刷题
导入试题
【单选题】
组件控制器的作用是什么___
A. A.控制相应的组件和FCV
B. B.控制配平valve
C. C.控制area控制器
D. D.控制座舱增压
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
掺混空气valve由什么控制器控制?___
A. A.组件控制器
B. B.area控制器
C. C.管道过热传感器
D. D.D热空气压力调节valve
【单选题】
当ECONFLOW电门在off位时,空调的流量是___
A. A.经济流量
B. B.正常流量
C. C.经济流量+20%
D. D.正常流量+20%
【单选题】
电子舱通风系统的作用是___
A. A.避免电子舱机构损坏
B. B.确保电子舱保持足够的温度
C. C.给电子舱通风
D. D.避免电子舱有通风
【单选题】
对于ECAM座舱压力页面,描述正确的是___
A. A.当VENT指示是白色的时候,说明系统不正常
B. B.当VENT指示是黄色的时候,说明进气扇或排气扇故障
C. C.当VENT指示是黄色的时候,说明进气扇故障
D. D.当VENT指示是黄色的时候,说明排气扇有故障
【单选题】
对于南航的A320机队,以下对前后货舱加温的描述,哪个是正确的___
A. A.前货舱有加温,后货舱没有加温
B. B.前货舱没有加温,后货舱有加温
C. C.前后货舱都没有加温
D. D.前后货舱都有加温
【单选题】
对于area温度调节,以下说法正确的是___
A. A.热空气来自配平valve,冷空气来自混合总管
B. B.冷空气来自配平valve,热空气来自混合总管
C. C.热空气来自配平valve和混合总管
D. D.冷空气来自配平valve和混合总管
【单选题】
关于货舱加温,以下哪个说法是错误的___
A. A.货舱加温控制器控制和监控隔离valve和排气扇
B. B.货舱门打开时,货舱加温一样可以工作
C. C.热空气压力调节valve关闭的时候,配平valve也关闭
D. D.在空中,当压差大于1,排气扇停止工作
【单选题】
空调面板上的"HOTAIR"电门放到OFF位时___
A. A.热空气压力调节valve和配平valve关闭
B. B.空调组件旁通valve关闭以降低组件出口温度
C. C.area控制器失效
D. D.以上都不对
【单选题】
空调组件控制器PC和area控制器ZC各有几个___
A. A.PC1个,ZC1个
B. B.PC1个,ZC2个
C. C.PC2个,ZC1个
D. D.PC2个,ZC2个
【单选题】
area控制器的作用是___
A. A.控制area温度
B. B.控制流量控制valve
C. C.控制组件
D. D.控制组件控制器
【单选题】
如果设备冷却供气扇和排气扇电门放到超控位___
A. A.排气扇停止工作
B. B.蒙皮热交换器出口和入口旁通valve关闭
C. C.空调进气valve和蒙皮排气valve部分打开
D. D.以上都对
【单选题】
什么时候会出现PACKOVHT的信息___
A. A.压缩机出口过热
B. B.组件出口过热
C. C.压缩机和组件出口都过热
D. D.压缩机或组件出口过热
【单选题】
以下哪个说法是错误的___
A. A.起飞降落阶段,充压进气门全关以防止外物进入
B. B.充压进气门用于调节进入热交换器的空气流量
C. C.当需要提高温度时,旁通valve会增加开度
D. D.以上都对
【单选题】
用于调节客舱压力的配平空气必须___
A. A.与客舱空气压力一致
B. B.比客舱空气压力高4psi
C. C.比客舱空气压力小4psi
D. D.以上都不对
【单选题】
厕所和厨房通风系统用的是哪个area的空气___
A. A.驾驶仓
B. B.客舱
C. C.电子仓
D. D.货舱
【单选题】
充压进气门的作用是___
A. A.在组件失效时确保客舱通风
B. B.供气给组件压缩机
C. C.调节到热交换器的空气流量
D. D.以上都不对
【单选题】
当出现area调节故障,计算机两个通道都失效时的时候___
A. A.热空气压力调节valve和配平valve关闭
B. B.左组件固定在20度
C. C.右组件固定在10度
D. D.以上都是
【单选题】
当电子设备通风系统排气扇电门上的故障灯亮的时候___
A. A.排气压力低
B. B.计算机供电故障
C. C.烟雾警告
D. D.以上都有可能
【单选题】
当驾驶仓温度低于设定的温度时,从下ECAM空调页面可以观察到___
A. A.驾驶仓管道温度上升,驾驶仓配平valve继续打开
B. B.驾驶仓管道温度下降,驾驶仓配平valve继续打开
C. C.驾驶仓管道温度上升,驾驶仓配平valve继续关闭
D. D.驾驶仓管道温度下降,驾驶仓配平valve继续关闭
【单选题】
