【单选题】
主要涉及智能化生产系统及过程以及网络化分布式生产设施的实现 ___
A. 智慧工厂
B. 智能生产
C. 智能物流
D. 智慧物流
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
两化融合是指工业化和 的高层次深度融合 ___
A. 信息化
B. 农业化
C. 现代化
D. 科学技术
【单选题】
工作因素系统把动作分解成 个最基本的动作单元 ___
【单选题】
主要涉及整个企业的生产物流管理、人机互动、3D 打印以及增材制造等技术在工业生产过程中的应用 ___
A. 智能生产
B. 智慧工厂
C. 智能物流
D. 智慧物流
【单选题】
主要通过互联网、物联网、务联网整合物流资源,充分发挥现有物流资源供应方 的效率,需求方则能快速获得服务匹配,得到物流支持 ___
A. 智能物流
B. 智慧工厂
C. 智能生产
D. 智慧物流
【单选题】
是以供应链管理思想为基础,以先进计算机及网络通信技术为运行平台,能将供 应链上合作伙伴之间的物流、资金流、信息流进行全面集成的管理信息系统 ___
A. ERP
B. MRP
C. JIT
D. LP
【单选题】
下列属于可回收性设计原则的是 ___
A. 易于拆卸,易于分离
B. 避免有相互影响的零件组合,避免零件的无损
C. 避免使用与循环利用过程不想兼容的材料或零件
D. 实现零部件的标准化、系列化、模块化,减少零件的多样性
【单选题】
安全生产要做到 ___
A. 防患于未然
B. 认真学习岗位安全规程,和技术操作规程
C. 工作时小心谨慎
D. 车间抓得紧,安全员具体检查落实
【单选题】
___
A. 诚实守信
B. 爱岗敬业
C. 忠于职守
D. 宽厚待人
【单选题】
安全文化的核心是树立 的价值观念,真正做到“安全第一,预防为主” ___
【单选题】
C.以产品质量为主 D.以管理为主 14119.职业道德是指 ___
A. 人们在履行本职工作中所就应遵守的行为规范和准则
B. 人们在履行本职工作中所确立的奋斗目标
C. 人们在履行本职工作中所确立的价值观
D. 人们在履行本职工作中所遵守的规章制度
【单选题】
等 ___
A. 增强自律性
B. 增强强制性
C. 加强舆论监督
D. 完善企业制度
【单选题】
遵守法律法规不要求 ___
A. 延长劳动时间
B. 遵守操作程序
C. 遵守安全操作规程
D. 遵守劳动纪律
【单选题】
关于创新的论述,正确的是 ___
A. 创新是企业进步的灵魂
B. 创新就是独立自主
C. 创新就是出新花样
D. 创新不需要引进外国的新技术
【单选题】
下面 不属于中国制造 2025 十大重点领域 ___
A. 新一代信息技术产业、工程机械、纺织机械
B. 高档数控机床和机器人、航空航天装备、海洋工程装备及高技术船舶
C. 先进轨道交通装备、节能与新能源汽车、电力装备
D. 农业装备、新材料、生物医药及高性能医疗器械
【单选题】
在夏天,为了使控制系统超负荷长期使用,不应打开控制柜的 散热 ___
A. 柜门
B. 风扇
C. 电源
D. 通风系统
【单选题】
全面企业管理指对 进行全方位管理 ___
【单选题】
是企业诚实守信的内在要求 ___
A. 维护企业信誉
B. 增加职工福利
C. 注重经济效益
D. 开展员工培训
【单选题】
在目视管理的基本要求中, 是指各种视显示信号要清晰、位置适宜 ___
【单选题】
职业道德不体现 ___
A. 从业者的工资收入
B. 从业者对所从事职业的态度
【单选题】
C.从业者的价值观 D.从业者的道德观 14133.下列选项中属于职业道德范畴的是 ___
【单选题】
C.企业经营业绩 D.人们的内心信念 14134.对直流电动机电刷进行定期检查时,要在电动机 的情况下进行 ___
A. 完全冷却
B. 刚停转
C. 拆下
D. 运转
【单选题】
要做到遵纪守法,对每个职工来说,必须做到 ___
A. 努力学法,知法、守法、用法
B. 反对“管“、“卡”、“压”
C. 反对自由主义
D. 有法可依
【单选题】
起重机在起吊较重物体时,应将重物吊离地面 ,检查后确认正常方可继续工作 ___
A. 10cm 左右
B. 1cm 左右
C. 5cm 左右
D. 50cm 左右
【单选题】
C.在工作中吸烟 D.随便着衣 14139. 不符合机床维护操作规程 ___
A. 机床 24 小时运转
B. 备份相关设备技术参数
C. 有交接班记录
D. 操作人员培训上岗 14140.生产人员在质量管理方面须做好“三按和一控”工作,一控是指自控正确率应达 (A)A.100% B.95%
【单选题】
5S 管理内容包含整理、 、清扫、清洁和素养 ___
【单选题】
不爱护工、卡、量具的做法是 ___
A. 工、卡、量具要放在工作台上
B. 按规定维护工、卡、量具
【单选题】
C.正确使用工、卡、量具 D.工、卡、量具要放在指定地点 14144.发生电火灾时,应选用 灭火 ___
A. 砂
B. 水
C. 普通灭火机
D. 冷却液
【单选题】
通过无线网络与互联网的融合,将物体的信息实时准确地传递给用户,指的是 ___
A. 智能处理
B. 全面感知
C. 可靠传递
D. 互联网
【单选题】
是利用形象直观、色彩适宜的各种视觉感知信息将管理者的要求和意图让大家都 看得见,以达到员工的自主管理、自我控制及提高劳动生产率的一种管理方式 ___
A. 目视管理
B. 定置管理
C. 5S 管理
D. 现场管理
【单选题】
管理控制的基本任务就是 ___
A. 发现偏差
B. 分析原因
C. 发出指令
D. 做出改进
【单选题】
第三次信息技术革命指的是 ___
A. 物联网
B. 互联网
C. 智慧地球
D. 感知中国
【单选题】
是指为保证产品质量或工作质量所进行的质量调查、计划、组织、协调与控制等 工作,以达到规定的质量标准,预防不合格产生 ___
A. 质量管理
B. 现场管理
C. 定置管理
D. 生产管理
【单选题】
三层结构类型的物联网不包括 ___
A. 会话层
B. 网络层
C. 应用层
D. 感知层
【单选题】
运用云计算、数据挖掘以及模糊识别等人工智能技术,对海量的数据和信息进行分析和 处理,对物体实施智能化的控制,指的是 ___
A. 可靠传递
B. 全面感知
C. 智能处理
D. 互联网
【单选题】
是研究一道工序、一个工作地点的工人使用机器或不使用机器的各个作业活动 ___
A. 作业分析
B. 程序分析
C. 动作分析
D. 动素分析
【单选题】
标签工作频率是 30-300kHz ___
推荐试题
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform