刷题
导入试题
【单选题】
CRH2牵引变流器用IGBT或IPM的额定电压电流为:( )___
A. 3300V、1200A
B. 3000V、1500A
C. 3500V、1000A
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
牵引变压器原边绕组额定电流值为:( )___
A. 122A
B. 857A
C. 1225A
【单选题】
CRH2A统型动车组车体最大宽度( ),车体最大高度( ).___
A. 3380mm、3700mm
B. 3142mm、3700mm
C. 3380mm、3650mm
D. 3142mm、3650mm
【单选题】
电源从牵引变压器MTr3次线圈直接出来的电源是( )。___
A. 单相AC400、50HZ
B. 三相AC400、50HZ
C. 单相AC100、50HZ
D. 单相DC100、50HZ
【单选题】
动车轮盘制动圆盘外径为( )的圆盘, 拖车轴盘制动圆盘外径为( )的圆盘。___
A. 725mm、670mm
B. 725mm、725mm
C. 750mm、725mm
D. 670 mm、670 mm
【单选题】
CRH2A统型动车组每台牵引电机的额定功率是( )。___
A. 260kw
B. 300kw
C. 350kw
D. 400kw
【单选题】
蓄电池单体的使用温度范围是( )之间无异常。___
A. -15℃~+45℃
B. -25℃~+45℃
C. -15℃~+55℃
D. -5℃~+45℃
【单选题】
污物箱底部设有电加热装置启停温度( )。___
A. 10℃-30℃
B. 2℃-10℃
C. 4℃-20℃
D. 8℃-25℃
【单选题】
二级检修作业检查绝缘测量主回路501C到大地间应≥( )。(使用500V兆欧表);___
A. 0.1MΩ
B. 0.2MΩ
C. 0.3MΩ
D. 0.4MΩ
【单选题】
二级检修作业检查接地装置碳刷长度在( )以上;编导线的芯线缺损量在( )以下。 ___
A. 25mm、15%
B. 35mm、10%
C. 35mm、15%
D. 25mm、10%
【单选题】
三电平方式逆变器与两电平方式逆变器比较,优点是( )。___
A. 控制简单
B. 直流环节电压高、谐波少
C. 成本低
【单选题】
脉冲整流器较相控整流器的优点是( )。___
A. 功率因素高
B. 可以实现整流和有源逆变
C. 谐波含量大
【单选题】
CRH2A统型动车组司机室侧门采用充气密封式折页门,门板强度能够承受的均布载荷为( )。___
A. 2kpa
B. 4kpa
C. 6kpa
D. 8kpa
【单选题】
以下对通风系统作用表述不准确的是( )___
A. 提供新鲜空气
B. 对空气温度和湿度有较强的调节功能
C. 维持车厢内压力
D. 保证车内空气清洁
【单选题】
以下设备不属于通风系统的是?( )___
A. 风道
B. 压缩机
C. 空气净化设备
D. 压力波控制装置
【单选题】
CRH2A统型动车组主电路中脉冲整流及逆变器都采用( )___
A. 二电平方式
B. 三电平方式
C. 非脉冲式逆变器
D. 脉冲式逆变器
【单选题】
CRH2A统型动车组转向架基础制动方式是( )___
A. 空气制动
B. 空液转换液压制动
C. 抱闸制动
D. 以上都不对
【单选题】
( )是二系悬挂中的关键部件,是影响车辆运行平稳性的关键因素。___
A. 空气弹簧
B. 抗侧滚扭杆
C. 差压阀
D. 高度调整阀
【单选题】
连续式列控系统、点式列控系统及点-连式列控系统的主要区别在于( )。___
A. 车地信息传输方式不同
B. 速度控制模式不同
C. 闭塞方式不同
D. 自动化程度不同
【单选题】
CTCS根据系统配置按功能划分为( )个等级。___
A. 3
B. 4
C. 5
D. 6
【单选题】
CRH2A动车组牵引控制为( )控制方式。___
A. VVVF
B. VVFF
C. VFFF
D. FFVV
【单选题】
CRH2A统型动车组制动系统分为( )。___
A. 制动控制和制动执行系统
B. 制动控制和制动操作系统
