刷题
导入试题
【单选题】
机械密封结构中动静环材质硬度要求___。
A. 硬对硬
B. 硬对软
C. 软对硬
D. 软对软
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
启动离心泵时,若电流超额定值___,应立即停泵。
A. 30秒
B. 1分钟
C. 2分钟
D. 3分钟
【单选题】
液硫夹套阀夹套中走的介质是___。
A. 液硫
B. 热水
C. 蒸汽
D. 氮气
【单选题】
屏蔽泵可以作截流运转,但截流时间不允许超过___分钟。
A. 2
B. 1
C. 3
D. 4
【单选题】
汽轮主油箱的作用是___。 
A. 储油    
B. 分离水分
C. 储油和分离水分、空气杂物和沉淀物
D. 以上答案都不对
【单选题】
汽轮机热态启动,冲转前要连续盘车不少于___。
A. 6小时    
B. 3小时
C. 4小时
D. 5小时
【单选题】
汽轮机启动暖管时,注意调节送汽阀和疏水阀的开度是为了___。
A. 提高金属温度
B. 减少工质和热量损失
C. 不使流入管道的蒸汽压力、流量过大,引起管道及其部件受到剧烈的加热
D. 不使管道超压
【单选题】
奥式体不锈钢换热器水压试验中,需要严格控制水中___离子不能超过25mg/L。
A. 钾
B. 钠
C. 钙
D. 氯
【单选题】
换热器水压试验前应该至少采用___量程相同且经过校验的压力表。
A. 1
B. 2
C. 3
D. 4
【单选题】
有毒、易燃易爆应采用___安全阀。
A. 全封闭式安全阀
B. 半封闭
C. 敞开式
D. 不能确定
【单选题】
高位油箱的作用是当润滑油系统和机组同时停车时,保证高位油箱供油时间___机组的惰走时间。
A. 小于    
B. 等于
C. 大于   
D. 无法确定
【单选题】
液硫泵采用___?
A. 离心泵
B. 螺杆泵
C. 往复泵
D. 齿轮泵
【单选题】
为了防止液硫凝固,液硫管线应用___。
A. 岩棉管壳保温
B. 拌热管线拌热
C. 夹套管拌热或者电伴热
D. 不保温
【单选题】
停重沸器时要注意___。
A. 可以快速停冷热源
B. 先停热源再停冷源,而且速度要缓慢
C. 热源快停,冷源慢停
D. 随便先停哪个
【单选题】
以下那个阀门表示截止阀___。
A. Z41H-25DN50
B. H44H-25DN50
C. J41H-16DN50
D. Q41F-16DN50
【单选题】
溶剂再生富液过滤器属于以下哪种过滤器___
A. Y型过滤器
B. 自动反冲洗过滤器
C. 篮式过滤器
D. T型过滤器
【单选题】
以下哪项不是硫封罐的作用___ 
A. 防止气体从液硫线进液硫池    
B. 保护风机
C. 不使装置憋压                 
D. 提高操作压力
【单选题】
硫化氢是无色、有___气味,是一种强烈的神经毒物。
A. 硫磺
B. 酒精
C. 臭鸡蛋
D. 芳烃
【单选题】
硫化氢在低浓度时,臭鸡蛋味的增强与浓度的升高成正比,但浓度超过___左右之后,浓度继续升高而臭鸡蛋味反而减弱,以至不能察觉。
A. 10mg/m3
B. 100mg/m3
C. 500mg/m3
D. 1000mg/m3
【单选题】
我国卫生标准规定空气中硫化氢的最高容许浓度为___。
A. 10mg/m3
B. 20mg/m3
C. 30mg/m3
D. 50mg/m3
【单选题】
用火化验分析标准中,爆炸下限小于4%的可燃气体,其可燃物含量小于或等于___为合格;爆炸下限大于或等于4%的可燃气体,其可燃物含量小于或等于( )为合格。
A. 0.2% 0.5%
B. 0.3% 0.5%
C. 0.5% 0.5%
D. 0.5% 0.2%
【单选题】
用火作业时,乙炔气瓶、氧气瓶与火源间的距离不得少于___米。
A. 5
B. 10
C. 15
D. 20
【单选题】
用火作业时,乙炔气瓶与氧气瓶之间的距离不得少于___米。
A. 5
B. 10
C. 15
D. 20
【单选题】
气体测爆仪测定的是可燃气体的___。
A. 爆炸下限
B. 爆炸上限
C. 爆炸极限范围
D. 浓度
【单选题】
