刷题
导入试题
【简答题】
简述TFX1型电子防滑器速度传感器部分的组成及作用。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
它是一个速度脉冲信号发生器,由速度传感器及感应齿轮组成(1分)。感应齿轮安装于车轴端 部,传感器安装于轴箱盖上(1分)。这是一种非接触式的传感器,当车轮转动时,它产生的频率正比于运行 速度的电脉冲信号(2分)。TFX1型防滑器中采用了永磁式磁电传感器,感应齿轮与轴承压盖做成一体,齿轮 共有90个齿,即车轮每转一圈产生90个脉冲信号(2分)。传感器径向安装在特制的轴箱盖上,其端部与齿轮 顶部保持1mm左右的间隙(2分)。当齿轮旋转时,齿顶齿谷交替通过传感器,切割磁力线,即在传感器输出线 圈上感应出相应的脉冲信号(2分)。
解析
暂无解析
相关试题
【简答题】
KZS/M-Ⅰ型集中式轴温报警器显示屏温度显示正常,但有缺笔划,断字符现象的原因及处理方法?
【简答题】
AC380V/DC600V兼容供电客车综合柜Q1、Q2(Q3、Q4)跳闸时如何排查处理?
【简答题】
简述TFX1型电子防滑器主机的工作过程。
【简答题】
KZS/M-Ⅰ型集中式轴温报警器显示屏上半部显示一长条黑杠且蜂鸣器长鸣的原因及处理方法? (1.0 分)
【简答题】
制冷工况下有通风,但冷凝风机及压缩机均不工作是什么原因? (以KLC40C(2)-1T1)为例)(1.0 分)
【简答题】
绘制单管供风普通25G型客车制动系统示意图。
【简答题】
绘出KP-2A控制箱的主整流回路电路图。
【简答题】
根据下面的三视图,补全各视图。
【单选题】
1信息显示系统车载屏厕所显示器不正常故障处理方法之一为:___损坏,应进行更换。
A. 顺号调节器
B. 显示模块
C. GPS
D. 主控板
【单选题】
旅客列车餐车电磁灶不加热故障处理方法之一为:没有电源进入,检查电磁灶保险丝有没有熔断,检查相关___。
A. 控制开关
B. 过滤器
C. 风扇
D. 电源线路
【单选题】
3旅客列车餐车DZ-4Q电热炸炉绿指示灯亮,油温不升故障处理方法之一为:电热管烧坏,更换___。
A. 过欠压保护器
B. 温控器
C. 电热管
D. 指示灯
【单选题】
旅客列车餐车DZX-9L电蒸饭箱加水指示灯亮,不能加热发生蒸汽故障处理方法之一为:电热管烧坏,更换___。
A. 电热管
B. 电磁阀
C. 启动按钮
D. 水位传感器
【单选题】
5旅客列车餐车LC7-7立式冰箱显示Er2故障处理方法之一为:制冷效果不良,检查___。
A. 制冷系统是否渗漏
B. 供电线路、电压,排除供电电压过低的现象
C. 供电线路、电压及接线
D. 探头与蒸发管接触良好
【单选题】
6“KAX-1客车行车安全监测诊断系统”车辆制动监测诊断子系统监测列车支管和制动管路的___,诊断制动机的制动/缓解工况,报告有无制动/缓解作用不良、自然制动、自然缓解故障。
A. 电压
B. 电流
C. 风压
D. 水压
【单选题】
7“KAX-1客车行车安全监测诊断系统”车辆转向架状态监测诊断子系统在车辆一/二端的车体、转向架上安装加速度传感器。监测轮轴与一系/二系悬挂系统,并根据车体的___监测整个车辆系统的状态 。
A. 速度
B. 信号
C. 参数
D. 数据
【单选题】
8TFX1型电子防滑器工作原理之一为:TFX1型防滑系统采用两种防滑判据,即减速度和___。
A. 电压差
B. 电流差
C. 速度差
D. 转速差
【单选题】
9TFX1型电子防滑器防滑作用自动切换功能之一为:如果一辆车中四个防滑排风阀良好,即使只剩下一个___还在正常工作,四条轮对都能得到保护。
A. 主机
B. 速度传感器
C. 排风阀
D. 压力开关
【单选题】
10康尼MS730CP50电控气动塞拉门电控系统整列车塞拉门的电控系统主要由一个___和各车箱的单车电控系统组成。
A. PLC
B. WG型网关
C. 电源箱
D. 集控箱
【单选题】
11AC380V供电运用列车车体配线的绝缘测量用500V级绝缘电阻计测量,线间绝缘电阻值在相对湿度为60%以下时)≥___。
A. 0.2MΩ
B. 1MΩ
C. 2MΩ
D. 4MΩ
【单选题】
12J5 型感应子发电机由机座、定子铁芯、转子、激磁绕组和电枢绕组、___、轴承及轴承盖等部分组成。
A. 端盖
B. 前盖
C. 后盖
D. 接线盒
【单选题】
13KP-2A型控制箱由___个回路组成,即主整流回路、激磁回路、测量回路、触发器回路、限流充电回路、起激回路、过压保护回路。
A. 5
B. 6
C. 7
D. 8
【单选题】
14TFX1型电子防滑器排风阀的结构:该阀的空气通路直径不小于___,完全适应于防滑器的快速控制要求。
A. 0.5mm
B. 1mm
C. 2mm
D. 3mm
【单选题】
15TFX1型电子防滑器监视功能:防滑器___对各组成部分不间断地进行监视。
A. 主机 C、排风阀
B. 速度传感器 D、压力开关
【单选题】
16我国客车车轴发电机供电方式是采用车轴驱动的发电机与蓄电池组并联向负载供电。轴驱式发电机的工作电压,当功率小于3kW时用24V,功率为3~10kW时用48V,功率在10kW以上时采用___。
A. 110V
B. 220V
C. 380V
D. 600V
【单选题】
17如果上一级保护失控,加热管继续加热,加热腔将被烧干,当电热管露出水面时,加热腔内的温度进一步提高、达到规定温度值时,装在___上的温度保险器动作,切断加热回路,确保安全。
A. 冷水缺水保护器
B. 开水满水保护器
C. 磁化过滤器
D. 加热管
【单选题】
18康尼MS730CP50电控气动塞拉门可用手动操作开门。开门:用专用三角钥匙按紧急解锁装置(或外操作装置)标记上箭头所指方向(顺时针)转动装置上的三角头转轴约___实现解锁后,用手拉动门扇即可实现开门。
A. 30°
B. 45°
C. 90°
D. 180°
【单选题】
19康尼MS730CP50电控气动塞拉门电控气动操作开门:在有集控关门信号且有电有气时,内操作装置不能开门,操作外操作装置压下微动开关,系统将关门电磁阀电源切断,这时可以手动开门,___后门将自动关闭。
A. 3s
B. 6s
C. 10s
D. 30s
【单选题】
20康尼MS730CP50电控气动塞拉门集控处在关门状态时,各车厢单门系统的内操作不能电控开门,外操作只能实现手动开门,___后自动关门。
A. 3s
B. 6s
C. 10s
D. 30s
【单选题】
21“KAX-1客车行车安全监测诊断系统”列车级通信网络收发器采用双绞线收发器FTT-10A,传输介质采用双绞屏蔽线,传输速率78.5Kb/S,传输距离___。
A. 1000m
B. 2000m
C. 2700m
D. 3000m
【单选题】
22欧特美电动内端拉门的电气系统之电动门门控制系统电机概述:无刷电机电机功率为___、电机驱动器和减速器为集成一体化的结构。
A. 30W
B. 40W
C. 50W
D. 57W
【单选题】
康尼MY700DP4A电动端门由10、20、30、___ 电控系统等四个大部件组成。
A. MK6101
B. MK6102
C. MK6103
D. MK6104
【单选题】
24欧特美自动拉门正常关闭:门开启后,延续___,门自动关闭。
A. 3s
B. 6s
C. 10s
D. 30s
【单选题】
25康尼MY700DP4A电动端门电动操作开、关门:在关闭途中遇到障碍,门扇会自动返回至开到位位置,___后自动关闭。若关闭途中障碍仍存在,则门扇会重复上述动作,直至障碍排除,门关闭到位时,无防挤压功能。
A. 3s
B. 6s
C. 10s
D. 30s
【单选题】
26真空集便器真空发生器箱压力开关(压力低于___保护)用于保护真空发生器,以免压缩空气压力低时造成真空发生器损坏。
A. 1.6bar
B. 2.6bar
C. 3.6bar
D. 4.6bar
【单选题】
27真空集便器系统控制器箱安装在污物箱箱体上,内有___、延时器、温度控制器和接线排等。
A. 继电器
B. 接触器
C. 电磁阀
D. 空气开关
【单选题】
DC600V机车供电系统优点:DC600V列车供电系统中DC110V全列贯通,各车厢DC110V供电系统___强、可靠性高。
A. 兼容性
B. 充电性
C. 放电性
D. 互补性
【单选题】
29欧特美电动内端拉门组成包括:门板组成、毛刷组成、中空玻璃、内端拉门锁组成、端门前胶条、端门后胶条、导向条和___。
A. 扣手
B. 拉手
C. 转向装置
D. 碰头组成
【单选题】
30制冷系统的部件及配管全部用银钎焊连接,构成___的制冷循环系统,空调机组的冷风出口在机组的前端部,回风口在机组的底部中间处,新风口在机组后端部和底部后侧。
A. 全封闭
B. 敞开式
C. 简单
D. 复杂
【单选题】
31客车空调机组的室外换热器(冷凝器):室外换热器为风冷冷凝器,其结构型式与蒸发器相同。高温高压的R22气体,通过冷凝器时,在外界空气的强制冷却下,变成常温___高压的氟利昂液体。
A. 约30℃
B. 约40℃
C. 约50℃
D. 约60℃
【单选题】
32板式电采暖器在热态或湿热条件下,在额定电压、额定功率时,电热芯片漏泄电流每kW不大于___。
A. 1mA
B. 3mA
C. 5mA
D. 10mA
推荐试题
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用