C. 制动执行系统和基础制动装置
D. 电气制动和控制管路系统
【单选题】
动车组辅助空压机手动启动正确方式为( )。___
A. 用铁棒按下辅助空压机接触器触点
B. 用绝缘工装按下辅助空压机接触器触点
C. 用手按下辅助空压机接触器触点
D. 用对讲机天线按下辅助空压机接触器触点
【单选题】
CRH2A统型动车组一等座椅间距( )mm。___
A. 600
B. 980
C. 1060
D. 1160
【单选题】
液压传动系统由动力部分、执行部分、控制部分和( )组成。___
A. 辅助部分
B. 液压泵
C. 液压缸
D. 单向阀
【单选题】
列车头罩处检测距离用的红外线反射板处于( )。___
A. 仅1号车
B. 仅 8号车
C. 1号车和8号车
D. 1号车或8号车
【单选题】
CRH2A统型动车组防滑控制时,不需要处理的是( )。___
A. 车轴速度检测
B. 电机转差率检测
C. 速度差计算
D. 滑行率计算
【单选题】
车辆信息控制装置内置( )年的日历。___
A. 30
B. 40
C. 80
D. 60
【单选题】
某正弦电路电压为u=220sin(100t+150),其中100表示( )。___
A. 振幅
B. 角频率
C. 相位
D. 初相
【单选题】
车辆信息控制装置光节点间传送速度( )。___
A. 2.5 Mbps
B. 3.0 Mbps
C. 25 Mbps
D. 30 Mbps
【单选题】
正弦量的三要素包含振幅、角频率和( )。___
A. 初相
B. 相位
C. 相位差
D. 频率
【单选题】
下列不属于三相异步电动机制动方式的为( )。___
A. 能耗制动
B. 反接制动
C. 发电反馈制动
D. 涡流制动
【单选题】
CRH2A动车组主空压机润滑油更换基准:( )①粘度:新油的±15% ②总酸值:0.5mgKOH/g ③水分:0.5容积% ④不溶解量(树脂量):0.1重量%___
A. ①②③
B. ①②③④
C. ②④
D. ①③④
【单选题】
CRH2A动车组主空压机润滑油更换后观察油位时,启动主空气压缩机停止( )分钟后,油位在MIN~MAX之间。___
A. 2
B. 5
C. 8
D. 10
【单选题】
CRH2A动车组进行自动过分相装置检测划磁铁试验中强迫状态试验时:打开信号处理器电源,在1号车司机室插入主控钥匙,制动手柄置“快速”位,方向手柄置“前”位,输入‘Ⅰ端向前’信号,用试验磁铁快速、一次性划过的感应接收器为( )。___
A. T1和T2
B. T1和T3
C. T2和T4
D. T3和T
【单选题】
CRH2A(统型)动车组烟火报警系统探测器污染状态检查时当探测器阀值超过( )%时,表明探头污染,更换此探测器过滤棉并清洗探测器。___
A. 100
B. 110
C. 120
D. 130
【单选题】
CRH2A动车组内端门检测中对承载部件的导轨用( )进行润滑.___
A. 乐泰8104硅脂
B. 150#透平油
C. Molykote G-n润滑油
D. 道康宁557
【单选题】
CRH2A动车组转向架更换后落成检查,测定车体与车轮轮缘的上下间隔为( )mm以上。___
A. 53
B. 63
C. 73
D. 83
【单选题】
CRH2A动车组更换AG37速度传感器之前,在新传感器的连接器处对其阻值进行确认,针号1~2间电阻值为( )Ω(20℃时).___
A. 60±10
B. 33±4
C. 40±10
D. 27±3
【单选题】
下列对电动空气压缩机本体描述不正确的是( )。___
A. 本装置的结构时为用法兰盘拼合压缩机与电动机作为整体结构。
B. 且用内装的联轴节来传达动力。
C. 且用外装的联轴节来传达动力。
D. 弹簧力大小可以通过安装在调整阀下部的调整螺钉来调整。
【单选题】
CRH380A统型动车组中引用了车载信息装置和自诊断技术,该系统由两部分构成,它还有附属设施,不包括( )。___
A. 对讲机
B. 监控显示器及显示控制装置
C. 车内信息显示器
D. IC读卡器
推荐试题
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用