相关试题
【单选题】
原料注硫的目的是___。
A. 提高反应速度
B. 防止炉管渗碳,降低裂解气中CO量
C. 保护炉管,同时提高收率
【单选题】
本装置中所用的高压锅炉给水的压力为___。
A. 45Kg/cm
B. 125Kg/cm
C. 30Kg/cm
【单选题】
发生全装置停电时,下列说法不正确的是___。
A. 各电机全部停止运行
B. 各裂解炉引风机全部停止运行
C. 各机泵全部停止运行
D. 各裂解炉原料电磁阀关闭
【单选题】
116下作业内容,不属于一般作业的是___。
A. 搭拆脚手手架
B. 机泵维修
C. 破土
D. 拆装换热器
【单选题】
以下关于设备润滑管理的说法不正确的是___。
A. 设备润滑的目的是减少设备零部件磨损,保证设备正常运行,延长设备使用寿命
B. 润滑的任务是按技术规范要求,正确选用润滑材料,定时、定点、定量对设备进行润滑
C. 设备润滑包括“三定”和油品的“五级”过滤
【单选题】
炉膛压力高高的报警值、联锁值分别为___
A. 0Pa、50Pa
B. 10Pa、50Pa
C. -10Pa、0Pa
【单选题】
F-001汽包液位低低的报警、联锁值分别是___。
A. 35%,5.3%
B. 34.38%,11.25%
C. 45%,5.3%
【单选题】
乙烯装置仪表风的露点应为___℃。
A. -90
B. -70
C. -40
D. 0
【单选题】
下列各项中,不属于“三查四定”内容的是___。
A. 查设计漏项
B. 查施工质量隐患
C. 查未完工程
D. 竣工管线试压查漏
【单选题】
裂解炉正常点火升温过程中,炉膛温度达到___℃左右时,可以投稀释蒸汽。
A. 100
B. 150
C. 200
D. 300
【单选题】
125设备倒空后通常要打开放空阀,其目的是___。
A. 泄压
B. 充压
C. 使设备内部与大气连通,加快倒空速度
D. 没什么目的
【单选题】
下列关于系统进行氮气置换合格的叙述正确的是___。
A. 任何一个采样点氧含量分析合格即可
B. 至少两个采样点氧含量分析合格
C. 至少三个采样点氧含量分析合格
D. 所有采样点氧含量分析都要合格
【单选题】
127工艺水过滤器的滤芯材质为___。
A. 聚丙烯纤维
B. 不锈钢
C. 碳钢
D. 铝合金
【单选题】
在测量裂解炉某根炉管管壁温度时,下列叙述正确的是___。
A. 应选择炉管上部某点测量
B. 应选择炉管中部某点测量
C. 应选择炉管下部某点测量
D. 应选择炉管上、中、下部各一点测量
【单选题】
与机械密封相比,填料密封的优点有___。
A. 寿命长
B. 操作维修方便
C. 密封性可靠
D. 适用范围广
【单选题】
下列选项中,不属于塔类设备检修内容的是___。
A. 蒸煮
B. 清扫塔盘
C. 校验安全附件
D. 检查修理塔体油漆和保温
【单选题】
裂解炉对流段原料预热盘管破裂后,室外最明显的变化是___。
A. 裂解炉负压不断降低
B. 裂解炉烟气温度异常上升
C. 裂解炉烟囱冒白烟
D. 裂解炉烟囱冒黑烟
【单选题】
利用外接调质油的方法降低急冷油粘度存在明显的弊端,下列有关叙述不正确的是___。
A. 只在短时间内有效,不能彻底解决问题
B. 增加了汽油分馏塔的气相负荷
C. 粘度降低太快,不宜控制
D. 不利于装置高负荷生产
【单选题】
裂解炉发生燃料气低压联锁停车后,不正确的处理是___。
A. 停止稀释蒸汽供应
B. 停止原料供应
C. 维持锅炉给水供应
D. 关小烟道挡板
【单选题】
裂解炉点火前需要对该炉燃料气管线进行氮气置换,置换合格后氧含量应___。
A. 〈0.2%
B. 〈0.3%
C. 〈0.4%
D. 〈1.0%
【单选题】
135将中压蒸汽减压后做稀释蒸汽时,中压蒸汽从___处进入稀释蒸汽系统。
A. 工艺水汽提塔
B. 稀释蒸汽汽包
C. 稀释蒸汽过热器后
D. 各炉稀释蒸汽总管
【单选题】
在裂解炉升温至热备状态时,稀释蒸汽量应该达到设计值的___%。
A. 50
B. 75
C. 100
D. 120
【单选题】
下列措施中不利于降低急冷油粘度的是___。
A. 适当加大塔顶汽油回流量
B. 适当提高减粘塔塔顶温度
C. 外接调质油
D. 适当提高侧线LFO采出量
【单选题】
裂解炉辐射段炉管镍元素含量过高,会导致___。
A. 炉管耐高温性能下降
B. 炉管延展性下降
C. 炉管抗氧化性能下降
D. 炉管内原料结焦趋势增大
【单选题】
下列各项中,最适合用作汽油分馏塔洗涤用油的是___。
A. 急冷油
B. 裂解柴油
C. 裂解汽油
D. 加氢汽油或石脑油
【单选题】
裂解气压缩机停车后,裂解单元紧急处理步骤中错误的是___。
A. 将裂解气由急冷水塔塔顶放火炬
B. 所有裂解炉停止投油
C. 停止乙烷裂解炉的运行,停止注硫
D. 维持急冷油、急冷水的循环运行
【单选题】
属于乙烯装置关键设备日常维护的内容是___。
A. 定期检查维护设备
B. 对有关设备安全设施及设备安全运行的系统进行检查
C. 对机泵进行试运,检查是否完好、备用
D. 定期换油
【单选题】
仪表风故障后,装置处理不正确的是___。
A. 裂解炉紧急停车
B. 压缩机紧急停车
C. 分离系统紧急停车
D. 各塔维持全回流运转
【单选题】
控制裂解炉横跨段温度的主要目的是___。
A. 降低排烟温度,提高炉子热效率
B. 提高辐射段热负荷
C. 防止原料在对流段结焦 .( C )
【单选题】
采用丙烷作裂解原料,要得到较高的乙烯收率,应采用较( )的裂解温度,较___停留时间。
【单选题】
死亡一人属于报集团公司什么事故?___
A. 一般事故
B. 死亡事故
C. 轻微事故
D. 较大事故
【单选题】
___是使气体液化的有效手段。
A. 降温,降压
B. 升温,降压
C. 降温;加压
【单选题】
急冷水塔的工艺目的不包括___。
A. 冷却裂解气
B. 回收急冷水的余热
C. 分离出裂解气中的绝大部分水
D. 分离出裂解气中的多数重烃
【单选题】
乙烯装置循环冷却水的上水压力设计值为___。
A. 0.5MPa
B. 0.6MPa
C. 0.7MPa
D. 0.8MPa
【单选题】
水压试验要保持足够的时间,以使在试验压力下能完成对系统中接头泄漏的检查,保持的时间应不少于___。
A. 10分钟
B. 20分钟
C. 30分钟
D. 1小时
【单选题】
对于超高压蒸汽自身过热的裂解炉来说,___温度达到500℃时,可以进行超高压蒸汽并网操作。
A. 炉膛
B. 辐射段出口
C. 横跨段
D. 超高压蒸汽
【单选题】
下列各项中,属于急冷区日常分析项目的是___。
A. 急冷油粘度
B. 急冷水塔裂解气总管成份
C. 汽油分馏塔入口裂解气总管成份
D. 稀释蒸汽含油量
【单选题】
在管线倒空操作操作时,选择该管线的___倒空最为有效。
A. 最高点
B. 最低点
C. 起点
D. 终点
【单选题】
正确使用手提式化学泡沫灭火器的方法是___。
A. 上下混合即可
B. 撕去铅封,拨出保险销按下压把
C. 取下铅封
D. 按下压把
推荐试题
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image