用火作业点周围___范围内禁止排放各类可燃气体
A. 10米
B. 15
C. 20
D. 30
【单选题】
用火作业点周围___范围内禁止排放各类可燃物体
A. 10米
B. 15
C. 20
D. 30
【单选题】
在卧室内听到外面发生火灾的报警后,如感觉房门发热,这时正确的做法是___
A. 迅速打开房门,快速冲出逃生
B. 用衣物等封堵门缝,设法从窗户逃生或等待救援
C. 藏到壁橱中以避烟气
D. 打开房门和窗户,等待救援
【单选题】
某容器中的混合气体含有甲烷、乙烷。甲烷的爆炸下限为5.0%,上限为15.0%;乙烷的爆炸下限为2.9%,上限为13.0%。动火环境中可燃气体的浓度最高不得超过___
A. 2%
B. 1%
C. 0.5%
D. 0.2%
【单选题】
石油化工装置检维修涉及大量动火作业,为确保动火作业安全,应落实有关安全措施。下列关于动火作业安全措施的说法中,错误的是___
A. 动火地点变更时应重新办理审批手续
B. 高处动火要落实防止火花飞溅的措施
C. 停止动火不超过2小时不需要重新确认现场安全措施
D. 特殊动火分析的样品要保留到动火作业结束
【单选题】
下列不属于进受限空间作业监护人职责的是___
A. 熟悉作业区域的环境和工艺情况
B. 处理异常情况的能力
C. 清点出入受限空间作业人数
D. 对装置进行定时巡回检查
【单选题】
下列关于进设备作业监护人的职责论述中,不正确的是___。
A. 监护人应熟悉作业区域的环境、工艺情况及作业内容,有判断和处理异常情况的能力,懂急救知识。
B. 监护人在作业人员进设备(受限空间)作业前,负责对安全措施落实情况进行检查,发现安全措施未完全落实或安全措施不完善时,可要求边施工边整改。
C. 监护人应控制、清点出入设备(受限空间)人数,并与作业人员确定联络信号,在出入口处保持与作业人员的联系,发现异常情况时,应及时制止作业,并立即采取救护措施。
D. 监护人要携带《进设备作业许可证》,按时检查各项安全措施落实情况,做好相应的记录。
【单选题】
在设备内进行检修作业,要求有足够的照明,设备内照明电压应不大于___,在潮湿容器,狭小容器内作业应小于等于( ),灯具及电动工具必须符合防潮,防爆等安全要求。
A. 36V、12V
B. 24V、24V
C. 36V、36V
D. 42V、12V
【单选题】
正常情况下,空气呼吸器气瓶工作压力为30MPa,最小应为___MPa,使用时间约40-50分钟。
A. 15
B. 18
C. 21
D. 24
【单选题】
使用空气呼吸器应急处置时,气瓶压力过低发生报警,还可以使用___时间。
A. 1至2 分钟
B. 3至5分钟
C. 8至10分钟
D. 10至20分钟
【单选题】
高处作业是指___
A. 高层建筑的作业;
B. 可能发生坠落的作业;
C. 坠落基准面2米以上的作业;
D. 2米高度以上的作业
【单选题】
急性中毒现场抢救的第一步是___。
A. 迅速报警
B. 迅速拨打急救电话
C. 迅速将患者转移至空气新鲜处
D. 迅速做人工呼吸
【单选题】
按安全色的使用规定,红色表示什么意思?___
A. 指令、必须遵守
B. 停止、禁止
C. 注意、警告
D. 指示、告知
【多选题】
催化剂装填催化剂上下面需要装填一定厚度的瓷球,是起___作用。
A. 均匀分布
B. 保护
C. 增加压降
D. 减慢气速
【多选题】
下列关于引燃料气进装置的说法正确的是___。
A. 引燃料气前先用蒸汽将系统吹扫干净
B. 吹扫干净后用氮气置换系统,系统中氧含量应小于0.5%
C. 吹扫干净后用氮气置换系统,系统中氧含量应小于1.0%
D. 瓦斯系统氮气置换完毕后,关闭各放空阀,系统保持微正压,准备瓦斯引进装置
【多选题】
溶剂发泡时,采取措施正确的是___。
A. 添加适量的消泡剂
B. 加强溶剂过滤
C. 检查储罐氮封是否完好,防止空气漏入
D. 加水置换
【多选题】
瓦斯带水的工艺现象___。
A. 炉膛火焰发红
B. 炉膛压力上升
C. 炉膛出口温度急剧下降
D. 如带水过多火焰熄灭
推荐试题
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用