【单选题】
在客车辅修质量对规中轴箱裂纹,每处扣___。___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
在客车A1级检修质量对规中电子防滑器单车静止试验出现故障显示,扣___。___
A. 10分
B. 20分
C. 30分
D. 40分
【单选题】
直达列车运行途中,车辆乘务员与___应根据车辆运行状态互相加强联系。___
A. 列车员
B. 列车长
C. 乘警
D. 机车乘务员
【单选题】
在客车A1级检修质量对规中灯具点灯试验不良,每处扣___。___
【单选题】
已知兆欧表的两组线圈中的电流I1和I2,则指针偏转角与___有关。___
A. I1
B. I2
C. I1/I2
D. I1*I2
【单选题】
三相鼠笼型电动机常用的改变转速的方法是___。 ___
A. 改变电压
B. 改变极数
C. 星型改为三角形
D. 三角形改为星型
【单选题】
餐车电冰箱大修后,控制箱须保修___个月。___
【单选题】
蓄电池充电时,电解液温度不得超过___℃。___
【单选题】
变压器采用相互绝缘的薄硅钢片制造,主要的目的是为了降低___。___
A. 杂散损耗
B. 铜耗
C. 涡流损耗和磁带损耗
D. 磁滞损耗
【单选题】
中修后,餐车冰箱不锈钢内壳破损___mm以下允许补焊。___
A. 60
B. 80
C. 100
D. 120
【单选题】
MGS防滑系统主控制器数字显示为“7.3”,这说明至少有___个以上的故障。___
【单选题】
KTC-21357压缩机工作电流为___A。___
A. 7.5
B. 8.0
C. 12.5
D. 14.6
【单选题】
空调装置电气部件与壳的绝缘电阻应大于___兆欧。___
【单选题】
充注制冷剂时,如须给钢瓶加温,则温度决不可超过___℃。___
【单选题】
电压瞬时值和电流瞬时值的乘积,称为___功率。___
【单选题】
GN-300型蓄电池充足电后,应能工作4h45min以上,如果工作3h30min,电压就低于1.0V时,此蓄电池的容量损失为___。___
A. 26.3%
B. 35.7%
C. 73.7%
D. 64.3%
【单选题】
电压互感器的一次绕组的匝数___二次绕组的匝数。___
A. 略大于
B. 远大于
C. 小于
D. 等于
【单选题】
熔体的熔断电流一般是额定电流的___倍。___
A. 1.3
B. 1.5
C. 1.6
D. 2.0
【单选题】
冷凝器每年进行___次维修保养。___
【单选题】
焊接三极管时,管子电极的引线应不短于___毫米,焊接要快。___
【单选题】
室外通风机每年进行___次维修保养。___
【单选题】
KP-2A型控制箱___中的R1\R2为C1的放电电阻。___
A. 触发回路
B. 测量回路
C. 放大回路
D. 充电回路
【单选题】
中修后,餐车冰箱控制箱的电流表误差不大于___。___
【单选题】
25K型客车车下吊装的应急电池的容量为___Ah。___
【单选题】
发电机的负载特性是随着负载电流的增加,电机端电压就相应___。___
A. 降低
B. 升高
C. 不变
D. 先升高再降低
【单选题】
柴油机一次修理费用超过新品现价的___时,可申请报废。___
A. 40%
B. 50%
C. 60%
D. 70%
【单选题】
单元式空调机组及控制柜的中修周期为___年。___
【单选题】
铁路客车电茶炉具有___的保护功能。___
【单选题】
当供电电压低于额定电压的___时,欠电压保护器切断电源。___
A. 5%
B. 8%
C. 15%
D. 20%
【单选题】
指示仪表中与偏转角成正比力矩的是___。___
A. 转动力矩
B. 反作用
C. 阻尼力矩
D. 作用力矩
【单选题】
一千伏以下的中性点接地系统中的用电设备采用___。___
A. 保护接地
B. 工作接地
C. 失压接地
D. 限位接地
【单选题】
在选择电动机的制动方式时,若单从节能的观点出发,最好选择___。___
A. 机械制动
B. 反接制动
C. 能耗制动
D. 再生反馈制动
【单选题】
发电机组启动后,水温升高至___度以上时,乘务员应及时打开冷却风机。___
【单选题】
DC600V供电客车A2修时轮对接地端子碳刷磨耗达到___MM以内必须更换。___
【单选题】
DC600V供电客车断电___MIN后才能进行绝缘测试。___
【单选题】
25T型车集便器污物箱真空度为___kpa。___
A. -10至-25
B. -19至-35
C. -35至-55
D. -35至0
【单选题】
25T型车真空集便器过滤调压阀风压范围为___kpa。___
A. 150-250
B. 250-350
C. 350-450
D. 450-550
【单选题】
KP-2A型控制箱D2短路时会造成___。___
A. 发电机不发电
B. 电压失控
C. 负载电流过大
D. 都不会
【单选题】
蓄电池的内阻与电解液的比重___。___
A. 成正比
B. 成反比
C. 不成比例
D. 成等比
【单选题】
KP-2A型控制箱中的D7断路时,会造成___。___
A. 电机不发电
B. 电压失控
C. 激磁电流偏小
D. 激磁电流偏大
【单选题】
交流电的无功功率的计算公式是___。___
A. P=UI
B. P=UIcos
C. Q=UIsina
D. S=UI
推荐试题
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework