刷题
导入试题
【单选题】
关于气象雷达下列说法错误的是:___
A. 当ND1和ND2都在PLAN模式下,气象雷达收发机自动断电。
B. WXR和PWS的信息都显示在ND上
C. WXR图像可以在ROSE和ARC模式下显示
D. PWS模式可以在ROSE和ARC模式下显示
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
PWS开关在自动位,下列哪个条件与PWS工作无关___
A. 一台发动机运转
B. 无线电高度低于2300英尺
C. 襟缝翼放出
D. ATC/TCAS旋钮开关置于AUTO位
【单选题】
PWS开关在自动位,下列哪个条件与PWS工作有关___
A. 一台发动机运转
B. WXR系统开关置于OFF位
C. 襟缝翼放出
D. 起落架放出
【单选题】
下列几种语音警告的优先顺序正确的是(音响警告优先级:FAC风切变-失速-气象雷达风切变探测-EGPWC-TCAS)___
A. 失速警告,气象雷达风切变探测警告,GPWS地形警告
B. 失速警告,,GPWS地形警告,气象雷达风切变探测警告
C. ,GPWS地形警告,失速警告,气象雷达风切变探测警告
D. 气象雷达风切变探测警告,失速警告,GPWS地形警告
【单选题】
PWS从ADIRU获得哪些数据用于计算风切变探测___
A. 指示空速、航迹角
B. 真空速、航迹角
C. 指示空速、俯仰角
D. 指示空速、倾斜角
【单选题】
无线电高度显示在___
A. PFD上姿态球下部
B. ECAM/SD永久显示区
C. ND左上角
D. A+B+C
【单选题】
当DME1在发射时,下列哪个系统接收被抑制:___
A. VOR
B. ILS
C. TCAS
D. RA
【单选题】
ND上图像信息显示优先顺序是ND显示的优先逻辑:风切变-EGPWC地形警告-气象信息___
A. EGPWS地形警告、PWS风切变警告、TCASRA
B. EGPWS地形警告、TCASRA、PWS风切变警告
C. TCASRA、EGPWS地形警告、PWS风切变警告
D. PWS风切变警告、EGPWS地形警告、TCASRA
【单选题】
“ALIGN”灯什么情况下会闪亮___
A. 当ADIRU校准结束
B. 在校准过程中出现IRS误差
C. 当进入NAV选择方式后5分钟内未输入当前位置
D. A+B+C
【单选题】
“Retard”语音信息在什么情况下出现___
A. 当RA低于10ft且A/T和AP脱开
B. 当RA低于10ft且A/T和AP处于LAND方式
C. 当RA低于20ft且A/T和AP处于LAND方式
D. 当RA低于10ft
【单选题】
1号AOA测试时,正常结果是___
A. 叶片向上转动5度
B. 叶片向下转动5度
C. 叶片向上转动15度
D. 叶片向下转动15度
【单选题】
3号空速管位于___
A. 机身前部左侧
B. 机身前部右侧
C. 机身后部左侧
D. 机身后部右侧
【单选题】
A320飞机上的ADM共有几个___
A. 6个
B. 7个
C. 8个
D. 9个
【单选题】
A320飞机有几个静压孔___
A. 3个
B. 4个
C. 5个
D. 6个
【单选题】
A320飞机有几个迎角传感器(AOA)___
A. 2个
B. 3个
C. 4个
D. 5个
【单选题】
A320飞机有几个总温探头(TAT)___
A. 2个
B. 3个
C. 4个
D. 5个
【单选题】
A320飞机有几根空速管___
A. 2根
B. 3根
C. 4根
D. 5根
【单选题】
ADF1故障时,ND上的显示会___
A. 出现红色的ADF指针符号和故障旗
B. 出现红色的ADF指针符号
C. 出现红色的ADF故障旗
D. 不再显示ADF信息
【单选题】
ADF安装在飞机的什么地方___
A. 前设备舱
B. 主设备舱
C. 前货舱
D. 后货舱
【单选题】
ADF的NCD数据如何显示___
A. 红色故障旗
B. 白色的虚线
C. 原有的地面台标和指针消失
D. 不显示
【单选题】
ADF方位角表示___
A. 飞机真航向和飞机与地面导航台连线之间的夹角
