【多选题】
降低硫分压有利于提高硫磺的转化率,___就是利用这一原理设置的。
A. 反应器
B. 捕集器
C. 液硫冷却器
D. 硫封罐
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
在酸气燃烧炉中发生的主要反应是___。
A. H2S+1/2O2=1/2S2+H2S
B. CH4+2O2=CO2+2H2O
C. 2H2S+3O2=2SO2+2H2O
D. COS+H2O=CO2+H2S
【多选题】
炉煮炉在炉水中加入药剂,然后将炉水煮沸,使锅炉内金属表面的污垢和铁锈溶解、疏松和脱落下来,以___。
A. 防止受热面腐蚀
B. 防止受热面过热
C. 保证炉水品质
D. 保证蒸汽的品质
【多选题】
点炉升温前应满足以下___准备工作。
A. 瓦斯采样分析氧含量,确保瓦斯合格
B. 废热锅炉已进水至指定液位,并用蒸汽加热
C. 准备好升温曲线
D. 打火系统检查正常
【多选题】
溶剂再生塔顶回流罐液面高的危害是___。
A. 酸性气带液
B. 再生塔压力上升
C. 酸性气腐蚀加速
D. 酸性气带氨
【多选题】
贫液温度上升的原因可能是___。
A. 贫液冷却器冷却效果差
B. 溶剂再生塔底温度高
C. 溶剂发泡
D. 贫液抽出量过大
【多选题】
酸性气中含有大量水,会发生___情况。
A. 炉膛压力上升
B. 炉膛压力下降
C. 炉膛温度下降
D. 炉膛温度上升
【多选题】
酸性气中带油,会发生___情况。
A. 炉膛压力上升
B. 炉膛压力下降
C. 炉膛温度下降
D. 炉膛温度上升
【多选题】
原料气中带油,操作调整正确的是___。
A. 适当加大配风,使烃类完全燃烧
B. 提高炉膛压力
C. 联系上游酸性水罐区检查是否酸性水带油导致酸性气带油
D. 减小配风,使烃类完全燃烧
【多选题】
原料气中含有大量水,操作调整正确的是___。
A. 适当加大配风
B. 适当降低处理量
C. 适当提高处理量
D. 加强分液罐脱水
【多选题】
克劳斯反应器床层温度变化大的原因是___。
A. 酸性气原料浓度变化大
B. 气风比变化大
C. 进口温度变化大
D. 炉膛温度高
【多选题】
酸性气带液的现象有___。
A. 酸性气流量指示波动大
B. 酸性气燃烧炉炉温明显降低
C. 酸性气燃烧炉压力降低
D. 酸性气燃烧炉燃烧火焰不稳定
【多选题】
酸性气带液的可能原因是___。
A. 酸性气预热器内漏
B. 酸性气分液罐液位高
C. 酸性气管道伴热不畅
D. 酸性气流量波动大
【多选题】
酸性气分液罐的分液量大的原因可能有___。
A. 酸性气管道伴热泄漏
B. 上游溶剂再生装置酸性气分液罐液位高或失灵
C. 酸性气管道伴热效果差
D. 酸性气压力低
【多选题】
废热锅炉液位控制的三冲量是以下___三个参数的综合控制。
A. 汽包发汽量
B. 汽包液位
C. 汽包压力
D. 汽包给水流量
【多选题】
烘炉曲线中严格控制升温速度是为了___。
A. 防止衬里中水份迅速汽化、膨胀
B. 防止衬里变形脱落
C. 防止热电偶热胀爆裂。
D. 考验废锅管束耐压能力
【多选题】
脱硫剂富液与贫液主要区别有___。
A. 硫化氢浓度
B. 二氧化碳浓度
C. MDEA浓度
D. 氮气浓度
【多选题】
硫磺装置酸性气原料中二氧化碳对装置影响正确的有___。
A. 降低了反应炉温度
B. 增加了副反应的生成
C. 增加了系统压降
D. 降低了硫磺转化率
【多选题】
硫磺装置酸性气原料中含烃类对装置影响正确的有___。
A. 使反应炉超温
B. 使副反应增加
C. 使床层积碳
D. 产生黑硫磺
【多选题】
下列选项中,减少装置电耗方法的是___。
A. 尽量使用变频泵
B. 合理使用空调和照明设施
C. 合理调整鼓风机风量和风压
