相关试题
【单选题】
用来馈电给电度计量专用的电压互感器,准确度等级应选用___。
A. 0.2级;
B. 0.5级;
C. 1.0级;
D. 3.0级;
【单选题】
测量用电压互感器的标准准确度等级有___。
A. 0.2级,0.5级和3级;
B. 0.1级,0.2级,0.5级和1级;
C. 0.1级,0.2级,0.5级,1级和3级 ;
D. 0.1级,0.2级和0.5级;
【单选题】
为了提高电压互感器的准确度等级,应限制电压互感器的负载,使负载电流接近于___。
A. 励磁电流;
B. 磁化电流;
C. 空载电流;
D. 额定电流;
【单选题】
为了防止电压互感器高压侧串入低压侧,危害人员和仪表,必须将二次侧___。
A. 接地;
B. 屏蔽;
C. 设围栏;
D. 加防保罩;
【单选题】
JSJW型电压互感器___二次线圈。
A. 没有;
B. 有1个;
C. 有2个;
D. 有3个;
【单选题】
220KV电压互感器二次熔断器上并联电容器的作用是___。
A. 无功补偿;
B. 防止断线闭锁装置误动;
C. 防止断线闭锁装置拒动;
D. 防止熔断器熔断;
【单选题】
电压互感器Y0/ Y0/∆接线广泛应用于___系统。
A. 中性点直接接地;
B. 中性点非直接接地;
C. 中性点不接地;
D. 中性点经消弧线圈接地;
【单选题】
电压互感器采用Y/ Y0形接线,___。
A. 只能测量相电压;
B. 只能测量线电压;
C. 能监视负荷电流;
D. 能测量相电压和线电压;
【单选题】
电压互感器采用V/V形接线,___。
A. 只能测量相电压;
B. 只能测量线电压;
C. 能监视负荷电流;
D. 能测量相电压和线电压;
【单选题】
感器与变压器特性是___的。
A. 相同;
B. 不同;
C. 接近;
D. 相似;
【单选题】
电流互感器两组相同的二次绕组串联时,感应电动势增大1倍,其变比___
A. 增大1倍;
B. 增大1/2倍;
C. 增大2倍;
D. 不变;
【单选题】
运行中的电流互感器的一次电流取决于___
A. 二次负荷电流;
B. 一次负荷电流;
C. 一次电压等级;
D. 二次电压等级;
【单选题】
电流互感器二次侧接地是为了___
A. 测量用;
B. 工作接地;
C. 保护接地;
D. 节省导线;
【单选题】
LCWD-110型电流互感器型号中的第4个字母“D”表示___
A. 单匹贯穿式;
B. 单相;
C. 差动保护;
D. 绝缘等级;
【单选题】
真空断路器采用___作为灭弧介质。
A. 空气;
B. SF6气体;
C. NO2;
D. 真空;
【单选题】
电流互感器按匝数可分为单匝式电流互感器和___电流互感器
A. 贯穿式;
B. 母线式;
C. 多匝式;
D. 干式;
【单选题】
电流互感器___大致分为贯穿式.支柱式.母线式.套管式.正立式和倒立式电流互感器。
A. 结构形式;
B. 用途;
C. 环境;
D. 绝缘介质;
【单选题】
下列型号的互感器中,___是零序式电流互感器。
A. LR ;
B. LCWD;
C. LMCD;
D. LJ;
【单选题】
电流互感器的准确度等级是以额定电流下的允许___来标称的。
A. 电流误差的百分数;
B. 电流误差;
C. 角差 ;
D. 复合误差;
【单选题】
测量用电流互感器的标准准确度等级有___
A. 0.2级,0.5级,1级和5级;
B. 0.1级,0.2级,0.5级,1级和5级;
C. 0.2级,0.5级,1.3级和5级;
D. 0.1级,0.2级,0.5级,1.3级和5级;
【单选题】
10P20的电流互感器准确级次为___
A. 10;
B. 10P;
C. 20;
D. 200;
【单选题】
电流互感器在运行中二次绕组必须进行可靠___
A. 接地;
B. 保护接地;
C. 接零;
D. 多点接地;
【单选题】
电流互感器铁芯内的交变主磁通是由___产生的。
A. 一次绕组两端电压;
B. 二次绕组内通过的电流;
C. 一次绕组内通过的电流;
D. 一次和二次电流共同;
【单选题】
只有___产生的磁通。
A. 激磁涌流;
B. 励磁涌流;
C. 剩磁涌流;
D. 涌磁涌流;
【单选题】
电流互感器采用不完全星形接线在运行中___故障。
A. 不能反映所有的接地;
B. 能反映各种类型的接地;
C. 仅反映单相接地;
D. 不能反映三相短路;
【单选题】
采用完全星形接线的电流互感器___电流。
A. 能测量两相;
B. 只能测量三相;
C. 只能测量故障相;
D. 能测量三相电流和故障相;
【单选题】
3只同型号的电流互感器的同极性端子并联后接入仪器,这种接线方式是___
A. 一相式接线;
B. 两相电流差接线;
C. 三相完全星形接线;
D. 零序接线;
【单选题】
电容器的无功输出功率与电容器的电容___。
A. 成反比;
B. 成正比;
C. 成比例;
D. 不成比例;
【单选题】
电容器并联在电网中具有___的作用。
A. 补偿无功功率;
B. 补偿有功功率;
C. 补偿视在功率;
D. 补偿电能质量;
【单选题】
在电容器电路中,___不能通过电容器。
A. 直流电流;
B. 零序电流;
C. 交流电流;
D. 交流负荷电流;
【单选题】
当电容器额定电压等于线路额定电压时,则应接成___并入电网。
A. 串联方式;
B. 并联方式;
C. 星形;
D. 三角形;
【单选题】
不论电容器组接成星形或三角形,其放电电阻接成___较为可靠。
A. 串联方式;
B. 并联方式;
C. 星形;
D. 三角形;
【单选题】
电容器星形接线采用熔丝保护时,每组台数不宜超过___。
A. 7台;
B. 6台;
C. 5台 ;
D. 4台;
【单选题】
电容器长期运行电压不应超过___额定电压。
A. 1.1倍;
B. 1.3倍;
C. 1.5倍;
D. 2倍;
【单选题】
电容器长期运行电流不应超过___额定电流。
A. 1.1倍;
B. 1.3倍;
C. 1.5倍;
D. 2倍;
【单选题】
形成频率很高.幅值很大的过渡性电流,称为___。
A. 短路电流;
B. 励磁涌流;
C. 过渡电流;
D. 合闸涌流;
【单选题】
提高电网功率因数的方法之一是并联补偿___。
A. 电阻;
B. 电感;
C. 电容器组;
D. 阻抗;
【单选题】
应采用___接法。
A. 并联;
B. 串联;
C. 星形;
D. 三角形;
【单选题】
静止补偿器既可以补偿电压偏移,又可以调节___波动。
A. 电压;
B. 电流;
C. 有功功率;
D. 无功功率;
【单选题】
当发生单相接地时,消弧线圈上___。
A. 没有电压;
B. 电压升高到系统的线电压;
C. 电压升高到系统的相电压;
D. 电压降低;
推荐试题
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability