刷题
导入试题
【单选题】
下图属于( ) ___
A. 溢流节流阀
B. 调速阀
C. 分流阀
D. 溢流阀
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
数控机床液压卡盘处于正卡且在低压夹紧状态下,其夹紧力的大小是由 管路上的减压阀来调节的 ___
A. 低压
B. 中压
C. 高压
D. 超高压
【单选题】
数控车床用换向阀控制卡盘,实现高压和低压夹紧的 ___
A. 转换
B. 转移
C. 转动
D. 转位
【单选题】
活塞杆全长和局部弯曲:活塞杆全长校正直线度误差应 0.03/100mm 或更换活塞 ___
A. 小于等于
B. 大于等于
C. 大于
D. 小于
【单选题】
如下图 3 YA 失电、1YA 得电,换向阀 2 和换向阀 1 均位于 位 ___
A. 左
B. 右
C. 中位
D. 不确定
【单选题】
液压油太脏、过滤不良及其它机械杂质侵入造成节流阀 ___
A. 阻塞
B. 流通
C. 顺畅
D. 通畅
【单选题】
机床拆卸前了解机械设备 系统,明确其用途和相互间的作用 ___
A. 传动
B. 连接
C. 包装
D. 固定
【单选题】
机床拆卸时最后按先外后内、先上后下的 ,分别将各部件分解成零件 ___
A. 顺序
B. 位置
C. 部位
D. 宽度
【单选题】
机床组装前应熟悉设备 和技术要求 ___
A. 装配图
B. 三视图
C. 左视图
D. 右视图
【单选题】
机床组装时首先 的安装 ___
A. 床身与床脚
B. 齿条
C. 刀架
D. 电气
【单选题】
简单 PLC 的运算功能包括逻辑运算和 ___
A. 计时和计数功能
B. 编程功能
C. 控制功能
D. 处理速度功能
【单选题】
按故障造成的后果分危害性故障、 ___
A. 安全性故障
B. 磨损性故障
【单选题】
C.先天性故障 D.部分性故障 13116.目前高速主轴多数采用 轴承 ___
A. 陶瓷滚动
B. 角接触球轴承
C. 向心
D. 推力
【单选题】
主轴内刀具的自动夹紧装置松刀时,通过 活塞推动拉杆来压缩碟形弹簧,使夹头涨开 ___
A. 液压缸
B. 液压马达
C. 液压泵
D. 节流阀
【单选题】
在主轴前端设置一个 键,当刀具装入主轴时,刀柄上的键槽必须与突键对准,才 能顺利换刀 ___
A. 突
B. 锲
C. 斜
D. 平
【单选题】
数控机床主轴润滑通常采用 润滑系统 ___
A. 循环式
B. 手工
C. 压力
D. 管路
【单选题】
求 ___
A. 配合
B. 接触
C. 连接
D. 加工
【单选题】
诊断的步骤包括 ___
A. 要确定运行状态检测的内容、建立测试系统,特征提取,制定决策都正确
B. 特征提取
C. 制定决策
D. 要确定运行状态检测的内容、建立测试系统
【单选题】
梯形齿同步带在传递功率时由于应力集中在 部位,使功率传递能力下降 ___
A. 齿根
B. 分度圆
C. 齿顶
D. 齿顶圆
【单选题】
伺服电动机与滚珠丝杠连接不同轴引起滚珠丝杠在 中转矩过大 ___
A. 运转
B. 振动
C. 移动
D. 连接
【单选题】
变挡液压缸窜油或内泄造成 无变速 ___
A. 主轴
B. 升降
C. 进给
D. 工作台
【单选题】
斜齿轮垫片间隙消除的结构可用于 传动齿轮 ___
A. 中间
B. 输入
C. 输出
D. 传动
【单选题】
采用丝杠固定、螺母旋转的传动方式,螺母一边转动、一边沿固定的丝杠作 移动 ___
A. 轴向
B. 周向
C. 径向
D. 反向
【单选题】
二滑板配合压板过紧或研伤会造成滚珠丝杠在运转中 过大 ___
A. 转矩
B. 转动
C. 速度
D. 动量
【单选题】
杠轴向窜动的可能 ___
A. 读数
B. 位置
C. 指针
D. 转动
【单选题】
丝杠窜动引起的故障检查的顺序大致为:伺服驱动装置、电动机及测量器件、电动机与 丝杠连接部分、液压平衡装置、开口螺母和滚珠丝杠、 、其他机械部分 ___
A. 轴承
B. 电气开关
C. 变压器
D. 接触器
【单选题】
导轨研伤机床经长期使用因为地基与床身水平有变化,使导轨 单位面积负荷过大 ___
A. 局部
B. 全部
C. 整体
D. 角落
【单选题】
主轴头通常有卧式和立式两种,常用转塔的 来更换主轴头,以实现自动换刀 ___
A. 转位
B. 升高
C. 移动
D. 旋转
【单选题】
气压太高会造成机械手换刀速度过 ___
A. 快
B. 慢
C. 低
D. 小
【单选题】
数控系统面板上这些按钮 的作用是 ___
A. 快速进给倍率选择
B. 模拟主轴运转倍率选择
C. 空运转速度
D. 单端运行速度
【单选题】
数铣加工过程中,按了紧急停止按钮后,应 ___
A. 手动返回参考点
B. 排除故障后接着走
C. 重新装夹工件
D. 重新上刀
【单选题】
数控系统的手动进给值一般采用 输入 ___
A. 英寸或毫米
B. 毫米
C. 厘米
D. 英寸
【单选题】
通常情况下,数控机床的 DNC 功能是在数控系统的 工作方式下实现的 ___
A. 自动
B. 手轮
C. 录入
D. 手动
【单选题】
对 ISO EOB FMS MDI 的正确解释是 ___
A. 国际标准化组织、程序段结束符、柔性制造系统、手动数据输入
B. 美国工业电子协会、程序结束符、集成制造系统、自动运行
C. 美国工业电子协会、程序段结束符、柔性制造系统、自动运行
D. 国际标准化组织、程序结束符、集成制造系统、手动数据输入
【单选题】
机械原点是 ___
A. 机床坐标系原点
B. 工作坐标系原点
C. 附加坐标系原点
D. 加工程序原点
【单选题】
数控机床的准停功能主要用于 ___
A. 换刀和让刀
B. 退刀
【单选题】
C.换刀和加工中 D.测量工件时 13141.按下数控系统的 按钮,机床开始在程序的控制下加工零件 ___
A. 循环启动
B. 主轴正传
C. 暂停
D. 复位
【单选题】
数控系统在自动运行时,单程序段控制指的是 ___
A. 执行完程序的一个程序段之后停止
B. 程序的所有程序段接连运行
C. 只能执行简单的程序
D. 跳过指定的程序段
【单选题】
数控车床在执行刚性攻丝时, 每旋转一转,沿攻丝轴产生一定的进给(螺纹导程) ___
A. X 轴
B. 进给轴
C. Z 轴
D. 主轴
【单选题】
如果数控系统某个扩展 I/O 模块的 DI、DO、AI、AO 数量全部设为 0,系统认为该站号 ___
A. 有效
B. 只有在机床空载时有效
C. 无效
D. 只有在机床空载时无效
【单选题】
当数控系统的软限位参数设定为 0 时,软限位机能 ___
A. 失效
B. 有效
C. 最大
D. 最小
推荐试题
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用