【单选题】
ECAM警告显示页面上的缝翼系统1故障是什么意思:___
A. 缝翼襟翼操纵计算机1已失效
B. 一台缝翼襟翼操纵计算机的缝翼通道失效
C. AB都对
D. 以上都不对
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
襟翼和缝翼操纵计算机1(SFCC)故障时会发生什么情况:___
A. 什么也不发生
B. 襟翼和缝翼以半速工作
C. 襟翼系统失效
D. 以上都不对
【单选题】
当备用法则现用时,高速和大迎角保护将:___
A. 降级
B. 失效
C. 正常或备份带防滞,备份不带防滞,停留刹车
D. 以上都不对
【单选题】
如果襟翼1动力控制组件故障,会发生什么情况:___
A. 什么也不发生
B. 襟翼以半速工作
C. 襟翼失效
D. 以上都不对
【单选题】
升降舵和水平安定面正常由ELAC2控制,若ELAC2失效,则:___
A. 俯仰控制自动转换到ELAC1
B. 俯仰控制自动转换到SEC1和SEC2
C. 俯仰失去控制
D. 不确定
【单选题】
当AP衔接时,FMGC将俯仰指令送至:___
A. ELAC
B. SEC
C. ELAC和SEC
D. 不确定
【单选题】
如果EFCS系统所有的计算机失效,是否还能够对飞机进行俯仰控制?___
【单选题】
若绿液压系统失效,则横滚控制由:___
A. 副翼
B. 副翼和2、3、4号扰流板
C. 只能由2、3、4号扰流板控制
D. 不确定
【单选题】
共有几个液压系统向方向舵提供动力?___
【单选题】
下列哪一种情况会引起脚蹬运动?___
A. 偏航阻尼指令
B. 方向舵配平
C. 协调转弯指令
D. 不确定
【单选题】
当横滚和速度刹车指令叠加后超过扰流板的最大偏转角度时会出现:___
A. 速度刹车功能被禁止
B. 所有扰流板收到额外的放出指令,直到一个扰流板到最大偏转角
C. 另一边的扰流板往回收,直到两边的舵面差等于横滚指令
D. 不确定
【单选题】
地面扰流板可用的必要条件是:___
A. 地面扰流板预位,两个油门杆位于IDLE或以下
B. 地面扰流板没有预位,两个油门杆位于IDLE
C. 只要两个油门杆位于IDLE
D. 不确定
【单选题】
控制副翼的计算机是:___
A. ELAC
B. SEC
C. FAC
D. SFCC
【单选题】
当AP衔接时,FMGC将横滚指令送至:___
A. ELAC
B. FAC
C. 通过FAC至SEC
D. 以上都对
【单选题】
当系统有故障时,扰流板会:___
A. 保持在失效前的位置
B. 自动收回
C. 气动力使其收回
D. 不确定
【单选题】
哪一个计算机接收侧杆指令?___
A. 只有ELAC
B. ELAC和SEC
C. FCDC
D. 以上都不对
【单选题】
哪一项功能要使用垂直加速度计?___
A. 负载因数功能
B. 俯仰配平功能
C. 偏航阻尼功能
D. A和B
【单选题】
电子飞控系统EFCS中哪些计算机连到CFDS系统?___
A. ELAC和SEC
B. 只有FCDC
C. ELAC
D. 不确定
【单选题】
FWC连到下列哪些计算机?___
A. ELAC
B. ELAC和SEC
C. 只有FCDC
D. 不确定
【单选题】
垂直加速度计位于:___
A. 前电子舱
B. 主电子舱
C. 前货舱
D. 后货舱
【单选题】
当一边机翼上的扰流板不工作时,则另一边机翼上与其对应的扰流板:___
【单选题】
当迎角保护功能激活时,速度刹车功能:___
A. 不受影响
B. 自动将放出的扰流板收回
C. 不工作
D. B和C都正确
【单选题】
驾驶员能通过机械传动操纵的舵面是:___
A. 方向舵、升降舵
B. 副翼、扰流板
C. 水平安定面和方向舵
D. 无机械操纵的舵面
【单选题】
从右侧油箱向左侧油箱传输燃油过程中,正确的操作是()___
A. 打开交输valve
B. 燃油泵工作
C. 打开抽油/传输valve
D. 以上都对
【单选题】
在加油时,如果高油位传感器故障,怎样知道油箱燃油已加满()___
A. 加油自动停止
B. 有警告声音
C. 红灯亮
D. 有燃油从通气油箱流出
【单选题】
APU低压valve有几个电马达()___
A. 1个交流马达
B. 2个交流马达
C. 2个直流马达
D. 1个直流马达
【单选题】
APU燃油泵的压力电门的作用是()___
A. 低压指示
B. 控制APU燃油泵
C. 关闭APU低压valve
D. A+B
【单选题】
IDG冷却的循环燃油正常情况下回到哪个油箱()___
A. 中央油箱
B. 内侧油箱
C. 外侧油箱
D. A+C
【单选题】
发动机的低压燃油关断valve什么时候关闭()___
A. 发动机正常停车
B. 发动机起火
C. 燃油压力低
D. A+B
【单选题】
飞机爬升过程中,如果缝翼收回,则由哪个油箱供油()___
A. 外侧油箱
B. 内侧油箱
C. 中央油箱
D. B+C
【单选题】
飞机燃油系统中,共有几个主燃油泵()___
【单选题】
飞机上有几台计算机用于燃油量的指示()___
A. 2个FQIC,2个FLSCU
B. 1个FQIC,2个FLSC
C. 2个FQIC,1个FLSCU
D. 1个FQIC,2个FLSCU
【单选题】
给飞机加油时,加油valve什么时候打开()___
A. 加油电磁线圈通电
B. 加油电磁线圈断电
C. 燃油增压
D. A+C
【单选题】
空中,内侧油箱中的吸油旁通valve在什么时候工作()___
A. 所有燃油泵不工作
B. 中央2个燃油泵停止工作
C. 左内侧1个燃油泵停止工作
D. 右内侧1个燃油泵停止工作
【单选题】
每台发动机的低压燃油关断valve有几个直流电马达()___
【单选题】
哪个油箱安装有满油位传感器()___
A. 内侧油箱
B. 外侧油箱
C. 中央油箱
D. A+B
【单选题】
内侧油箱中的吸油旁通valve在什么时候工作()___
A. 所有燃油泵不工作
B. 中央燃油泵停止工作
C. 左内侧燃油泵停止工作
D. 右内侧燃油泵停止工作
【单选题】
燃油控制面板上的方式选择电门控制哪个油箱的燃油泵()___
A. 中央油箱
B. 内侧油箱
C. 外侧油箱
D. A+B
【单选题】
如果APU低压燃油valve的一个电马达发生故障,会出现什么情况()___
A. valve完全关闭
B. valve关一些
C. valve位置不变
D. APU自动停车
【单选题】
如果FQIC一个通道失效,下面哪种情况不会出现()___
A. FQIC正常工作
B. 燃油量指示不准确
C. CFDS报告有故障信息
D. 数据不会丢失
推荐试题
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key