刷题
导入试题
【单选题】
起飞和着陆的最大燃油不平衡是:___
A. 750KG
B. 1500KG
C. 2000KG
D. 5000KG
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
油箱内电容探头的作用是什么?___
A. 测量油面
B. 测量油温
C. 测量密度
D. 以上A和B
【单选题】
机翼油箱中各有几个泵?___
A. 机翼油箱中各有两个泵
B. 没有燃油泵,因为油箱是空气增压的
C. 机翼油箱中各有一个泵
D. 所有油箱中共有两个泵
【单选题】
燃油计算系统中使用了多少个通道?___
A. 3
B. 1
C. 2
D. 4
【单选题】
燃油加油控制面板位于:___
A. 左侧机腹整流罩
B. 右侧机腹整流罩
C. 右大翼加油接头旁边
D. 驾驶舱内
【单选题】
正常情况下,在哪里可检查各油箱油量?___
A. ECAM上部显示,燃油页面
B. 仅在ECAM下部显示燃油页面
C. ECAM上部显示
D. ECAM上部显示,或加油操纵面板
【单选题】
回油valve由谁控制:___
A. FMGC
B. FADEC
C. FLSCU
D. FQI
【单选题】
APU的燃油由谁提供?___
A. 油箱泵
B. APU燃油泵
C. APU燃油组件的燃油泵
D. A和B
【单选题】
机翼油箱泵按钮上的失效灯亮是什么意思?___
A. 供油压力太高
B. 供油压力下降
C. 按钮在关闭位
D. A和B
【单选题】
发动机燃油低压valve由谁关闭:___
A. 发动机防火按钮或中央油箱传输valve控制逻辑
B. 发动机防火按钮或方式选择按钮设在人工
C. 发动机防火按钮或发动机主电门
D. A+B+C
【单选题】
当机翼油箱油泵按钮设在OFF位时,失效灯:___
A. 被抑制
B. 压力下降时亮
C. 发动机启动时亮
D. A或B
【单选题】
燃油过滤器阻塞时发动机还有供油吗?___
A. 有,用来自IDG冷却和外侧油箱管路的燃油
B. 没有
C. 有,绕过燃油过滤器(旁通valve)
D. A+C
【单选题】
在交输按钮上,白灯“ON”是什么意思?___
A. valve完全打开
B. valve关闭
C. valve处于运动过程
D. valve自动控制功能打开
【单选题】
中央油箱供油时,大翼油箱油泵按钮设在ON位,大翼油箱泵是否运转?___
A. 是的,大翼油箱泵总是运转。
B. 不,只在中央油箱空的时候。
C. 不,因为中央油箱泵优先。
D. 是的,因为大翼油箱优先。
【单选题】
发动机低压燃油valve关闭于:___
A. 燃油增压泵压力下降时。
B. 发动机关车时或发动机火警按钮按出时。
C. 发动机火警探测系统探测到发动机火警。
D. 机翼油箱油泵按钮设在OFF位时
【单选题】
当内侧油箱油面低时,___
A. 一个内油箱转换valve打开。
B. 一侧大翼内的两个转换valve打开。
C. 每侧大翼内,各一个转换valve打开。
D. 因为中央油箱泵优先供油
【单选题】
油量为多少时,ECAM上显示“LOLVL”(低油面)警告?___
A. 少于500公斤(1100磅)
B. 大于900公斤(1980磅)
C. 少于750公斤(1650磅)
D. 少于250公斤(550磅)
【单选题】
在单发工作时,如果相应达到低油面:___
A. 交输valve必须保持打开
B. 交输valve必须关闭
C. 另一发的燃油失去
D. 交输valve自动保持打开
【单选题】
燃油面板方式选择按钮上的琥珀色失效灯何时燃亮:___
A. 供油压力下降时
B. 中央油箱大于250公斤,任何机翼油箱少于5000公斤
C. 两个中央油箱泵选择在关位
D. 按钮被松出
【单选题】
在地面如果伸出缝翼,中央油箱有油,选择自动(供油)方式,发动机启动一分钟后,会发生什么?(2分钟后停止运转)___
A. 中央油箱泵继续运转。
B. 中央油箱泵关。
C. 大翼油箱泵关。
D. 交输valve自动保持打开
【单选题】
如何检查油量指示处于降级方式?___
A. 油量指示为琥珀色
B. 油量指示的后两位数字被短虚线代替,但无法确定哪一侧受影响
C. 油量指示的后两位数字被短虚线代替,ECAM燃油页面必须调出以检查哪个油箱受影响
D. 对应受影响的油箱的油量指示在ECAM燃油页面上闪烁
【单选题】
在正常压力下,加油时间为多少(近似)___
A. 所有油箱20分钟
B. 机翼油箱17分钟
C. 所有油箱30分钟
D. 以上A或B
【单选题】
油箱通气系统通过______防止由于飞机机动飞行时燃油进入通气系统___
A. 过压保护器
B. 橡皮单向valve
C. 通风浮子valve
D.
【单选题】
关于中央油箱通气系统说法正确的是___________
A. 中央油箱向左通气油箱通气
B. 中央油箱向左和右通气油箱通气
C. 中央油箱自己有通气系统
D.
【单选题】
安装在NACA型进气口下游的熄焰器的作用是__________
A. 防止过压
B. 防止外部火焰进入油箱
C. 防止燃油从气管流出
D.
【单选题】
对于油箱自动加油顺序说法正确的是__________
A. 先加中央油箱,再加大翼外油箱
B. 先加中央油箱,再加大翼内油箱
C. 先加大翼外油箱,再加大翼内油箱
D.
【单选题】
关于大翼内部传输valve说法正确的是__________
A. 每侧大翼两个
B. 每侧大翼一个
C. 每边一个
D.
【单选题】
大翼内部传输valve何时打开___
A. 任一大翼外侧油箱的低油位传感器变干时
B. 任一大翼内侧油箱的低油位传感器变干时
C. 任一大翼内侧油箱的高油位传感器变干时
D.
【单选题】
机翼油箱中各有几个泵___
A. 机翼油箱中各有1个泵
B. 机翼油箱中各有两个泵
C. 没有燃油泵,因为油箱是空气增压的
D.
【单选题】
哪个油箱装有温度传感器___
A. 中央油箱
B. 中央油箱和大翼油箱
C. 大翼油箱
D.
【单选题】
对于燃油冷却IDG滑油系统说法正确的是__________
A. FLSCU1和ECU1控制左大翼再循环系统
B. FLSCU2和ECU2控制左大翼再循环系统
C. FLSCU1和ECU2控制右大翼再循环系统
D.
【单选题】
冷却完IDG滑油的热燃油将回到哪个油箱中去___
A. 大翼外油箱
B. 大翼内油箱
C. 中央油箱
D.
【单选题】
接收油箱内各油量传感器给出的信号,控制加油或供油的进行是_____计算机的功能___
A. FLSCU
B. FQIC
C. REFUELCONTROLPANEL
D.
【单选题】
燃油系统主要的计算机有___________
A. 一个FQIC和一个FLSCU
B. 一个FQIC和两个FLSCU
C. 两个FQIC和两个FLSCU
D.
【单选题】
关于燃油沉淀的检查,说法正确的是___
A. 放出1~2L后,再取样进行检查
B. 可以直接用量杯放出1~2L进行检查
C. 如果发现有杂质,需要立即进行油箱清理工作
D.
【单选题】
自动加油的时候,加油面板上的预选油量输入的是__________
A. 加入的油量
B. 实际的油量
C. 加油完成后的机载油量
D.
【单选题】
左大翼往右大翼串油时,_______的加油valve应打开。___
A. 左大翼
B. 右大翼
C. A+B
D.
【单选题】
油样采集应在加油完成后______分钟___
A. 10
B. 20
C. 30
D.
【单选题】
飞机加油时应注意____________
A. 防火
B. 燃油污染
C. A+B
D.
【单选题】
如果任何人员被燃油喷中,或衣服被燃油浸湿,应___________
A. 撤离到安全地带,脱下衣服用水冲洗身体。
B. 撤离到安全地带,擦净即可。
C. 没关系
D.
【单选题】
防撞灯打开时,加油车能否接近飞机?___
A. 能
B. 不能
C. 可以,现场只要有灭火瓶
D.
推荐试题
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用