刷题
导入试题
【单选题】
信号系统整体更新应在非运营时段进行,运营单位应实施(),确保既有信号系统在过渡期间正常运行,并对设备的安装工艺和标准进行卡控。___
A. 全过程监控管理
B. 全过程遥控管理
C. 全过程现场管理
D. 全过程跟岗管理
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
信号系统整体更新应在非运营时段进行,运营单位应实施全过程监控管理,确保既有信号系统在过渡期间正常运行,并对设备的()进行卡控。___
A. 安装工艺和标准
B. 安装地点和标准
C. 安装工艺和要求
D. 安装人员和方法
【单选题】
新旧信号系统兼容运行的,在对两列列车进行升级并上线试用不少于()个月后,方可开展对其他列车分批次更新升级。___
A. 1
B. 2
C. 3
D. 4
【单选题】
新旧信号系统倒切前,应在非运营时段开展不少于()次的实战演练,新信号系统经过累计不少于144小时的不载客运行后方可投入运营___
A. 3
B. 4
C. 5
D. 6
【单选题】
新旧信号系统倒切前,应在非运营时段开展不少于3次的实战演练,新信号系统经过累计不少于()小时的不载客运行后方可投入运营___
A. 144
B. 145
C. 146
D. 147
【单选题】
软件升级前,运营单位应要求供应商在实验室进行充分试验,并进行()。升级时应组织供应商共同做好安全防护___
A. 技术交底
B. 方案汇报
C. 记录
D. 观察
【单选题】
城市轨道交通项目改建、扩建时,运营单位应对改扩建设计方案、技术方案、施工方案、()保障方案等文件进行事前审核后,办理施工手续。实施过程中应采取安全和检查措施保障运营安全。___
A. 安全
B. 保护
C. 试验
D. 防护
【单选题】
运营单位具体负责并组织开展设施设备运行维护工作,确保设施设备性能良好、状态稳定。___
A. 运行维护
B. 保护校验
C. 高压试验
D. 排查记录
【单选题】
托外单位开展设施设备运行维护服务工作(以下简称委外服务)的,运营单位应与服务商签订(),明确服务项目、监测及维护周期、需求响应时间、质量要求、安全作业要求和违约责任等。___
A. 书面协议
B. 口头协议
C. 会议纪要
【单选题】
托外单位开展设施设备运行维护服务工作(以下简称委外服务)的,运营单位应与服务商签订书面协议,明确()、监测及维护周期、需求响应时间、质量要求、安全作业要求和违约责任等。___
A. 服务项目
B. 人员数量
C. 工作方法
【单选题】
委外服务不免除或减轻运营单位应承担的主体责任,委外服务商依据委外服务合同承担相应责任___
A. 主体责任
B. 次要责任
C. 无责任
【单选题】
运营单位应建立委外服务评价体系,对服务商响应及时性、故障处理速度、维护计划完成率、监测和维护质量等进行综合评价,加强()管理___
A. 委外服务
B. 人员
C. 技术
【单选题】
营单位应按月统计设施设备(),定期开展设施设备故障发生次数、平均无故障运行时间、故障发生率等重点指标分析,对设施设备运行状况和服役能力进行持续评估,为设施设备维护及更新改造提供支持___
A. 故障情况
B. 故障原因
C. 故障时间
【单选题】
运营单位应组织编制各类设备的操作手册,操作手册的发布、修订及废止应经充分()后方可实施。___
A. 技术论证
B. 方案讨论
C. 试验方式
【单选题】
操作手册应至少包括启用前的状态检查、启停程序、操作流程、异常情况处置程序、()规定等内容___
A. 安全作业管理
B. 试验
C. 继保
【单选题】
运营单位应根据运营实际,合理制定___
A. 设备运行计划
B. 设备检修计划
C. 设备试验计划
【单选题】
运营单位应密切监控设施设备运行状态,对于设备异常情况报警,应进行分级分类,及时检查确认并处理___
A. 分级分类
B. 集中处理
C. 一视同仁
【单选题】
无法继续维持运营或继续运营将危及行车安全的,应停运抢修并尽快恢复()。可继续维持运营的,应视情采取区间限速、添乘检查、安全防护等措施,尽快完成故障修复___
A. 运营
B. 设备
C. 供电
【单选题】
