【单选题】
(B737ng)哪些系统在一定条件下可以自动工作. ___
A. A.副翼、扰流板、前缘装置
B. B.前缘装置、扰流板、水平安定画
C. C.水平安定面、扰流板、后缘襟翼
D. D.扰流板、缝翼、后缘襟翼
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
(B737ng)内/外侧地面扰流板的作动筒内的锁机构都锁定在: ___
A. A. 扰流板放下(收回)的位置
B. B. 扰流板向上偏转的位置
C. C. 锁作动筒活塞杆伸出的位置.
D. D. 锁作动筒活塞抨收上的位置.
【单选题】
(B737ng)偏航阻尼系统的作用是:___
A. A.防止飞机偏航飞行;
B. B.提高稳定性,防止荷兰滚;
C. C.减少阻力,增加升力;
D. D.增加飞机绕偏航轴移动的性能.
【单选题】
(B737ng)偏航阻尼作动筒使用哪一个液压系统的液压:___
A. A. A系统
B. B. B系统
C. C. A系纺统和B系统
D. D. 备分液压系统
【单选题】
(B737ng)前推油门杆时,下列那种构型会产生起飞警告?___
A. 前缘襟翼放出
B. 停留刹车解除
C. 减速板手柄预位
D. 水平安定面绿区
【单选题】
(B737ng)前沿自动缝翼系统的工作是由什么控制盒控制的___
A. 独立专用的失速管理计算机
B. SMYD 1
C. SMYD 2
D. SMYD 1&2号
【单选题】
(B737ng)前缘襟翼和缝翼的备份操作是通过:___
A. 钢索
B. 电动马达
C. 备用液压
D. 无备份操作
【单选题】
(B737ng)前缘襟翼和缝翼的备份操作是通过:___
A. A.钢索
B. B.电动马达
C. C.备用液压
D. D.无备份操作
【单选题】
(B737ng)前缘襟翼和缝翼巡航释压功能:___
A. 在巡航的条件下,使前缘襟翼和缝翼在全伸出位
B. 关断B系统到前缘襟翼和缝翼控制活门的液压压力
C. 前缘襟翼和缝翼巡航释压活门在平时是在关闭位
D. 由SMYD 2控制
【单选题】
(B737ng)人工刹车的正常刹车与备用刹车之间是___________转换的. ___
A. A. 通过操纵驾驶舱内的备用刹车电门
B. B. 通过作动刹车脚登
C. C. 通过操纵备用刹车手柄
D. D. 自动
【单选题】
(B737ng)如果速度配平系统有故障,哪些注意灯会亮:___
A. A.速度配平故障灯、马赫配平故障灯、自动驾驶脱开灯;
B. B.速度配平故障灯、安定面失去配平故障灯和自动驾驶脱开灯;
C. C.主注意灯、飞行控制警告灯和速度配平故障灯;
D. D.主注意灯、飞行控制警告灯、速度配平故障灯和失速警告灯.
【单选题】
(B737ng)升降舵调整片控制机构的作用:___
A. 当襟翼收上时,在平衡模式,升降舵和调整片的运动方向相同
B. 当襟翼不在收上位时,在非平衡模式,升降舵和调整片的运动方向相反
C. 在非平衡条件下,增加飞机的俯仰控制
D. 在平衡状态下,增强飞机的偏航控制
【单选题】
(B737ng)升降舵感觉计算机使用什么液压系统的压力来使感觉力系统工作:___
A. A和B液压系统
B. A或B液压系统中压力大的系统
C. A或备用液压系统中压力大的系统
D. B或备用液压系统中压力大的系统
【单选题】
(B737ng)使机长和副驾驶的操纵杆分离的机构是:___
A. 一个扭力管
B. 推杆
C. A Chain and Sprocket System
D. A Breakout Mechanism
【单选题】
(B737ng)使用方向舵脚蹬或转弯子轮的最大转弯角度是:___
A. A.士70或±780
B. B.±780或±70
C. C.都是士900
D. D.转弯角度没有限制
【单选题】
(B737ng)水平安定面的操纵方式有:___
A. 只能主电配平
B. 主电配平和人工配平
C. 液压配平和人工配平
D. 主电配平、自动驾驶配平和人工配平
【单选题】
(B737ng)为了增加737NG副翼控制的可靠性和稳定性,在副翼PCU的连接机构上现对737-345做了什么改进___
A. PCU为双推杆机构,共有有2根推杆
B. PCU为双推杆机构,共有有4根推杆
C. 更换了更可靠的PCU
D. B&C都对
【单选题】
(B737ng)为增加737NG副翼控制的可靠性和稳定性,在副翼PCU的连接机构上有何特点___
A. PCU为双推杆机构,共有有4根推杆
B. 更换了更可靠的PCU
C. PCU为双推杆机构,共有有2根推杆
D. A & B都对
【单选题】
(B737ng)下列关于副翼感觉定中机构说法错误的是:___
A. 驾驶舱输入卡阻时提供信号给飞行控制计算机
B. 提供驾驶员副翼的感觉力
C. 没有输入时保持驾驶盘在中立位
D. 接受副翼输入信号控制副翼PCU
【单选题】
(B737ng)下列哪一段说法是正确的:___
