
使用灭火器扑灭初起火灾时要对准火焰的___喷射。
【单选题】
施工负责人对工作票内容有不同意见时要及时向___提出,确认无误后方准作业。
A. 发票人
B. 工班长
C. 电调
D. 工程师
【单选题】
若发现接触网断线时,在已断线的___m半径范围以内不准有人接近。
【单选题】
距接触网带电体___m以内的金属结构均应接地。
【单选题】
接触网安全带使用时___。
A. 高挂低用
B. 低挂高用
C. 平挂
D. 无所谓
推荐试题
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic