刷题
导入试题
【单选题】
ZCJ失磁落下后,只有进路中_______解锁,才能使ZCJ复原。[322020201]___
A. 最末一个区段道岔
B. 第一个区段道岔
C. 最末一个区段
D. 第一个区段
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
6502电气集中控制台零层18柱端子第10端子的用途_______。[332020201]___
A. 道岔按扭CA-12接点
B. 列车按钮LA-12接点
C. 调车按钮DA-12接点
D. 按钮表示灯L灯
【单选题】
选平行进路要用_______。[321020201]___
A. 分线法
B. 断线法
C. 选岔电路
D. 选路法
【单选题】
6502电气集中,_______是用来区分黄与双黄显示的。[321020201]___
A. ZXJ
B. TXJ
C. DXJ
D. LXJ
【单选题】
6502电气集中,_______是用来区分绿与黄的显示。[321020201]___
A. ZXJ
B. TXJ
C. DXJ
D. LXJ
【单选题】
CTCS-2车站列控中心设备接地电阻一般不大于_______。[311050203]___
A. 3Ω
B. 4Ω
C. 5Ω
D. 10Ω
【单选题】
CTCS-2车站列控电源屏供电电压应在AC220V~_______内。[312050203]___
A. 230V
B. 235V
C. 240V
D. 250V
【单选题】
CTCS-2车站列控中心机柜UPS持续供电时间不小于_______。[332010104]___
A. 20min
B. 25min
C. 30min
D. 50min
【单选题】
CTCS-2列控地面设备阿尔斯通LEU电源板为整个LEU提供电源,输入标称电压为DC_______。[331050203]___
A. 12V
B. 24V
C. 36V
D. 110V
【单选题】
ZD6型电动转辙机表示杆移动_______(推或拉,在检查柱与检查块每侧间隙为1.5mm条件下),动接点应退出静接点组,切断表示电路。[331010204]___
A. 5.7mm~7.5mm
B. 5.7mm~8mm
C. 5.7mm~8.5mm
D. 5.7mm~9mm
【单选题】
三相电动机电源线中,任意两根线对调会使电动机_______。[333010204]___
A. 转速变慢
B. 转速变快
C. 不转
D. 反转
【单选题】
直流电动机按励磁方式的不同,可以分为_______类型。[331010102]___
A. 1种
B. 2种
C. 3种
D. 4种
【单选题】
出站信号机的点灯电路至少需要_______电缆。[322030203]___
A. 5芯
B. 6芯
C. 7芯
D. 8芯
【单选题】
自动闭塞设备中,当任一元件发生故障或钢轨绝缘破损时,均不得出现_______。[321030204]___
A. 升级显示
B. 红灯显示
C. 绿灯显示
D. 无灯显示
【单选题】
两站间同方向有两列车以上的列车,彼此间以几个闭塞分区相隔离而运行时,称为_______。[321030204]___
A. 间隔运行
B. 追踪运行
C. 相对运行
D. 运行时隔
【单选题】
移频自动闭塞发送盒的输出功率,依据机车信号的接收灵敏度以及在轨道电路最不利的调整状态和分路状态下,应能准确地发送信息,并能稳定地动作机车信号设备,确定为_______。[321010103]___
A. 9.5W
B. 10W
C. 13W
D. 13.5W
【单选题】
对于移频设备站内发送盒与区间发送盒,以下说法中_______是正确的。[321010103]___
A. 原理不相同,功放级相同
B. 原理不相同,功放级也不相同
C. 原理和功放级都相同
D. 原理相同,功放级不相同
【单选题】
电阻并联可以_______。[232000000]___
A. 分压
B. 分流
C. 阻抗
D. 容抗
【单选题】
移频电源检测盒的报警电路是由四个电压检测电路和四个光电耦合器组成的_______电路构成的。[321010103]___
A. 与门
B. 与非门
C. 或门
D. 异或门
【单选题】
为了满足移频接收设备采用双机并联运用,必须在限放前增加一级_______电路。[321010103]___
A. 放大
B. 反相
C. 射级跟随器
D. 阻容耦合
【单选题】
双稳态触发器的返还系数一般要求大于_______,此值越大,设备的抗干扰能力越强。[321010103]___
A. 75%
B. 85%
C. 90%
D. 95%
【单选题】
电阻串联可以_______。[232000000]___
A. 分压
B. 分流
C. 阻抗
D. 容抗
【单选题】
移频地面发送设备,当交流电压在220±22V范围内变动时,载频漂移不大于_______。[321010103]___
A. ±3Hz
B. ±4Hz
C. ±5Hz
D. 9Hz
【单选题】
移频衰耗器初级线圈1、2的输入阻抗Z1为4Ω~4.5Ω,当RT从0变到∞时,此值变化范围在_______之间。[321010103]___
A. 4Ω~4.3Ω
B. 4.12Ω~4.6Ω
C. 4.12Ω~4.74Ω
D. 4.12Ω~4.85Ω
【单选题】
当交流电压为242V(直流电压为24.5V),移频发送盒负载电阻为0.85Ω时,功放输出电压应不小于_______。[321010101]___
A. 2.1V
B. 5.6V
C. 13V
D. 13.6V
【单选题】
检修移频发送盒时要求上、下边频频偏均不大于_______。[321010103]___
A. ±4Hz
B. ±5Hz
C. ±5.5Hz
D. ±6Hz
【单选题】
ZP·W1-18型无绝缘移频自动闭塞设备,通过发送、接收电缆盒的电缆补偿,使实际电缆长度与模拟电缆长度之和为_______,以利于移频信号的传输和调整。[312010103]___
A. 10km
B. 17.5km
C. 19km
D. 21km
【单选题】
ZD9转辙机当滚轮在动作板上滚动时,启动片尖端离开速动片上平面的间隙应为_______。[312010204]___
A. 0.3mm~0.8mm
B. 0.5mm~1.7mm
C. 0.3mm~2mm
D. 1mm~3mm
【单选题】
移频自动闭塞交流电压的允许波动范围是_______。[321010101]___
A. ±15V
B. ±18V
C. ±20V
D. ±22V
【单选题】
18信息N+1移频自动闭塞区间发送盒的输出功率为_______。[321010101]___
A. 10VA
B. 20VA
C. 30VA
D. 40VA
【单选题】
ZD9转辙机当锁闭杆从终端往回移动,锁闭杆斜面与检查柱斜面接触后,锁闭杆再移动_______时,表示接点组应可靠断开开关的常闭接点。[331010204]___
A. 12mm
B. 20mm
C. 30mm
D. 40mm
【单选题】
载频中心为550Hz时,移频波的能量主要分布在495Hz、605Hz频率的附近,这说明频偏为_______。[321010103]___
A. 50Hz
B. 55Hz
C. 60Hz
D. 65Hz
【单选题】
继电半自动闭塞电源停电恢复时,只有用_______办理,方能使闭塞机恢复。[333030204]___
A. 事故按钮
B. 总人工解锁按钮
C. 总取消按钮
D. 总定位按钮
【单选题】
继电半自动闭塞采用架空线时,其直流电阻每条公里_______。[331010103]___
A. 9Ω
B. 11Ω
C. 14Ω
D. 20Ω
【单选题】
继电半自动闭塞采用架空线时,其直流电阻经运用腐蚀后最大不超过_______。[331010103]___
A. 10.7Ω
B. 12.7Ω
C. 13.7Ω
D. 14.7Ω
【单选题】
自动站间闭塞,当列车出发后,出站信号机应_______。[321030204]___
A. 自动关闭
B. 手动关闭
C. 经值班员联系后关闭
D. 自动开放
【单选题】
自动站间闭塞,当列车出发后,闭塞解除前,两站向该区间的出站信号机_______。[322030204]___
A. 不得再次开放
B. 可以再次开放
C. 自动关闭
D. 灭灯
【单选题】
自动站间闭塞,列车到达接车站,经过检查区间空闲后,闭塞_______。[322000000]___
A. 自动解除
B. 手动解除
C. 经过值班员联系后解除
D. 不需解除
【单选题】
区间正线上的_______须与有关信号机或闭塞设备联锁。[321000000]___
A. 轨道电路
B. 点灯单元
C. 道岔
D. 机车信号
【单选题】
ZD6转辙机速动爪与速动片的间隙,在解锁时不小于_______。[321010204]___
A. 0.2mm
B. 1.2mm
C. 1.5mm
D. 2mm
【单选题】
ZD6转辙机速动爪与速动片的间隙,在锁闭时为_______。[321010204]___
A. 0.3mm~1.7mm
B. 0.5mm~1.7mm
C. 0.3mm~2mm
D. 1mm~3mm
推荐试题
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用