相关试题
【多选题】
紧急停炉时,会对裂解炉造成___等不利影响。
A. 缩短炉管使用寿命
B. 炉管弯曲
C. 渗碳
D. 炉管内壁焦块脱落
【多选题】
废热锅炉在线清焦与常规清焦相比,最根本的区别在于___。
A. 提高裂解炉开工率
B. 缩短烧焦时间
C. 延长炉管寿命
D. 减少废热锅炉水力清焦次数
【多选题】
裂解炉停炉时,需要倒空的有___。
A. 汽包
B. 废热锅炉
C. 稀释蒸汽管线
D. 锅炉给水管线
【多选题】
在进行裂解炉烧焦操作前,必须确认该台裂解炉___。
A. 稀释蒸汽已经切出系统并放空
B. 原料盲板已经复位,原料管线吹扫结束
C. 空气盲板已经拆除
D. 急冷油盲板已经复位,急冷油管线已经吹扫结束
【多选题】
确定裂解单元运行负荷应该考虑的因素有___。
A. 本装置后系统的运行情况
B. 裂解炉炉况
C. 原料库存
D. 下游装置运行负荷
【多选题】
某个阀门填料密封渗漏,可能的原因有___。
A. 填料压盖没压紧
B. 填料老化、变质
C. 阀杆损坏
D. 介质温度升高
【多选题】
装置锅炉给水中断,且短时间内无法恢复时,裂解炉的关键处理步骤应该包括___。
A. 切断裂解炉燃料及原料供应
B. 关小烟道挡板,控制降温速率
C. 增加稀释蒸汽供应量
D. 切断汽包排污
【多选题】
用火作业前对作业人员的劳保穿戴检查,哪些内容___?
A. 安全帽、工作服、工作鞋等质量是否合格、过期、损坏。
B. 安全带质量是否合格、过期、损坏。
C. 绝缘手套、护脚套、护面罩、眼镜等质量是否合格、过期、损坏;
D. 电焊钳、把线是否完好;
【多选题】
泵机械密封的四个密封点,包括___。
A. 泵体与压盖之间
B. 静环与压盖之间
C. 动环与静环之间
D. 动环与轴或轴之间
【多选题】
适宜做调节流体流量及输送含颗粒物料的阀门是___。
【多选题】
芳烃可能发生的裂解反应有___。
A. 侧链断链反应
B. 侧链脱氢反应
C. 缩合反应
D. 岐化反应
【多选题】
急冷系统的重要工艺参数包括___。
A. 汽油分馏塔顶温度
B. 塔釜温度
C. 急冷油粘度
D. 干点、闪点
【多选题】
对于法兰面泄漏,以下描述正确的为___。
A. 垫片选用不当导致泄漏
B. 法兰变形,不平等会导致泄漏
C. 螺栓没正确把紧会导致泄漏
D. 开停车对法兰面泄漏无影响
【判断题】
只要达到可燃物的爆炸下限,遇到明火就会发生爆炸
【判断题】
可燃物质在空气中的含量低于爆炸下限时,遇到明火,既不会燃烧,也不会爆炸
【判断题】
裂解反应温度越高,反应越容易进行,裂解深度也越高,因而乙烯收率越高
【判断题】
二次注汽是解决重质原料干点温度高于该原料裂解温度的问题,防止原料在对流段预热则结焦
【判断题】
离心泵调节进口流量容易造成气蚀而损坏泵
【判断题】
裂解炉的一次注汽量实际值=总量×60% .
【判断题】
柴油炉形成的焦相对松软小片状,乙烷裂介炉形成的焦解非常硬成块状.
【判断题】
燃料总管系统波动,不会对结焦造成较大的影响
【判断题】
裂解炉检修时不进炉膛检修燃料气火咀不用置换
【判断题】
裂解炉发生SD-2跳车,应打开挡板防止炉膛超温,放出热量
【判断题】
影响气油干点的最主要原因是急冷油塔的顶温
【判断题】
可燃物质在空气中的含量高于爆炸上限时,不会爆炸,但可能燃烧
【判断题】
烷烃对热的稳定性,随着分子量的增加而升高.
【判断题】
一般地,当裂解条件一定时,乙烷裂解的乙烯产率最高,随着C原子数地增加,乙烯收率逐惭降低
【判断题】
裂解原料在裂解炉管中停留时间越长,则反应越充分,乙烯收率越高
【判断题】
芳烃在裂解反应中不易发生开环反应,而易发生侧链断链反应
【判断题】
均匀调节系统与串级调节系统在形式上,控制目的上是一样的
【判断题】
回流比就是指回流量与塔顶馏出物的量之比
【判断题】
48U型炉的稀释蒸汽总量等于一次注汽量加上二次注汽量
推荐试题
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP