【单选题】
钳形电流表测量电流时,可以在()电路的情况下进行。___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
交流接触器的机械寿命是指在不带负载的操作次数,一般达()。___
A. 600-1000万次
B. 10万次以下
C. 10000万次以上
【单选题】
为了检查可以短时停电,在触及电容器前必须()。___
【单选题】
静电现象是十分普遍的电现象()是它的最大危害。___
A. 对人体放电,直接置人于死地
B. 高电压击穿绝缘
C. 易引发火灾
【单选题】
特别潮湿的场所应采用()V的安全特低电压。___
【单选题】
___是保证电气作业安全的技术措施之一。
【单选题】
电流对人体的热效应造成的伤害是()。___
【单选题】
运行中的线路的绝缘电阻每伏工作电压为()欧。___
【单选题】
低压线路中的零线采用的颜色是()。___
【单选题】
笼形异步电动机降压启动能减少启动电流,但由于电机的转矩与电压的平方成(),因此降压启动时转矩减少较多。___
【单选题】
利用()来降低加在定子三相绕组上的电压的启动叫自耦降压启动。___
【单选题】
尖嘴钳150mm是指()。___
A. 其总长度为150mm
B. 其绝缘手柄为150mm
C. 其开口150mm
【单选题】
每一照明(包括风扇)支路总容量一般不大于()kw。___
【单选题】
下列灯具中功率因数最高的是()。 ___
【单选题】
当电气火灾发生时,应首先切断电源再灭火,但当电源无法切断时,只能带电灭火,500V低压配电柜灭火可选用的灭火器是()。___
A. 泡沫灭火器
B. 二氧化碳灭火器
C. 水基式灭火器
【单选题】
确定正弦量的三要素为()。___
A. 相位、初相位、相位差
B. 最大值、频率、初相角
C. 周期、频率、角频率
【单选题】
选择电压表时,其内阻()被测负载的电阻为好。 ___
【单选题】
摇表的两个主要组成部分是手摇()和磁电式流比计。 ___
A. 直流发电机
B. 电流互感器
C. 交流发电机
【单选题】
断路器的选用,应先确定断路器的(),然后才进行具体的参数的确定。___
【单选题】
电业安全工作规程上规定,对地电压为()V及以下的设备为低压设备。___
【单选题】
从制造角度考虑,低压电器是指在交流50HZ、额定电压()V或直流额定电压1500V及以下电气设备。___
【单选题】
人体同时接触带电设备或线路中的两相导体时,电流从一相通过人体流入另一相,这种触电现象称为()触电。___
【单选题】
导线接头的机械强度不小于原导线机械强度的()%。___
【单选题】
导线接头电阻要足够小,与同长度同截面导线的电阻比不大于()。___
【单选题】
某四极电动机的转速为1440r/min,则这台电动机的转差率为()%。___
【单选题】
在对380V电机各绕组的绝缘检查中,发现绝缘电阻(),则可初步判定为电动机受潮所致,应对电机进行烘干处理。___
A. 大于0.5MΩ
B. 小于10MΩ
C. 小于0.5MΩ
【单选题】
Ⅱ类手持电动工具是带有()绝缘的设备。___
【单选题】
图示的电路中,在开关S1和S2都合上后,可触摸的是___。
【单选题】
墙壁开关安装时距离地面的高度为___m。
【单选题】
在易燃、易爆危险场所,供电线路应采用___方式供电。
A. 单相三线制,三相五线制
B. 单相三线制,三相四线制
C. 单相两线制,三相五线制
【单选题】
特种作业操作证每()年复审1次。___
【单选题】
交流电路中电流比电压滞后90°,该电路属于()电路。___
【单选题】
感应电流的方向总是使感应电流的磁场阻碍引起感应电流的磁通的变化,这一定律称为___。
A. 法拉第定律
B. 特斯拉定律
C. 楞次定律
【单选题】
钳形电流表使用时应先用较大量程,然后在视被测电流的大小变换量程。切换量程时应___。
A. 先将退出导线,再转动量程开关
B. 直接转动量程开关
C. 一边进线一边换挡
【单选题】
在生产过程中,静电对人体,对设备,对产品都是有害的,要消除或减弱静电,可使用喷雾增湿剂,这样做的目的是___。
A. 使静电荷向四周散发泄漏
B. 使静电荷通过空气泄漏
C. 使静电沿绝缘体表面泄露
【单选题】
在雷暴雨天气,应将门和窗户等关闭,其目的是为了防止()侵入屋内,造成火灾、爆炸或人员伤亡。___
推荐试题
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing