【单选题】
(31368)柴油机输油泵的活塞与泵体,是经过选配和___而达到高精度配合的,故无互换性。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
(31369)更换手动输油泵前应___。
A. 关断输油泵油路。
B. 拆卸输油泵外部管路。
C. 拆卸输油泵安装螺栓
D. 以上都需要。
【单选题】
(31370)更换输油泵后应___。
A. 紧固新输油泵安装螺栓。
B. 安装输油泵外部管路。
C. 开启输油泵油路,对输油泵进行性能试验。
D. 以上都需要。
【单选题】
(31371)柴油机输油泵的活塞与泵体,是经过选配和___而达到高精度配合的,故无互换性。
【单选题】
(31372)下面哪个不是1FC5系列发电机AVR中三个内整定电位器?___
A. USOL(电压内整定调整)
B. VR(放大倍数调整)
C. VOLTARJ电压调整电位器
D. TN(动态时间调整)
【单选题】
(31373)下面哪个不是MP-T系列发电机APRl25—5型电压调节器内的三个可调整电位器?___
A. FREQ频率调整电位器
B. USOL(电压内整定调整)
C. STAB稳定性调整电位器
D. VOLTARJ电压调整电位器
【单选题】
(31374)下面哪个不属于MP-T系列发电机的精度调整?___
A. 频率调整
B. 稳定性调整
C. 电压调节(整定)
D. 电流调整
【单选题】
(31375)柴油机喷油泵的供油拉杆由___控制。
A. 调速器
B. 油量限制器
C. 调速杠杆
D. 手动控制器
【单选题】
(31376)发电车负载试验台的操作包括___。
A. 将发电车强电输出线与户外箱对应的插座联接好。
B. 连接好户外箱内信号放大盒与发电车控制表盘上仪表之间的接线。
C. 打开负载间防雨设施使负载在测试过程中能够充分散热,检查负载间有无异物或其它导电物,保证冷却系统能够正常工作。
D. 以上全部要。
【单选题】
(31377)下面哪个不是发电车负载试验过程需要的?___
A. 检查试验台各仪表显示是否与发电车各仪表显示一致。
B. 检查柴油机各部是否存在渗漏、烟色是否正常。
C. 检查发电机绕组、接线、轴承有无异常温升。
D. 检查空调机组制冷情况。
【单选题】
(31378)使用发电车负载试验台的质量标准为___。
A. 负载试验台使用前必须认真检查,保证性能良好,负载状况达到试验要求。
B. 试验期间必须做好安全防护,严禁无关人员操作。
C. 试验期间发现问题必须及时处理后,再进行下一步试验。
D. 以上都对。
【单选题】
(31379)柴油机调速器调速弹簧变软,会导致柴油发动机___。
A. 最高转速下降
B. 最高转速上升
C. 启动困难
D. 怠速下降
【单选题】
(31380)EFC电子调速器上转速降调整旋钮能调整转速降的范围是___。
A. 1%~3%
B. 2%~5%
C. 2%~3%
D. 0~5%
【单选题】
(31381)当要增高柴油机转速时,对机械调速器应___。
A. 降低调速弹簧预紧力
B. 增加调速弹簧刚度
C. 增加调速弹簧直径
D. 增大调速弹簧预紧力
【单选题】
(31382)发电车中48V蓄电池的充电电流一般不超过___。
A. 10A
B. 30A
C. 40A
D. 35A
【单选题】
(31383)下列说法不正确的是?___
A. 充电装置可对24V蓄电池充电
B. 机组自带充电机和充电装置可同时对24V蓄电池充电
C. 机组自带充电机可对24V蓄电池充电
D. 充电装置可对48V蓄电池充电
【单选题】
(31384)发电车上油箱控制在自动位时,当油位至___时,电动输油泵自动泵油。
A. “1/2”
B. “1/4”
C. “1/3”
D. “1”
【单选题】
(31385)发电车上油箱控制在自动位时,当油位至___时,电动输油泵自动停止。
A. “1/4”
B. “3/4”
C. “1”
D. “1/3”
【单选题】
(31386)启动电源箱检修电器元件时应做到___。
A. 箱内电器安装牢固,接线紧固,配线无老化、龟裂。
B. 熔断器容量符合电气原理图要求。
C. 电气原理图清晰、完整、正确。
D. 以上都需要。
【单选题】
(31387)启动电源箱检修箱门时应做到___。
A. 外观良好,无破损,安装牢固。
B. 门轴转动灵活。
C. 门锁扣作用良好。
D. 以上都需要。
【单选题】
(31388)启动电源箱检修内容包括___。
A. 外观检查
B. 内部清洁、检查
C. 应急启动转换装置检查、试验
D. 以上都包括
【单选题】
(31389)机房废气排气扇开机前应检查做到___。
A. 排气扇安装牢固
B. 排气扇电机接线无松动,配线无烧损、焦化、老化,护线管无破损
C. 排气扇扇叶无变形
D. 以上都需要
【单选题】
(31390)在标准化发电车评分标准中机房排气扇作用不良,扣___。
A. 10分
B. 5分
C. 20分
D. 30分
【单选题】
(31391)MTU柴油机不能正常停机的处理方法___。
A. 闭进油阀,断油停机
B. 松开双联单列过滤器的两根出油管,断油停机
C. 关闭应急风门,断气停机;紧急风门不能自动脱扣时,可手动操作脱扣
D. 以上都是
【单选题】
(31392)发现机组充电机对蓄电池不充电应___。
A. 检查充电机运转是否正常,有无卡死或皮带打滑现象。
B. 检查充电接触器是否动作,主触头是否接通(SFK71型车充电指示灯亮)。SFK122型车还需检查熔断器7FUK2,若均正常,但充电电流表显示仍为零或为负值(蓄电池电压仍为24V左右),说明充电发电机坏,可改用整流器充电或使用其它机组充电。
C. 若充电接触器不动作,用万用表交流500V档或试电笔测量接触器线圈两端电压。若有电压,充电接触器坏;无电压或电压过低,检查充电选择开关、熔断器、本车交流电源相线及零线是否良好。
D. 以上都需要
【单选题】
(31393)若充电电压已有25V以上,而充电电流为零,应检查___。
A. 充电电路接线是否接触不良
B. 蓄电池过充或亏损严重
C. 蓄电池连接线是否接触不良
D. 以上都需要
【单选题】
(31394)若充电机接触器不动作,测量接触器线圈两端电压不符要求,应检查___。
A. 充电选择开关是否良好
B. 充电线路熔断器是否良好
C. 本车交流电源相线及零线是否良好
D. 以上都需要
【单选题】
(31395)机房排气扇发生故障应___。
A. 检查电机接线有无松动。
B. 检查配线有无烧损、焦化、老化者现象。
C. 检查电机绕组对地绝缘电阻是否为0
D. 以上都需要
【单选题】
(31396)运用客车质量鉴定条件中,发电车机房排气扇作用不良属___故障。
【单选题】
(31397)机房排气扇的电机绕组对地绝缘电阻要求为___以上。
A. 1 MΩ
B. 1.5 MΩ
C. 2 MΩ
D. 3 MΩ
【单选题】
(31398)不会造成柴油机机油混水的部件是___。
A. 机油冷却器裂纹
B. 水泵油封密封不严
C. 缸套出现裂纹
D. 汽缸盖裂纹
【单选题】
(31399)下面不会造成机组排气冒黑烟的是___。
A. 喷油嘴喷油雾化不良
B. 喷油提前角太小或太大
C. 供油量过多或各缸供油质量不一致
D. 柴油有水
【单选题】
(31400)柴油机排气烟色不正常会出现___。
A. 排气冒黑烟
B. 排气冒白烟
C. 排气冒蓝烟
D. 以上都是
【单选题】
(31401)主空气断路器电路发生故障应___。
A. 检查电源或线路接触情况。
B. 检查辅助开关触点接触情况。
C. 检查脱扣指复位情况。
D. 以上都对
【单选题】
(31402)主空气断路器电路发生故障,下面不需要检查的是___。
A. 欠压脱扣器
B. 分励脱扣器
C. 合闸整流装置
D. 旋转整流器
【单选题】
(31403)主空气断路器灭弧室栅片的绝缘电阻,应不低于___时才能使用。
A. 0.1MΩ
B. 0.2MΩ
C. 0.5MΩ
D. 0.4MΩ
【单选题】
(31404)冷却风机自动位不工作改用手动操作,如电机工作正常,说明控制电路和主电路正常。应___。
A. 再恢复自动位,和万用表交流500V档测量85℃压力温度继电器触点两端电压。
B. 若有380V电压,说明压力温控器电触点未接通,可调整其动作值或更换温控器。
C. 若无电压,说明线路断线或开关自动位接触不良,停机后查找。
D. 以上都需要
【单选题】
(31405)如果冷却风机自动位及手动位风扇不工作,应___。
A. 检查主电路:空气开关、接触器、热继电器及线路。
B. 检查控制电路:压力式温度继电器、熔断器、高低压继电器及线路。
C. 检查冷却风机是否烧损。
D. 以上都需要
【单选题】
(31406)康明斯发电车1号冷却风机控制电路中,若1KT线圈损坏,将可能造成风机高速位时___。
A. 有低速无高速
B. 有高速无低速
C. 无低速也无高速
D. 高低速线圈同时供电
【单选题】
(31407)柴油发电机组一般采用的启动电机是___直流电动机。
【单选题】
(31408)康明斯KTA-19G2柴油机启动电机边一管子口冒黑烟,有可能是___。
A. 启动电机短路
B. 启动电机断线
C. 废气涡轮增压器故障
D. 油底壳进柴油
推荐试题
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1