【多选题】
蒸汽透平驱动的急冷油循环泵在启动前需要确认___。
A. 冷却水畅通
B. 冲洗油畅通
C. 密封油畅通
D. 润滑油辅助油泵运行正常
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
裂解炉底部烧嘴由___等部分组成。
A. 烧嘴头
B. 燃料通道
C. 调节风门
D. 控制回火手柄
【多选题】
影响乙烷裂解炉辐射段炉管结焦生碳的主要因素有___。
A. 燃烧模型
B. 乙烷原料中杂质的含量
C. 乙烷原料中硫含量
D. 裂解深度
【多选题】
评价塔设备性能的主要指标有___。
A. 生产能力
B. 塔板效率
C. 操作弹性
D. 塔板压强降
【多选题】
安全阀的主要技术参数有 ___。
A. 压力参数;
B. 尺寸参数
C. 物料参数
D. 排泄量
【多选题】
引起急性职业中毒事故,最常见的为两大类有害气体: ___
A. 刺激性气体
B. 恶臭气体
C. 窒息性气体
【多选题】
稀释蒸汽通过 ___ 作用抑制结焦。
A. 增大流速减薄厚度
B. 与碳发生水煤气反应
C. 降低烃分压
【多选题】
废热锅炉的工艺目的有___。
A. 急冷终止裂解反应
B. 回收高品质热量,副产超高压蒸汽
C. 减小污水排放量
D. 降低急冷油循环量
【多选题】
稀释蒸汽通过 ___ 作用抑制结焦。
A. 增大流速减薄厚度
B. 与碳发生水煤气反应
C. 降低烃分压
【多选题】
正构烷烃裂解时发生的主要反应是___。
A. 断链反应
B. 脱氢反应
C. 歧化反应
D. 氧化还原反应
【多选题】
关于裂解炉的维护内容,下列说法正确的是___。
A. 烟气横跨温度不得超过设计指标的50℃以上
B. 炉出口压力不得超过设计值
C. 裂解炉炉膛应保持在一定的负压下运行,不允许正压操作
D. 烟气含氧量应维持在2~3%之间,并保证烟囱不冒黑烟
【多选题】
下列各项中,对结焦程度有影响的是___。
A. 稀释蒸汽流量
B. 原料种类
C. 炉出口温度
D. 炉管材质
【多选题】
工作中必须与硫化氢接触的操作人员应穿戴___,并有人专人监护。
A. 化学品防护目镜
B. 隔离式防毒面具
C. 胶皮手套
D. 胶皮靴
【多选题】
下列选项中,可作为伴热蒸汽的是___。
A. 工艺蒸汽(PS)
B. 低压蒸汽
C. 中压蒸汽
D. 高压蒸汽
【多选题】
可能导致急冷水塔塔顶温度高的因素有___。
A. 塔上部急冷水返回量偏小
B. 冷却水温度偏高
C. 塔釜温过高
D. 裂解负荷高或裂解原料变化
【多选题】
合理控制急冷水塔塔釜温度的主要目的是___。
A. 尽量回收急冷水中的热量
B. 确保急冷水不发生乳化
C. 有利于控制急冷水塔塔顶温度
D. 有利于控制汽油分馏塔塔顶温度
【多选题】
蒸汽透平润滑油系统在启动透平前,正确的状态有___。
A. 润滑油辅助油泵已经启动,润滑油压力正常
B. 润滑油冷却器已经正常投用
C. 两台润滑油过滤器一台已经正常投用,另一台已经充液备用
D. 润滑油油箱满液位
【多选题】
操作人员对所使用的设备必须做到“四懂三会”,“四懂”包括的内容有___。
A. 懂结构
B. 懂性能
C. 懂维护保养
D. 懂原理
【多选题】
下列四种情况下,容易发生水锤现象的有___。
A. 蒸汽管线暖管速度过快
B. 饱和蒸汽经过阀门后被节流
C. 蒸汽冷凝速度过快
D. 已经正常投用的过热蒸汽管线
【多选题】