其他不影响运营的故障,应明确故障修复方案,在具备条件后及时组织___
A. 故障处理
B. 汇报上级
C. 划分责任
【单选题】
运营单位应定期对供电、通信、信号、综合监控、站台门等存在接口关系的设备系统时钟进行监测和校准,确保各系统与()同步___
A. 主时钟服务器
B. 主所
C. 调度
【单选题】
对区间消防电话、应急照明、区间联络通道、区间疏散平台、车站、区间人防门(防淹门)和区间防排烟系统和风阀等设施设备,至少()进行一次检查和功能测试___
A. 每年
B. 每月
C. 每周
【单选题】
对信号系统降级功能、接触网(轨)单边供电和大双边供电功能,至少()进行一次测试___
A. 每年
B. 每月
C. 每周
【单选题】
设有备用控制中心的,应定期检查相关设施设备的完好性,至少()进行一次倒切测试___
A. 每年
B. 每月
C. 每周
【单选题】
对列车门紧急解锁装置、站台紧急停车按钮、站台门应急解锁装置以及电扶梯紧急停梯按钮等()设备,运营单位应通过粘贴警示标签、视频监控、安排巡查等方式加强防护___
A. 紧急操作
B. 危险操作
C. 应急操作
【单选题】
对列车门紧急解锁装置、站台紧急停车按钮、站台门应急解锁装置以及电扶梯紧急停梯按钮等紧急操作设备,运营单位应通过粘贴()、视频监控、安排巡查等方式加强防护___
A. 警示标签
B. 示意图
C. 流程图
【单选题】
更新改造范围主要包括___
A. 对原有设备进行的综合性技术改造和采取的技术措施
B. 设备老旧
C. 设备运行时间过长
【单选题】
更新改造范围主要包括___
A. 为提高自动化、智能化水平和采用新技术、新材料、新产品而进行的技术改造
B. 设备老旧
C. 设备运行时间过长
【单选题】
桥梁。混凝土桥梁巡查频率不应低于1次/()月___
A. 3
B. 4
C. 5
D. 6
【单选题】
钢桥、钢混组合桥梁、钢混混合桥梁巡查频率不应低于1次/()月___
A. 1
B. 2
C. 3
D. 4
【单选题】
桥梁墩台基础沉降与梁体竖向变形等在交付运营后第二、三年监测频率不应低于1次/年,第三年之后频率不应低于1次/()年___
A. 3
B. 4
C. 5
D. 6
【单选题】
隧道。巡查频率不应低于1次/()月___
A. 1
B. 2
C. 3
D. 4
【单选题】
隧道结构变形、联络通道等地下区间附属设施变形等第一年内监测频率不应低于1次/()月___
A. 6
B. 7
C. 8
D. 9
【单选题】
隧道结构变形、联络通道等地下区间附属设施变形等第二年监测频率不应低于1次/年,第二年之后频率不应低于1次/()年___
A. 3
B. 4
C. 5
D. 6
【单选题】
轨道。巡查频率不应低于1次/()周___
A. 1
B. 2
C. 3
D. 4
【单选题】
对轨距、水平、高低、三角坑等轨道静态几何尺寸的监测频率不应低于1次/()月___
A. 3
B. 4
C. 5
D. 6
【单选题】
路基。巡查频率不应低于1次/()月___
A. 1
B. 2
C. 3
D. 4
【单选题】
对路基本体、排水设施以及防护加固设施的检查频率不应低于1次/()年___
A. 1
B. 2
C. 3
D. 4
【单选题】
运营突发事件应急演练应遵循全面覆盖、总专结合、 、有效融合的原则。___
A. 协同联动
B. 内外联动
C. 协调联动
D. 整体联动
【单选题】
城市轨道交通运营主管部门应根据城市专项应急预案、 应急预案,组织完善运营突发事件应急处置体系,协调建立健全部门间应急处置联动机制,并细化行业内部的职责分工和工作要求等。___
A. 车间
B. 部门
C. 公司
D. 市级
【单选题】
运营单位综合应急预案、专项应急预案应报城市轨道交通运营主管部门备案。新编制或修订的,应在预案生效 个工作日内报城市轨道交通运营主管部门。___
A. 10
B. 15
C. 20
D. 25
【单选题】
行车调度岗位的现场处置方案应至少不涵盖 以下重点内容,并开展经常性演练。___
A. 列车事故/故障
B. 列车降级运行
C. 列车区间阻塞
D. 大面积停电
推荐试题
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用