【单选题】
160.(A320)当两个方向舵配平功能接通时:___
A. A.方向舵配平1和2一起控制它们的马达
B. B.方向舵配平1控制单配平马达
C. C.方向舵配平1控制其马达,方向舵配平2备份
D. D.机械装置将优先权给方向舵配平
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
161.(A320)当两个偏航阻尼器的功能都接通时:___
A. A.偏航阻尼器1优先,偏航阻尼器作动筒2随动
B. B.偏航阻尼器2优先,偏航阻尼器作动筒1随动
C. C.偏航阻尼器1和2工作,两个作动筒增压
D. D.液压装置将优先权给偏航阻尼器
【单选题】
163.(A320)方向舵行程限制是谁的一个功能:___
A. A.只是飞行增稳计算机(FAC)的一个功能
B. B.只是升降舵副翼计算机(ELAC)的一个功能
C. C.飞行增稳计算机(FAC)正常及升降舵副翼计算机(ELAC)备份的一个功能
D. D.升降舵副翼计算机(ELAC)正常及飞行增稳计算机(FAC)备份的一个功能
【单选题】
164.(A320)飞行增稳计算机的配平功能是:___
A. A.俯仰配平
B. B.方向舵配平
C. C.副翼配平
D. D.俯仰配平和方向舵配平
【单选题】
165.(A320)俯仰正常法则提供:___
A. A.机动+大迎角+高速+俯仰姿态保护
B. B.机动保护+俯仰姿态保护+低速稳定性
C. C.机动+俯仰姿态+高速保护
D. D.机动+大迎角+高速保护
【单选题】
166.(A320)关于襟/缝翼:___
A. A.SFCC2故障,SFCC1正常,则系统不受影响.
B. B.ECAM信息来自FPPU.
C. C.内外襟翼脱开信号直接送入SFC
D. D.WTB只能在地面复位.
【单选题】
167.(A320)过载保护的限制是什么:___
A. A.+2.5G,-1G,洁净形态或形态1
B. B.+2G,0,襟翼放出
C. C.+2G,0,襟翼形态1
D. D.A和B
【单选题】
168.(A320)襟翼扭力限制器在什么位置?___
A. A.作动筒齿轮箱.
B. B.作动筒驱动臂.
C. C.支持轴承.
D. D.PCU
【单选题】
169.(A320)可配平的水平安定面何时不能操作?___
A. A.黄和绿液压系统故障后
B. B.决不会失效,总是可人工使用
C. C.蓝液压系统故障后
D. D.飞行增稳计算机1和2失效后
【单选题】
170.(A320)哪套液压系统作动方向舵?___
A. A.绿
B. B.绿,蓝
C. C.绿,黄
D. D.绿,蓝,黄
【单选题】
171.(A320)哪些扰流板有卸载升力的作用?___
A. A.所有扰流板
B. B.1到3号扰流板
C. C.1到4号扰流板
D. D.2到4号扰流板
【单选题】
172.(A320)扰流板在地面怎样人工放出?___
A. A.保持液压并使用维护开锁装置.
B. B.液压系统释压,使用维护开锁装置.
C. C.按压SEC电门.
D. D.使用维护开锁装置,并按压SEC电门.
【单选题】
173.(A320)扰流板在飞机接地时自动放出的条件是?___
A. A.扰流板手柄预位,油门手柄在慢车或反推位.
B. B.扰流板手柄不预位,油门在慢车位.
C. C.只要油门在反推位.
D. D.只要扰流板手柄预位.
【单选题】
174.(A320)如果飞行增稳计算机1和2故障:___
A. A.脚蹬总是能控制方向舵
B. B.方向舵操纵失效
C. C.方向舵操纵由扰流板升降舵计算机3提供
D. D.方向舵操纵由扰流板升降舵计算机2提供
【单选题】
175.(A320)如果两个APPU探测到位置不同,则会发生什么故障?___
A. A.不一致
B. B.超速
C. C.脱开
D. D.反驱动
【单选题】
176.(A320)如果升降舵副翼计算机1和2故障:___
A. A.升降舵和俯仰配平由扰流板升降舵计算机1和2控制
B. B.俯仰操纵由飞行增稳计算机提供
C. C.只能通过配平手轮实现俯仰操纵
D. D.只能通过配平旋钮实现俯仰操纵
【单选题】
177.(A320)如果一个襟翼PCU马达不工作会导致:___
A. A.襟翼舵面的移动方式不受影响
B. B.系统会锁定,襟翼将无法移动
C. C.需要用备用方法放出襟翼
D. D.襟翼的移动将以半速进行
【单选题】
178.(A320)如果一个水平安定面配平马达失效,那么:___
A. A.水平安定面无法电配平
B. B.水平安定面以半速配平