在投油初期调整裂解炉炉膛负压的方法有___。
A. 调整烟道挡板开度
B. 调整烧嘴风门开度
C. 调整燃料气量
D. 调整投油量
【多选题】
急冷油系统的重要工艺参数包括 。___
A. 汽油分馏塔顶温度
B. 塔釜温度
C. 急冷油粘度
D. 汽油干点
E. 闪点。
【多选题】
属于工业仪表的两个基本技术指标的是___。
【多选题】
切换润滑油过滤器时,应该注意的事项有___。
A. 确认备用过滤器具备投用条件
B. 给备用油冷器充液并排气
C. 手柄旋转180度
D. 切换六通阀不要太快
【多选题】
某个调节阀阀位不停晃动,可能的原因有___。
A. 阀门定位器故障
B. 输出管线漏气
C. 执行机构刚度不足
D. 阀门摩擦力过大
【多选题】
在拨打火警电话报警时,应该包括的内容有___。
A. 失火单位及装置名称
B. 火势大小及可能造成的危害
C. 着火部位及着火介质
D. 有无人员被困或伤亡情况
【多选题】
一个完整的脚手架至少必须具备以下几点___
A. 有扫地杆;
B. 有双拦腰杆和挡脚板;
C. 踏板铺得密并绑牢;
D. 有合格的剪刀叉和连墙件;
【多选题】
下列不属于机泵运行四不准超的是___。
A. 不准超负荷
B. 不准超时间
C. 不准超速
D. 不准超周期
【多选题】
裂解炉通常设置裂解炉燃料气压力低联锁,联锁发生时裂解炉的动作有___。
A. 燃料气电磁阀关闭
B. 原料电磁阀关闭
C. 烟气挡板全关
D. 稀释蒸汽调节阀全开
【多选题】
下列各项中,在点火前的流程设定时应当确认打开的阀门有___。
A. 裂解气大阀
B. 烧焦气大阀
C. 超高压蒸汽放空阀
D. 裂解炉各层窥视孔
【多选题】
下列各项中,可能导致裂解炉各组进料量不一致的原因有___。
A. 炉管结焦程度不同
B. 进料组分有变
C. 火嘴分布不均
D. 风门开度不一致
【多选题】
手提式二氧化碳灭火器灭火的方法有___。
【多选题】
机械密封又叫端面密封,它包括___等。
A. 动密封环
B. 静密封环
C. 弹簧加荷装置
D. 压盖
【多选题】
急冷油循环泵不上量可能的原因有___。
A. 入口过滤器堵塞
B. 出口过滤器堵塞
C. 急冷油中带水
D. 急冷油泵内漏加大
【多选题】
下列各项中,可以判断润滑油乳化的是___。
A. 润滑油混浊
B. 润滑油颜色发黑
C. 机泵轴承温度升高
D. 润滑油粘度大幅下降
【多选题】
下列各项中,可能导致信号报警系统误动作的是___。
A. 电源失电
B. 电压波动范围超过设计值
C. 连接导线短路
D. 发信元件故障
【多选题】
正确处理稀释蒸汽带水的方法有___。
A. 从稀释蒸汽总管端头排凝
B. 控制好稀释蒸汽塔液位
C. 提高稀释蒸汽的温度
D. 提高中压蒸汽补入量
【多选题】
下列措施有利于降低急冷油粘度的是___。
A. 适当提高减粘塔塔顶温度
B. 适当加大汽油分馏塔塔顶汽油回流量
C. 提高管道急冷器急冷油循环量
D. 适当减少侧线裂解柴油采出量
【多选题】
以下选项是通过控制炉出口温度来实现的是___。
A. 裂解深度
B. 转化率
C. 炉管结焦量
D. 汽包压力
【多选题】
裂解炉在进行烧焦操作时应重点关注的参数有___。
A. 出口温度
B. 烟气温度
C. 横跨段温度
D. 烟气氧含量
推荐试题
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT