【单选题】
起落架重力放出后,如绿系统压力可用,起落架操作能否恢复正常?___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
起落架指示面板402VU接受来自微动电门以及与下列哪一项相连的临近电门的信息?___
A. ALGCIU1
B. BLGCIU2
C. C以上两者
D. DBSCU
【单选题】
靠近起落架手柄的红色箭头何时亮?___
A. A在进近形态时,起落架未能放下锁定
B. B起落架在收起后未能收上锁定
C. C起落架不在指令位
D. D起落架卡阻
【单选题】
在哪种情况下,起落架指示面板上UNLK灯亮?___
A. A起落架在所选位置未锁定
B. B起落架重力放出,舱门未关闭
C. C起落架正常放出,舱门未锁定
D. D起落架放下锁好
【单选题】
当速度大于260KT时,哪个ADIRS信号用于关闭安全valve?___
A. AADIRS1
B. BADIRS1和3
C. CADIRS2和3
D. DADIRS1和2
【单选题】
A320在飞机内有无目视检查起落架放下锁定的方法?___
A. A有,通过观察镜观察
B. B有,可打开盖板直接接近起落架检查
C. C无
D.
【单选题】
用手柄重力放起落架时需如何转动曲柄:___
A. A顺时针转五圈
B. B逆时针转五圈
C. C顺时针转三圈
D. D逆时针转三圈
【单选题】
哪一个液压系统给起落架正常操纵和前轮转弯供压?___
A. A蓝系统
B. B绿系统
C. C黄系统
D. D黄系统或绿系统
【单选题】
什么时候UNLK(未锁定)灯亮?___
A. A当一个起落架和相应舱门未收上锁定
B. B当一个起落架未放下锁定
C. C当一个起落架未在选择的位置锁定
D. D当一个起落架在选择的位置锁定
【单选题】
控制起落架正常操纵顺序的是:___
A. A顺序的任一个LGCIU
B. B同时的两个LGCIU
C. C手柄
D. DBSCU
【单选题】
飞机着陆前后,下ECAM自动显示什么页面?___
A. AENG页面
B. BF/CTL页面
C. CDOOR/OXY页面
D. DWHEEL页面
【单选题】
给出起落架的ECAM显示的组件是:___
A. A顺序的任一个LGCIU
B. B同时的两个LGCIU
C. C只是LGCIU1
D. DBSCU
【单选题】
哪个液压系统给正常刹车供压?___
A. A蓝系统
B. B黄系统
C. C绿系统
D. D黄系统或绿系统
【单选题】
哪个液压系统给备用刹车供压?___
A. A蓝系统
B. B黄系统
C. C绿系统
D. D黄系统或绿系统
【单选题】
停留刹车在ON位时,其它刹车方式:___
A. A都失效
B. B都可用
C. C备用刹车仍可用
D. D脚蹬可超控
【单选题】
在什么刹车方式下,地面减速板打起几秒后,渐增的刹车压力被送到刹车?___
A. AMAX方式
B. BMED方式
C. CLO方式
D. DB和C
【单选题】
自动刹车预位的条件是:___
A. A绿系统有压力,防滞系统有电,正常刹车系统无故障,选择一个减速率
B. B绿系统有压力,防滞系统有电,备用刹车系统无故障,选择一个减速率
C. C黄系统有压力,防滞系统有电,选择一个减速率
D. D黄系统有压力,防滞系统有电,正常刹车系统无故障,选择一个减速率
【单选题】
仅剩绿系统时,自动刹车:___
A. A失去
B. B正常可用
C. C工作在备用方式
D. D可用但无防滞
【单选题】
使用手轮时的前轮转弯最大角度是:___
A. A±6°
B. B±180°
C. C±95°
D. D±74°
【单选题】
起落架重力放下后前轮转弯:___
A. A不受影响
B. B失效
C. C工作在备用方式
D. D由蓝系统供压
【单选题】
当防滞和前轮转弯操纵开关置于OFF位时:___
A. A只有前轮转弯断开
B. B防滞和前轮转弯断开
C. C防滞提供固定的飞机减速
D. D只有防滞断开
【单选题】
前轮转弯的动力由谁提供:___
A. A液压系统
B. B电气系统
C. C气源系统
D. D燃油系统
【单选题】
前轮转弯何时不可用?___
A. A起落架舱门打开时
B. B前起落架舱门关闭时
C. C所有起落架舱打开时
D. D重力放下起落架后
【单选题】
前轮转弯的动力由谁提供?___
A. A黄液压系统
B. B绿液压系统
C. C黄和绿液压系统
D. D蓝液压系统
【单选题】
两个手轮同时操纵时:___
A. A第一个操纵的手轮的的信号优先
B. B机长的信号优先
C. C信号被代数叠加
D. D副驾驶的信号优先
【单选题】
刹车方式包括:___
A. A正常有或无防滞,备用无防滞,停留刹车
B. B正常有防滞,备用无防滞,停留刹车,自动刹车
C. C正常或备用有防滞,备用无防滞,停留刹车
D. D正常刹车,备用刹车,自动刹车,防滞刹车,停留刹车
【单选题】
用方向舵进行前轮转弯操纵时:___
A. A所有情况下最大6°
B. B取决于飞机的速度,最大6°
C. A所有情况下最大74°
D. D取决于飞机的速度,最大74°
【单选题】
起落架的位置由谁指示:___
A. A中央仪表板上的一个面板,ECAM或目视检查窗
B. B中央仪表板及顶板上的一个面板
C. C只由ECAM
D. D中央仪表板上的一个面板及ECAM
【单选题】
在何时可通过手轮进行前轮control:___
A. A飞机在地面,速度低于80KT,双发工作,牵引杆在正常位
B. B地面或空中,速度低于80KT,双发工作,牵引杆在正常位
C. C飞机在地面,速度低于80KT,单发工作,牵引杆在正常位
D. D飞机在地面,速度低于80KT,单发或双发,牵引杆在正常位
【单选题】
起飞后,如果左主起落架减震支柱卡在压缩位:___
A. A起落架可在任何情况下收起(安全)
B. B前轮定中时,起落架可收起
C. C起落架无法收起,起落架收放手柄被锁在下位
D. D起落架总是可以用人工曲柄备用收起
【单选题】
刹车由两个独立系统驱动,它们由谁增压?___
A. A蓝和绿液压系统
B. B黄和绿液压系统
C. C蓝和黄液压系统
D. D红和绿液压系统
【单选题】
备用刹车系统动力源来自:___
A. A黄液压系统
B. B刹车储压器
C. CA和B
D. D绿液压系统
【单选题】
可以只用刹车储压器作为动力的刹车模式为:___
A. A正常有防滞
B. B备用有防滞
C. C备用无防滞
D. D自动刹车
【单选题】
飞行中,如将停留刹车置于ON位,上ECAM的PARKBRK备忘显示为:___
A. A绿色
B. B琥珀色
C. C蓝色
D. D红色
【单选题】
防滞功能是通过哪一项来实现的?___
A. A比较四个机轮的速度差
B. B将轮速与飞机参考速度比较
C. C比较左右主起落架轮速
D. D人工间隙松开刹车
【单选题】
ADIRS1和ADIRS3失效后,防滞仍可用吗?___
A. A仍可用
B. B不可用
C. CADIRS2正常时就可用
D. DSEC工作正常时就可用
【单选题】
绿液压系统可用时,如防滞和前轮转弯开关放在OFF位:___
A. A正常刹车,前轮转弯失效
B. B备用刹车,前轮转弯正常
C. C正常刹车无防滞,前轮转弯失效
D. D备用刹车无防滞,前轮转弯失效
【单选题】
如备用刹车使用黄液压系统工作,则自动刹车:___
A. A仍可用,且有防滞
B. B失效
C. C仍可用,但无防滞
D. D不受影响
【单选题】
WhendoestheautomaticchangeoveroftheLGCIUsincontroloccur?___
A. A.When"DOWN"isselected
B. B.When"UP"isselected
C. C.Whenthefirstenginestarts
D. D.Whenthelandinggeararecompressed
【单选题】
WhichunitgivesthelandinggearpositiontoECAMdisplay?___
A. A.EitherLGCIUinturn
B. B.BothLGCIUssimultaneously
C. C.LGCIU1only
D. D.LGCIU2only
【单选题】
Whichunitgivesthelandinggearpositiontolandinggearindicatorpanel?___
A. A.EitherLGCIUinturn
B. B.BothLGCIUssimultaneously
C. C.LGCIU1only
D. D.LGCIU2only
推荐试题
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key