B. 飞机磁航向和飞机与地面导航台连线之间的夹角
C. 磁北方向和飞机与地面导航台连线之间的夹角
D. 机头和飞机与地面导航台连线之间的夹角
【单选题】
ADF天线预放大器的电源来自___
A. 飞机正常汇流条的28VDC
B. 飞机正常汇流条的115VAC
C. ADF提供的28VDC
D. ADF提供的12VDC
【单选题】
ADF指针可显示在___
A. ECAM
B. PFD
C. ND
D. MCDU
【单选题】
ADIRS(大气数据和惯性基准系统)的初始化校准可通过哪些设备进行___
A. MCDU(多功能控制显示组件)和RMP(无线电管理面板)
B. ADIRSCDU(ADIRS控制显示组件)
C. ADIRSCDU和FCU(飞行控制组件)
D. MCDU(多功能控制显示组件)和ADIRSCDU(ADIRS控制显示组件)
【单选题】
ADIRS的备用仪表系统包括___
A. 备用地平仪和备用磁罗盘
B. 备用地平仪、备用高度表和备用磁罗盘
C. 备用地平仪、备用高度表、备用空速表和备用磁罗盘
D. 备用地平仪、备用高度表、备用空速表、备用升降速表和备用磁罗盘
【单选题】
ADIRU3从哪儿接收GPS信号___
A. 仅GPS1
B. 仅GPS2
C. GPS1或GPS2
D. GPS1和GPS2
【单选题】
ADIRU3可从哪儿接收TAT信号___
A. 机长侧的TAT传感器
B. 副驾驶侧的TAT传感器
C. 备用TAT传感器
D. A+B+C
【单选题】
ADIRU使用的测量元件为___
A. 仅有激光陀螺
B. 仅有加速度计
C. 激光陀螺和加速度计
D. 固态速率陀螺
【单选题】
ADM的工作电压为___
A. 5VDC
B. 13.5VDC
C. 28VDC
D. 115VAC
【单选题】
ADR1故障时必须采取什么措施___
A. 将AIRDATA转换至CAP3位置
B. 保持AIRDATA在NORM位置
C. 将AIRHDG转换至CAP3位置
D. 保持AIRHDG在NORM位置
【单选题】
AOA的测试包含在ADR的哪个测试菜单中(针对LITTON公司的ADIRU)___
A. 地面检测
B. 输出测试
C. 系统测试
D. 接口测试
【单选题】
AOA的信号如何向ADIRU提供___
A. 直接提供
B. 通过ADM进行转换后提供
C. AOA3直接提供,AOA1和AOA2通过ADM进行转换后提供
D. 仅有AOA1直接提供
【单选题】
ATC1的高度信号来自于___
A. RA1和2
B. ADIRU1和ADIRU3
C. ADIRU1、2和3
D. RA和ADIRU
【单选题】
ATC的询问与回答频率分别是___
A. 1030MHz和1090MHz
B. 1090MHz和1030MHz
C. 1060MHz和1120MHz
D. 1120MHz和1060MHz
【单选题】
DDRMI的航向基准信号来自于___
A. ADIRU1
B. ADIRU2
C. ADIRU3
D. ADIRU1或ADIRU3
【单选题】
DDRMI的航向信号来自于___
A. ADIRU1或2
B. ADIRU1或3
C. ADIRU2或3
D. ADIRU1、2或3
【单选题】
DDRMI上的DME窗口显示虚线时,表示___
A. DME故障
B. DME超出范围
C. VOR故障
D. DDRMI故障
【单选题】
DMC1接收哪个RA的高度数据___
A. 仅接收RA1
B. 仅接收RA2
C. RA1,当RA2故障时
D. RA2,当RA1故障时
【单选题】
DME、ATC和TCAS是否可以同时工作___
A. 不能
B. 可以
C. DME工作不受影响
D. TCAS工作不受影响
【单选题】
DME和ATC之间的抑制同轴电缆作用是___
A. 抑制DME工作
B. 抑制ATC工作
C. 当其中一个组件发射时,抑制另一个接收
D. 抑制同时发射和接收
【单选题】
DME天线位于___
A. 机身上前部和机身下前部
B. 机身上前部
C. 机身下前部
D. 机身尾部
推荐试题
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用