刷题
导入试题
【单选题】
驼峰色灯信号机显示___——指示机车车辆加速向驼峰推进。J427
A. 一个绿色
B. 一个绿色闪光灯光
C. 一个绿色灯光和一个黄色灯光
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
驼峰色灯辅助信号机及其复示信号机显示一个黄色灯光,指示机车车辆向驼峰___推送。J428
A. 缓慢
B. 准备
C. 预先
【单选题】
进站信号机的色灯复示信号机无显示表示主体信号机在___状态。J429
A. 开放
B. 关闭 .
C. 灭灯
【单选题】
发车进路信号机的色灯复示信号机显示一个绿色灯光——表示主体信号机在___状态。J429
A. 开放
B. 关闭
C. 无显示
【单选题】
在自动闭塞区段,当列车接近的通过信号机显示容许信号时,机车信号机显示一个___灯光。J435
A. 半黄半红色闪光
B. 红色
C. 蓝色
【单选题】
三显示自动闭塞区段机车信号机显示一个黄色灯光,要求列车注意运行,表示列车接近的地面信号机显示一个___灯光。J435
A. 红色
B. 蓝色
C. 黄色
【单选题】
无线调车灯显信号显示绿灯闪数次后熄灭,表示___信号。J439
A. 推进
B. 起动
C. 连结
【单选题】
无线调车灯显信号显示绿、黄灯交替后绿灯长亮,表示___信号。J439
A. 连接
B. 溜放
C. 减速
【单选题】
列车运行中,遇昼间两臂高举头上向两侧急剧摇动,夜间白色灯光上下急剧摇动,司机应立即___。J440
A. 减速
B. 降弓
C. 停车
【单选题】
列车运行中,遇昼间展开的___信号旗,司机需将列车降低到要求的速度。J440
A. 红色
B. 黄色
C. 绿色
【单选题】
调车手信号指挥机车向显示人反方向去的信号,昼间用展开的绿色信号旗、夜间用绿色灯光___。J441
A. 在下部左右摇动
B. 上下摇动
C. 上下小动
【单选题】
调车手信号指挥机车向显示人方向稍行移动的信号,昼间为拢起的红色信号旗直立平举,再用展开的绿色信号旗___。J441
A. 上下摇动
B. 左右小动
C. 上下小动
【单选题】
联系用手信号显示股道号码时,夜间白色灯光左右摇动后,从左下方向右上方高举,表示股道开通___道。J442
A. 一
B. 二
C. 三
【单选题】
联系用手信号显示股道号码时,夜间白色灯光作圆形转动,表示股道开通___道。J442
A. 二
B. 五
C. 八
【单选题】
联系用手信号显示股道号码时,昼间右臂向右平伸,左臂向右下斜45°角,表示股道开通___道。J442
A. 四
B. 六
C. 九
【单选题】
联系用手信号显示股道号码时,夜间白色灯光作圆形转动后,再高举头上左右小动,表示股道开通___道。J442
A. 八
B. 九
C. 十
【单选题】
联系用手信号显示十、五、三车距离信号中的“十车”(约110米)信号时,昼间的显示方式为展开的绿色信号旗单臂平伸连续下压 ___次。J442
A. 一
B. 两
C. 三
【单选题】
夜间机车出入段时的道岔开通信号为:___灯光高举头上左右摇动。J442
A. 白色
B. 黄色
C. 绿色
【单选题】
降弓手信号在昼间的显示方式为左臂垂直高举,右臂___并左右水平重复摇动。J445
A. 前伸
B. 下垂
C. 高举
【单选题】
升弓手信号在夜间的显示方式为白色灯光作___。J445
A. 圆形转动
B. 左右重复摇动
C. 上下摇动
【单选题】
道岔表示器夜间显示___灯光时,表示道岔位置开通直向。J446
A. 黄色
B. 蓝色
C. 紫色
【单选题】
信号机在开放状态其四个发车方向进路表示器左方横向显示两个白色灯光——表示进路开通,准许列车向左侧___方向线路发车。J448
A. A
B. B
C. C
【单选题】
调车表示器向调车区方向显示一个白色灯光,表示准许机车车辆___。J451
A. 自调车区向牵出线运行
B. 自牵出线向调车区运行
C. 自牵出线向调车区溜放
【单选题】
减速地点标,设在需要减速地点的两端各___ m处。J454
A. 20
B. 30
C. 50
【单选题】
机车的鸣笛鸣示方式中,起动注意信号的鸣示方法为___。J461
A. 一长声
B. 二长声
C. 一长二短声
【单选题】
司机发现(或接到通知)邻线发生障碍,应向邻线上的列车发出___信号。J461
A. 警报
B. 呼唤
C. 紧急停车
【单选题】
机车的鸣笛鸣示方式中,紧急停车信号的鸣示方式为___。J461
A. 一长声
B. 连续短声
C. 一长三短声
【单选题】
在口笛号角鸣示方式中,停车信号为___。J462
A. 一长声
B. 二短一长声
C. 连续短声
【单选题】
机车挂车时,机车距脱轨器、防护信号、车列___m前必须停车。C13
A. 5
B. 10
C. 20
【单选题】
机车挂车时,确认脱轨器、防护信号撤除后,显示连挂信号,以不超过___km/h的速度平稳连挂。C13
A. 5
B. 8
C. 10
【单选题】
制动机进行简略试验时,自阀减压___kPa并保压1min,检查制动主管贯通状态,司机检查制动主管漏泄量,每分钟不得超过20kPa。C15
A. 50
B. 100
C. 最大有效减压量
【单选题】
货物列车起动困难时,可适当压缩车钩,但不应超过总辆数的___。 C16
A. 三分之一
B. 三分之二
C. 二分之一
【单选题】
货物列车速度在___km/h以下时,不应缓解列车制动。C28
A. 15
B. 20
C. 30
【单选题】
列车进入停车线施行制动停车时,追加减压一般不应超过___次;一次追加减压量,不得超过初次减压量。C28
A. 一
B. 两
C. 三
【单选题】
错误办理行车凭证发车或耽误列车事故的责任划分:司机起动列车,定___单位责任。事58
A. 车务
B. 机务
C. 车务、机务
【单选题】
应停车的客运列车错办通过,定车站责任;在区间乘降所错误通过,定___单位责任。事59
A. 车务
B. 机务
C. 车务、机务
【单选题】
总公司、铁路局行车安全监察人员,凭___登乘机车。运31
A. 登乘机车证
B. 工作证
C. 监察证
【单选题】
回送机车在一地滞留时间超过___小时(故障除外),所在局调度所要向总公司汇报滞留原因及解决措施。运75
A. 8
B. 12
C. 24
【单选题】
铁路机车车辆驾驶人员资格申请人隐瞒有关情况或提供虚假材料的,___年内不得再次申请。18号文第38条
A. 1
B. 2
C. 0.5
【单选题】
铁路机车车辆驾驶人员资格申请人在考试过程中有贿赂、舞弊行为的,取消考试资格,已经通过的考试科目成绩无效,且___内不得再次申请。18号文第39条
A. 1
B. 2
C. 0.5
【判断题】
机车上应备有复轨器和铁鞋(止轮器)。
A. 对
B. 错
推荐试题
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用