A. A.任何时候都可以接通两套自动驾驶;
B. B.在起飞时可以接通两套自动驾驶;
C. C.在巡航时可以接通两套自动驾驶;
D. D.在进近时可以接通两套自动驾驶.
【单选题】
(B737ng)下列哪一个操纵可以能消除起飞警告喇叭鸣响:___
A. 放出减速板
B. 收回后缘襟翼
C. 收回油门杆
D. 刹住停留刹车
【单选题】
(B737ng)下列说法哪一段是错误的:___
A. A.使用主电配平时会导致自动驾驶脱开;
B. B.主电配平时配平手轮会随动;
C. C.自动安定面配平时配平手轮会随动;
D. D.安定面配平的最低优先权是速度配平.
【单选题】
(B737ng)下列说法正确的是:___
A. 后缘襟翼的备份操作是通过备用液压
B. 飞行操纵关断活门正常是关闭位
C. 所有扰流板放出角度是一样的
D. 没有液压,方向舵将无法操作
【单选题】
(B737ng)下列说法正确的是?___
A. 飞行操纵关断活门正常是关闭位
B. 所有扰流板放出角度是一样的
C. 没有液压,方向舵将无法操作
D. 后缘襟翼的备份操作是通过备用液压
【单选题】
(B737ng)下面哪一个不是自动缝翼工作条件?___
A. 襟翼手柄在1,2,或者5的位置
B. 飞机接近失速的边界
C. 没有使用备用襟翼系统
D. 襟翼出现非指令性移动
【单选题】
(B737ng)下面哪一个不是自动缝翼工作条件?___
A. 襟翼手柄在1,2,或者5的位置
B. 飞机接近失速的边界
C. 没有使用备用襟翼系统
D. 襟翼出现非指令性移动
【单选题】
(B737ng)下面哪一个属于DFCS系统的功能:___
A. A.IRS、Y/D、A/P、A/T
B. B.FMCS、A/P、FD、A/T;
C. C.飞行控制系统、Y/D、A/P、FD、A/T;
D. D.A/P、FD、A/T、速度配平、马赫配平、安定面配平和高度警戒.
【单选题】
(B737ng)下面哪一种不是自动配平?___
A. A. 速度配平
B. B. 主电配平
C. C. 马赫配平
D. D. 衔接AP后的安定面配平
【单选题】
(B737ng)以下飞控系统驾驶舱部件那个只有737NG有而737-345没有___
A. 襟翼位置表
B. 头顶飞行控制面板
C. 减速板伸出灯
D. 减速板预位灯
【单选题】
(B737ng)以下哪种机型的方向舵行程最大___
A. 737NG
B. 737-300
C. 737-400
D. 737-500
【单选题】
(B737ng)有关飞机后缘襟翼说法正确的是:___
A. 可以人工操纵收放
B. 可以用液压或电动方式操作收放
C. 只能用液压方式操纵收放
D. 电动方式只能放下不能收上
【单选题】
(B737ng)有货舱电动装载系统的南航737机型是___
A. 737-3/4/5
B. 737-700
C. 所有737-800
D. 部分737-800
【单选题】
(B737ng)在进行正常刹车时,停留刹车关断活门应处于________位置. ___
A. A. 关闭
B. B. 打开
C. C. 打开或关闭
D. D. 以上答案都不对
【单选题】
(B737ng)在前推油门杆时,下列那种构型会产生起飞警告___
A. 减速板手柄预位
B. 水平安定面绿区
C. 前缘襟翼放出
D. 停留刹车解除
【单选题】
(B737ng)自动缝翼控制活门通电工作,飞机在空中且接近失速则缝翼:___
A. 从收上或放下到全放下
B. 从收上到放下
C. 从放下到全放下
D. 从全放下到放下
【单选题】
(B737ng)737NG的货舱装载的电动控制面板装在哪里___
A. 货舱门外侧
B. 货舱顶板
C. 货舱侧壁板
D. 货舱前壁板
【单选题】
(B737ng)737NG应急设备救生船储存位置在哪里___
A. 前客舱顶板
B. 中客舱顶板
C. 后客舱顶板
D. A&B对
【单选题】
(B737ng)有货舱电动装载系统的南航737机型是___
A. 737-700
B. 所有737NG
C. 所有737-800
D. 部分737-800
【单选题】
(B737ng)737NG货舱系统如何防止电动货柜撞击货舱门___
A. 没有特殊机构,操作者必须小心注意
B. 货舱门是向外开的,不会被货柜撞击
C. 货舱门顶板处有一活动的挡板,货柜压挡板,板压电门,货柜系统断电制动
D. 货舱门顶板处有一固定的挡板,货柜压挡板,货柜以机械方式制动
【单选题】
(B737ng)EVAC的作用是___
A. 驾驶员向空乘发出要应急逃离的信号
B. 空乘向驾驶员发出要应急逃离的信号
C. A&B对
D. A&B都不对
【单选题】
(B737ng)在应急门框处哪种机型有应急逃离绳___
A. 仅737-700
B. 仅737-800
C. 所有737NG都有
D. 以上都没有
推荐试题
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map