刷题
导入试题
【单选题】
襟翼扭力限制器在什么位置?___
A. 作动筒齿轮箱.
B. 作动筒驱动臂.
C. 支持轴承.
D. PCU.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
接通液压泵前检查各飞控操纵手柄在______的位置___
A. 收起
B. 放出
C. 和舵面一致
D.
【单选题】
哪一个燃油箱首先给发动机供油:___
A. A.中央油箱
B. B.内侧油箱
C. C.外侧油箱
D. D.机翼油箱
【单选题】
当中央油箱燃油被用完,在自动方式时,中央油箱燃油泵:___
A. A.必须人工关断
B. B.自动停止
C. C.仍然运转但有警告表示无燃油
D. D.仍然运转且无警告
【单选题】
对于油箱通气系统,下列说法不正确的是:___
A. A.位于机翼翼尖部的通气油箱正常情况下不储存燃油
B. B.右侧机翼内格油箱压力过高时,可向中央油箱释压
C. C.中央油箱通过左侧通气油箱通气
D. D.当看不到通气油箱过压保护器上完整的十字叉时,说明通气油箱通气口可能堵塞
【单选题】
机翼油箱的传输valve打开,则___
A. A.说明该侧机翼内格油箱的燃油已用尽
B. B.当内格油箱内燃油上升到一个定值后自动关闭
C. C.将保持打开直到下一次飞机加油
D. D.当外格油箱内的燃油全部流入内格油箱后其自动关闭
【单选题】
通气浮子valve:___
A. A.防止燃油进入通气管路
B. B.允许燃油从通气管路排出
C. C.保持燃油箱增压
D. D.保证燃油不会因为低压而汽化
【单选题】
下列关于APU燃油供给正确的说法是:___
A. A.APU的燃油只能由一单相115VAC马达驱动的专用燃油泵供给
B. B.APU的燃油泵可以由电瓶通过静变流机供电
C. C.按压APU舱内的燃油通气按钮,APU的燃油泵不工作,APU低压关断valve打开
D. D.APU只能由左大翼油箱供给燃油
【单选题】
下列关于加油面板操作正确的是:___
A. A.任何时候进行高油量测试,三个高油量蓝色灯都点亮
B. B.当方式选择电门置位于REFUEL位时,琥珀色OPEN灯点亮
C. C.进行自动加油时,三个加油valve选择电门都处于NORM位
D. D.以上答案都不正确
【单选题】
下列关于燃油系统叙述正确的是:___
A. A.正常情况下,外格油箱不储存燃油
B. B.飞机燃油储存于中央油箱和左右内/外格共五个互不相通的油箱中
C. C.所有燃油系统的工作均是由FQIC来进行控制的
D. D.加油面板位于右侧机腹整流罩上
【单选题】
下列关于燃油指示系统说法不正确的是:___
A. A.燃油指示系统由FQIC和FLSCU控制
B. B.FULLLEVEL/UNDERFULLLEVEL传感器的作用是控制中央燃油泵的自动方式工作
C. C.当飞机在地面被顶起起落架内筒完全伸出时,FQIC无电供给,不能进行加油/抽油操作
D. D.当飞机无电时,可通过油量磁性指示器读取燃油量
【单选题】
下列哪一种情况和中央油箱燃油泵自动工作方式无关:___
A. A.缝翼放出
B. B.中央油箱内低油量
C. C.机翼油箱燃油泵低压
D. D.IDG滑油冷却/燃油再循环
【单选题】
当一侧机翼内格油箱的低油面传感器变干时,___
A. A.一侧机翼里的二个传输valve打开
B. B.一侧机翼里的一个传输valve打开
C. C.每侧机翼里各有一个传输valve打开
D. D.该侧机翼的燃油泵自动停止工作
【单选题】
中央油箱燃油泵工作于自动方式,则___
A. A.任何时候,只要缝翼放出,两个泵停止工作
B. B.当中央油箱内的两个低油面传感器变干,两个泵立即停止工作
C. C.要人工关断油泵,必须先将其工作方式转为人工方式
D. D.当机翼内格油箱的两个满量传感器都变湿时,中央燃油泵停止工作直到相应机翼油箱用去至少500KG燃油
【单选题】
A320燃油油箱最大容量是多少?___
A. A.41736LBS(18964KG)
B. B.45920LBS(20866KG)
C. C.52174LBS(23707KG)
D. D.32890LBS(14932KG)
【单选题】
左内格油箱过压,可向哪里释压?___
A. A.外格油箱
B. B.中央油箱
C. C.机外
D. D.以上都正确
【单选题】
A320机翼油箱中各有几个泵?___
A. A机翼油箱中各有两个泵
B. B没有燃油泵,因为油箱是空气增压的
C. C机翼油箱中各有一个泵
D. D所有油箱中总共有两个泵
【单选题】
正常情况下,在哪里可检查各燃油箱油量?___
A. A上ECAM燃油页面
B. B在下ECAM燃油页面
C. C上ECAM显示
D. D上ECAM显示或加油操纵面板
【单选题】
燃油油量指示(FQI)系统有几个通道?___
A. A3
B. B1
C. C2
D. D4
【单选题】
通气油箱通气口位于何处?___
A. A机翼外侧下部
B. B机翼内侧下部
C. C机翼外侧上部
D. D机翼内侧上部
【单选题】
你如何检查燃油油量指示处于降级方式?___
A. A油量指示为琥珀色
B. B油量指示的后两位数字被短虚线代替,但无法确定哪一侧受影响
C. C油量指示的后两位数字被短虚线代替,ECAM燃油页面必须调出,以检查哪个油箱受影响
D. D对应受影响的油箱的油量指示在ECAM燃油页面上闪烁
【单选题】
燃油回油valve(FRV)由谁控制:___
A. AFMGC
B. BFADEC
C. CFLSCU
D. DFQIC
【单选题】
机翼油箱泵按钮上的琥珀色失效灯何时燃亮:___
A. A供油压力下降时
B. B油泵未通电时
C. C无故障时按钮设在OFF位
D. D机翼油箱油量少于750KG
【单选题】
方式选择电门上的琥珀色失效灯何时点亮:___
A. A供油压力下降时
B. B中央油箱大于250公斤,任何机翼油箱少于5000公斤
C. C两个中央油箱泵选择在关位
D. D大翼油箱燃油泵故障
【单选题】
最大加油压力为:___
A. A50PSI
B. B36PSI
C. C11PSI
D. D35PSI
【单选题】
在上ECAM页面,机载油量指示呈琥珀色且被框起一半是什么意思?___
A. A所显示的油量不是完全可用
B. B油量显示降级
C. C油量显示正常
D. D所显示的油量完全不可用
【单选题】
除了给发动机供油外,燃油还有什么用途?___
A. A冷却IDG滑油
B. B冷却发动机滑油
C. C冷却液压油
D. DA和B都正确
【单选题】
APU的燃油可由谁供应?___
A. A油箱燃油泵
B. BAPU燃油泵
C. C油箱燃油泵和APU燃油泵
D. DAPU燃调抽吸作用
【单选题】
各油箱中为何有2%的额外空间?___
A. A用于散热
B. B用于燃油膨胀不致溢出
C. C制造工艺水平限制
D. D无特殊目的
【单选题】
发动机低压燃油valve由谁关闭?___
A. A发动机火警电门或中央油箱传输valve控制逻辑
B. B发动机火警电门或方式选择电门设在人工位
C. C发动机火警电门或发动机主电门
D. D以上都不对
【单选题】
在正常操作时,交输valve:___
A. A当中央油箱油量大于100KG且任何油箱油量少于5000KG时,自动打开
B. B起飞时人工关闭
C. C起飞时人工打开
D. D由方式选择按钮开关自动打开
【单选题】
燃油滤堵塞时发动机还有供油吗?___
A. A有,用来自IDG冷却管路的燃油
B. B没有
C. C有,绕过燃油滤(旁通valve)
D. A有,用来自外格油箱管路的燃油
【单选题】
在交输按钮上,绿色OPEN灯亮表示:___
A. Avalve完全打开
B. Bvalve完全关闭
C. Cvalve处于过渡过程
D. Dvalve不在全关位
【单选题】
中央油箱供油时,大翼油箱泵是否运转?___
A. A是的,只要泵电门接通
B. B不,只在中央油箱空的时候
C. C不,因为中央油箱泵优先
D. D不,因为大翼油箱泵优先
【单选题】
何时发动机低压燃油valve关闭?___
A. A燃油增压泵压力下降时
B. B发动机关车时或发动机火警按钮按出时
C. C发动机火警探测系统探测到发动机火警
D. D一直打开,无法关闭
【单选题】
当一个内格油箱油面低时,___
A. A一个内格油箱传输valve打开
B. B一侧大翼内的两个传输valve打开
C. C每侧大翼内,各一个传输valve打开
D. D飞机需要加油
【单选题】
给飞机加油时,机翼油箱加油的顺序是:___
A. A先内格,满了再外格
B. B先通气油箱,再外格,最后内格
C. C燃油量同时增加
D. D先外格,满了再内格
【单选题】
飞行中如果中央油箱有油,选择自动(供油)方式,伸出缝翼会发生什么?___
A. A中央油箱泵开
B. B中央油箱泵关
C. C中央油箱泵维持原方式
D. D中央油箱泵工作5分钟后关
【单选题】
在地面如果伸出缝翼,中央油箱有油,选择自动(供油)方式,发动机启动一分钟后,会发生什么?___
A. A中央油箱泵仍在运转
B. B中央油箱泵停止
C. C大翼油箱泵关
D. D以上都不对
【单选题】
供油方式选择按电门制:___
A. A中央和大翼油箱泵
B. B只是中央油箱泵
C. C只是大翼油箱泵
D. D交输valve
【单选题】
自动(供油)方式下,中央油箱空了,中央油箱泵:___
A. A必须人工关断
B. B自动停止供油,并且大翼油箱泵开始运转
C. C自动停止供油
D. D以上都不对
推荐试题
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用