D. 调节机泵出口,降低机泵电流
【多选题】
根据传热机理不同,热的传递有___几种基本方式。
【多选题】
停工检修过程中防止硫化亚铁自燃的措施,以下正确的是___
A. 使用除锈剂清洗硫化亚铁
B. 注意DCS内设备温度是否上升
C. 注意在人孔边准备好水皮带
D. 用动力风吹扫
【多选题】
溶剂再生装置的溶剂起泡的现象?___
A. 液面波动剧烈
B. 塔内压力波动大
C. 在液面计内可见大量的泡沫
D. 放出的溶剂有大量的泡沫
【多选题】
催化剂活性降低有什么现象?___
A. 床层的温升变小
B. 床层的阻力降增大
C. 转化率下降
D. 有机硫水解明显下降
【多选题】
锅炉用水水质不良对锅炉的危害有___。
A. 生锅炉结垢
B. 引起锅炉腐蚀
C. 影响蒸汽品质
D. 无影响
【多选题】
仪表自动化系统分为___几类。
A. 自动检测系统
B. 自动信号系统
C. 自动联锁系统
D. 自动调节系统
【多选题】
___是氧化铝型催化剂的主要毒害物质,它们会导致催化剂硫酸盐化,使其降低或丧失活性。
【多选题】
硫冷器下蒸汽管线作用是___
A. 暖锅
B. 干锅后补蒸汽降温
C. 吹扫
D. 保温
【多选题】
根据___判断催化剂失活。
A. 反应器入口温度与床层温差不大,甚至床层温度低于入口温度
B. 硫磺转化率下降
C. 有机硫水解率下降
D. 床层阻力增大
【多选题】
影响克劳斯尾气H2S/S02比值因素___
A. 酸性气中H2S浓度波动
B. 酸性气流量波动
C. 空气/酸性气比例不合适
D. 燃料气流量、组分波动
【多选题】
酸性气中烃类含量高了的害处有___
A. 燃烧时放出大量的热烧坏设备
B. 烃类燃烧不完全,有碳黑析出
C. 在转化器内积碳,会破坏催化剂活性
D. 烃类含量高,耗氧量大,设备负荷大
【多选题】
调节阀依气动调节阀在有信号作用时阀芯的位置可分为___两种。
A. 气关式
B. 气开式
C. 电动阀
D. 闸阀
【多选题】
DCS主要由___、管理计算机五部分构成。
A. 过程输入/输出接口
B. 过程控制单元
C. 操作站
D. 数据高速通道
【多选题】
仪表自动化系统分为___几类。
A. 自动检测系统
B. 自动信号系统
C. 自动联锁系统
D. 自动调节系统
【多选题】
常用的自动控制仪表调节规律有___种。
A. 双位调节
B. 比例调节
C. 积分调节
D. 微分调节
【多选题】
氨法脱硫系统中,循环水槽的作用分别为___等提供水源。
A. 氨法脱硫塔补液
B. 氧化风机降温
C. 除沫器冲洗
D. 吸收塔烟道冲洗
【多选题】
燃烧炉温度检测装置分别为___两种形式。
A. 热偶测温
B. 红外测温
C. 电离测温
D. 人工测温
【多选题】
有关扫线结束的说法下列正确的是___。
A. 水扫线结束的标志是管线最低点放空出口的水色和透明度与入口目测一致
B. 蒸汽扫线结束的标志是管线最低点放空无物料气出来
C. 容器扫线结束的标志是液面计下放空无物料气出来
D. 容器扫线结束的标志是水包下放空无物料气出来
【多选题】
仪表UPS断电对装置有何影响___。
A. DCS因失电会发生黑屏现象
B. 各控制回路都处在“MAN”状态,并锁位
C. 现场各控制阀处于断电前状态
D. 无法通过DCS屏幕对装置现场各参数进行监控和调节
【多选题】
有关锅炉汽包缺水说法下列正确的是___。
A. 酸气处理量增大,补水不及时会造成锅炉汽包缺水
B. 燃烧反应炉温度上升,补水不及时会造成锅炉汽包缺水
C. 汽包发汽压力升高会造成锅炉汽包缺水
D. 定连排开度较大会导致会造成锅炉汽包缺水
推荐试题
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases