【单选题】
【单选】 设备的断路器 ,隔离开关都在合闸位置 ,说明设备处在 ___状态。 A
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
【单选】 在全部停电和部分停电的电气设备上工作时 ,必须完成的技术措施有 :停电、 ___、挂接地线、装设遮栏和悬挂标示牌。 B
【单选题】
【单选】 倒闸操作前 ,应先在 ___进行模拟操作。 B
A. 实际设备上
B. 模拟图板上
C. 操作票上
【单选题】
【单选】 在高压室内的二次接线和照明回路工作 ,需将高压设备停电或做安全措施时应使用___。A
A. 第一种工作票
B. 第二种工作票
C. 口头指令
【单选题】
【单选】 填写工作票时要字体规范 ,字迹清楚 ,不得涂改和不得用 ___笔填写。 C
【单选题】
【单选】 变配电所运行管理实行 ___制度。 C
A. “两票两制度”
B. “三票两制度”
C. “两票三制度”
【单选题】
【单选】 电气工作开始前 ,必须完成 ___A
A. 工作许可手续
B. 交接班手续
C. 工作间断手续
【单选题】
【单选】 装设临时接地线的顺序是 ___。A
A. 先接接地端 ,后接设备导体部分
B. 先接设备导体部分 ,后接接地端
C. 同时接接地端和设备导体部分
【单选题】
【单选】 如果线路上有人工作时 ,应在线路断路器和隔离开关的操作手把上悬挂 :___。A
A. 禁止合闸 ,线路有人工作
B. 止步,高压危险
C. 禁止攀登 ,高压危险
【单选题】
【单选】 电气设备由事故转为检修时 ,应 ___。A
A. 填写工作票
B. 直接检修
C. 汇报领导后进行检修
【单选题】
【单选】 操作票填写中 ,合上或拉开的隔离开关 ,刀开关统称为 ___。C
【单选题】
【单选】 在全部停电和部分停电的电气设备上工作时 ,必须完成的技术措施有 :___、验电、挂接地线、装设遮栏和悬挂标示牌。 C
【单选题】
【单选】 在全部停电和部分停电的电气设备上工作 ,必须完成的技术措施有 ___ 。A
A. 停电;验电 ;挂接地线 ;装设遮栏和悬挂标示牌
B. 停电;放电; 挂接地线 ;装设遮栏和悬挂标示牌
C. 停电;验电; 放电;装设遮栏和悬挂标示牌
【单选题】
【单选】 工作票应由 ___ 签发。 B
A. 工作负责人
B. 工作票签发人
C. 工作许可人
【单选题】
【单选】 电气设备有三种工作状态 ,即运行、备用、 ___。C
【单选题】
【单选】 在室内高压设备上工作 ,应在工作地点两旁间隔的遮栏上悬挂 :___。B
A. 禁止合闸 ,线路有人工作
B. 止步,高压危险
C. 禁止攀登 ,高压危险
【单选题】
【单选】 电源是将其他能量转换为 ___的装置。 C
【单选题】
【单选】 在电阻串联的电路中 ,电路的总电阻等于 ___ 。B
A. 各串联电阻之和的倒数
B. 各串联电阻之和
C. 各串联电阻的平均值
【单选题】
【单选】 两个电阻串联接入电路 ,当两个电阻阻值不相等时 ,则___。A
A. 两电阻的电流相等
B. 电阻小的电流小
C. 电阻大的电流大
【单选题】
【单选】 对变配电所内的电气设备、备用设备及继电保护自动装置等需定期进行 ___ 和轮换。B
【单选题】
【单选】 磁场中某点的磁感应强度 B 与磁导率?的比值 ,称为该点的 ___。 B
【单选题】
【单选】 在中性点经消弧线圈接地系统中 ,如果消弧线圈选择得当 ,可使接地点电流小于 ___,而不会产生断续电弧和过电压现象。 C
【单选题】
【单选】 为防止直接雷击高大建筑物 ,一般多采用 ___ 。A
【单选题】
【单选】 外部过电压通常指 ___过电压。 C
【单选题】
【单选】 如果在交接班过程中 ,有事故要处理 ,仍由 ___ 负责处理 ,必要时可请接班人员协助工作。 A
【单选题】
【单选】 镍是一种 ___磁性物质。 C
【单选题】
【单选】 在纯电容交流电路中 ,电路的无功功率 ___ 。B
A. 小于电路电压与电流的有效值的乘积
B. 等于电路电压与电流的有效值的乘积
C. 大于电路电压与电流的有效值的乘积
【单选题】
【单选】 表征磁介质导磁性能的物理量 ,叫做 ___。A
【单选题】
【单选】 在三个电阻并联的电路中 ,已知三条并联支路的电流分别为 4A 、8A 和 15A, 则电路的电流等于 ___ C
【单选题】
【单选】 发生短路时 ,电力系统从正常的稳定状态过渡到短路的稳定状态 ,一般需 ___ 秒。 C
【单选题】
【单选】 当导体材料及长度确定之后 ,如果导体截面越小 ,则导体的电阻值 ___。B
【单选题】
已知电路的端电压为 12V,电流为 2A, 则该电路电阻为 ___Ω 。B
【单选题】
【单选】 一张倒闸操作票最多只能填写 ___ 操作任务。 A
【单选题】
【单选】 使用验电器验电前 ,除检查其外观、电压等级、试验合格期外 ,还应 ___ 。C
A. 自测发光
B. 自测音响
C. 在带电的设备上测试其好坏
【单选题】
【单选】 TN 系统电源系统有一点 (通常是中性点 )接地,而设备的外露可导电部分 (如金属外壳) 通过 ___ 连接到此接地点的低压配电系统 ,C
【单选题】
【单选】 仪用互感器分 ___两种。 B
A. 电力变压器和电流互感器
B. 电流互感器和电压互感器
C. 特种互感器和电流互感器
【单选题】
【单选】 在电阻串联的电路中 ,电路的端电压 U 等于 ___。 B
A. 各串联电阻的端电压
B. 各串联电阻端电压的总和
C. 各串联电阻端电压的最大值
【单选题】
【单选】 铁磁性物质的相对导磁率 ___。A
A. 远大于 1
B. 略大于 1
C. 等于 1
【单选题】
【单选】 发生短路时 ,电路中的电流值比正常时的电流值 ___。 A
【单选题】
【单选】 外部过电压 ,与气象条件有关 ,又称为 ___。B
A. 气象过电压
B. 大气过电压
C. 污秽过电压
【单选题】
【单选】 KYN28-10 型高压开关柜采用电缆出线时 ,如需要装设零序电流互感器 ,零序电流互感器一般装设在 ___。C
A. 主母线室
B. 吊装在电缆室内
C. 吊装在电缆室柜底板外部
推荐试题
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.