当组件控制器失效,温度由以下哪一个部件控制___
A. A.流量控制valve
B. B.旁通valve
C. C.防冰valve
D. D.以上都不对
【单选题】
当组件入口压力传感器探测到组件入口压力太小___
A. A.旁通valve增大开度以减小组件的压差
B. B.充压进气门增大开度
C. C.AB都不对
D. D.AB都对
【单选题】
关于座舱增压,以下哪个描述是正确的___
A. A.座舱高度正常保持在ATA8000英尺
B. B.到达9550英尺的时候,触发主警告,到达11300英尺,触发旅客信号
C. C.到达15000英尺,外流valve和安全valve关闭
D. D.以上都对
【单选题】
空调组件的防冰valve的作用是___
A. A.防止主热交换器结冰
B. B.防止次级热交换器结冰
C. C.防止补偿器结冰
D. D.以上都不对
【单选题】
空调组件的旁通valve的作用是___
A. A.减少到压缩机的流量
B. B.调节组件出口温度
C. C.增加到涡轮的空气流量
D. D.以上都不对
【单选题】
流量控制valve下面哪种情况不关闭___
A. A.组件控制器失效
B. B.发动机启动
C. C.火警电门作动
D. D.DITCHING电门接通
【单选题】
配平valve的作用是___
A. A.加入冷空气来调节area温度
B. B.加入热空气来调节area温度
C. C.调节热空气压力
D. D.调节热空气流量
【单选题】
area控制器调节用的基本温度是___
A. A.最低的area温度
B. B.用最高的area温度
C. C.用三个仓的中间值
D. D.用三个仓的平均值
【单选题】
以下哪个传感器会送压缩机过热信号给组件控制器___
A. A.压缩机过热传感器
B. B.压缩机温度传感器
C. C.B都不是
D. D.B都是
【单选题】
当组件出口温度大于95摄氏度,就会触发组件过热警告,请问这个温度信号是由哪个传感器送出的___
A. A.压缩机过热传感器
B. B.组件出口温度传感器
C. C.水分离器出口温度传感器
D. D.压缩机温度传感器
【单选题】
当座舱高度大于9550英尺的时候,座舱压力控制器送信号到哪个控制器来触发旅客信号?___
A. A.FWC
B. B.CFDIU
C. C.CIDS
D. D.AIDS
【单选题】
对外流valve,以下说法不正确的是___
A. A.外流valve有三个马达
B. B.外流valve有两个电器盒
C. C.外流valve有一个反馈组件用于在自动和人工位反馈valve位置
D. D.外流valve可以自动控制及人工控制
【单选题】
关于空调系统的控制器___
A. A.两个空调组件控制器可以互换
B. B.area控制器和货舱加温控制器可以互换
C. C.组件控制器和area控制器可以互换
D. D.座舱压力控制器可以和组件控制器互换
【单选题】
关于外流valve的描述,以下哪个是正确的___
A. A.1号马达由1号控制器控制
B. B.2号马达由2号控制器控制
C. C.3号马达由座舱增压面板控制
D. D.以上都对
【单选题】
混合总管可以从哪里接近?___
A. A.前货舱前壁板
B. B.前货舱后壁板
C. C.后货舱前壁板
D. D.后货舱后壁板
【单选题】
ECAM哪几个页面可以看到空调系统的数据___
A. A.引气和空调页面
B. B.座舱压力页面
C. C.巡航页面
D. D.以上都可以
【单选题】
EIU和空调系统的控制器之间是如何进行数据交换的___
A. A.EIU送信号给组件控制器起飞推力的信号以关闭充压进气门
B. B.EIU送高压燃油valve信号给area控制器以计算引气需求
C. C.area控制器送信号给EIU,引气流量增加时增加发动机推力
D. D.以上都是
【单选题】
当厕所和厨房风扇失效时___
A. A.客舱温度调节失效
B. B.客舱管道温度固定在15摄氏度
C. C.驾驶仓温度调节正常
D. D.以上都对
【单选题】
当接通空调面板的RAMAIR电门时___
A. A.DITCHING电门在正常位时,充压进气门打开
B. B.当客舱压差小于1时,外流valve完全打开
C. C.以上都不是
D. D.A+B
【单选题】
以下说法不正确的是___
A. A.安全valve有两个,一个防止正压超压,一个防止负压超压
B. B.后货舱门打开是,货舱加温照常工作
C. C.客舱温度到达15000时,外流valve完全关闭
D. D.地面,电子舱构型只能是开路构型
【单选题】
组件控制器控制组件充压进气门关闭,需要那些信号___
A. A.LGCIU2
B. B.BSCU
C. C.EIU
D. D.以上都是
推荐试题
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用