C. C.水平安定面的配平功能失效
D. D.水平安定面电配平正常运作
【单选题】
179.(A320)如何可以探测到襟翼脱开?___
A. A.通过比较SFCC的指令和APPU的信号
B. B.通过比较SFCC的指令和FPPU的信号
C. C.通过比较APPU的信号和FPPU的信号
D. D.通过比较APPU的信号和
【单选题】
867.(A320)FMGC内部测试在何时自动进行:___
A. A.在地面,计算机通电时
B. B.两台计算机之间有偏差时
C. C.在空中发生失效时
D. D.在空中自动驾驶接通时
【单选题】
868.(A320)关于方向舵,错误的是:___
A. A.配平有反馈.
B. B.当两个FAC都失效时,行程限制器将转为全行程.
C. C.有机械备份操作
D. D.三套液压作动筒同时工作.
【单选题】
869.(A320)如果两个电磁阀都没有通电,没有指令电信号但液压动力正常,那么升降舵伺服作动器会工作在什么模式?___
A. A.作动模式
B. B.阻尼模式
C. C.重新定中模式
D. D.次级模式
【单选题】
870.(A320)如果一个电磁阀通电且液压正常,升降舵伺服作动器会工作在哪种模式___
A. A.作动模式
B. B.阻尼模式
C. C.重新定中模式
D. D.次级模式
【单选题】
EEC是怎样供电的?___
A. A.ACBUS#2.
B. B.电瓶一DCBUS#1
C. C.EEC专用发电机.
D.
【单选题】
u锁定功能防止缝翼收到0。如果:___
A. A.空速低于215节
B. B.迎角大于8。或空速低于165节
C. C.迎角大于7.6。或空速低于210节.
D.
【单选题】
当发动机起动,高压压缩引气valve:___
A. A.全并闭
B. B.全打开
C. C.调节.
D.
【单选题】
发动机低压燃油关断valve是如何控制的?___
A. A.由发动机火警按钮
B. B.探测到火警时自动作动
C. C.由主电门
D. A和C.
【单选题】
发动机反推使用:___
A. A.两台发动机都使用蓝系统
B. B.ENG2使用绿系统,ENG1使用黄系统
C. C.ENG2使用黄系统,ENGl使用绿系统.
D.
【单选题】
关于方向舵,错误的是:___
A. A.配平有反馈.
B. B.当两个FAC都失效时,行程限制器将转为全行程.
C. C.有机械备份操作.
D. D.套液压作动筒同时工作.
【单选题】
衿翼扭力限制器在什么位置?___
A. A.作动筒齿轮箱.
B. B.作动筒驱动臂.
C. C.支持轴承.
D. D.PCU.
【单选题】
哪个传感器用于衿,缝翼ECAM显示?___
A. A.APPU.
B. B.FPPU.
C. C.IPPU.
D. D.LVDT.
【单选题】
哪里选择点火A和B?___
A. A.发动机面板
B. B.ECAM控制面板
C. C.EEC.
D.
【单选题】
哪些计算机接受侧杆指令?___
A. A.ELAC.
B. B.FCDC
C. C.FAC,ELAC,SEC
D. D.FMGC
【单选题】
扭力限制器在什么地方?___
A. A.扭力轴
B. B.作动筒
C. C.PCU输出轴.
D.
【单选题】
扰流板在地面怎样人工放出?___
A. A.液压系统释压,使用维护开锁装置.
B. B.按压SEC电门.
C. C.使用维护开锁装置,并按压SEC电门.
D. D.保持液压并使用维护开锁装置.
【单选题】
扰流板在飞机接地时自动放出的条件是?___
A. A.扰流板手柄预位,油门手柄在慢车或反推位.
B. B.扰流板手柄不预位,油门在慢车位.
C. C.只要油门在反推位.
D. D.要扰流板手柄预位.
【单选题】
若滑油田油滤堵塞,则:___
A. A.驾驶舱内触发滑油滤堵塞警告
B. B.油滤上的目视堵塞指示器变为红色
C. C.滑油低压电门闭合.
D.
【单选题】
升降舵作动筒有什么工作方式?___
A. A.主动,随动
B. B.空中
C. C.A和B.
D.
【单选题】
什么用来防止金属粒子进入滑油田油泵:___
A. A.一个主金属屑探测器
B. B.回油滤
C. C.6个磁性金属屑探测器及泼、网.
D.
【单选题】
推力控制组件将推力手柄位置信号传送到:___
A. A.燃调组件
B. B.发动机接口组件(EIU)
C. C.EEC的两个通道.
D.
推荐试题
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.