【填空题】
16.当列车处于非ATO 模式下时,保持制动的施加由制动系统负责,保持制动的缓解由___负责。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【填空题】
17.当TCMS故障时,保持制动的管理全部由___自身负责。
【填空题】
18.在ATO 模式下,TCMS 仅接受来自___ 的保持制动命令。
【填空题】
19.长沙地铁2号线一期车辆转向架的轮缘润滑方式采用___。
【填空题】
停放制动不同于一般的充气→制动,排气→缓解,它是通过___而产生制动作用,能满足列车较长时间断电停放的要求。
【多选题】
简述长沙地铁2号空压机空气净化单元工作流程___。
A. 进入本单元的压缩空气首先通过气水分离器分离压缩空气中的液态水、油和部分固体粒子,分离出来的液态水、油和固体粒子等污染物通过电磁排污阀自动排出;
B. 经气水分离器初步分离净化的压缩空气接着进入高效过滤器进行过滤净化,过滤凝聚的水(雾)、油(雾)及各种粒子等污染物通过电磁排污阀自动排出;
C. 经高效过滤器过滤后的压缩空气接着进入吸附式干燥器进行干燥净化以去除压缩空气中的水蒸汽;经吸附式干燥器干燥后的压缩空气接着进入灰尘过滤器过滤净化以去除吸附式干燥器在运行过程中产生并由压缩空气携带的粉尘,过滤聚结的粉尘通过手动排污阀人工定期排放;
D. 经灰尘过滤器过滤后的压缩空气最后进入用气端。
【多选题】
保压制动是为防止车辆在停车前的冲动,使车辆平稳停车,EBCU内部设定的执行程序,请简述它是如何实施的___。 它分两个阶段实施:
A. 第一阶段:当列车制动到速度低于设定的摩擦制动介入值后,牵引控制单元触发保压制动信号,同时输出给EBCU,这时,由牵引控制单元控制的电制动逐步退出,由EBCU控制的气制动替代。
B. 第二阶段:接近停车时,一个小于制动指令的保压制动由EBCU开始自动实施,即瞬时地将制动缸压力降低。
【多选题】
在什么情况下才可以实现开门?___
A. 零速信号激活
B. 使能信号激活
C. 有开门指令
D. 此外必须出现下列情况:车门未隔离,紧急装置未操作
E. 如果上述任一情况未出现,无法实现开门。
【多选题】
TCMS检测进行牵引封锁的条件是什么? ___
A. 司机室联锁故障;牵引系统方向故障
B. 车门未全部关闭,且无“车门旁路”信号
C. 列车停放制动未缓解,且无“停放制动缓解旁路”信号
D. 列车安全环路断开或者列车完整性环路断开
E. 列车发出牵引指令后,5秒内列车仍然不能缓解所有制动
F. 列车总风管压力低于600kPa;
G. 3个及以上DCU故障;
H. 7个及以上转向架制动被切除。
【多选题】
简要描述主电路中主隔离开关、高速断路器、差分电流传感器、充电接触器、短接接触器、主接地开关的作用?___
A. 主隔离开关用于主电路的隔离以及通过机械连锁开关将支撑电容器的两端通过低值电阻连接后释放能量;
B. 高速断路器用于主电路的故障保护;
C. 差分电流传感器用于检测后续电路的接地故障;
D. 充电接触器用于支撑电容器的预充电;
E. 短接接触器用于电网直接向牵引逆变器供电;
F. 主接地开关用于主电路的接地隔离等。
【多选题】
简述制动斩波单元功能 ___
A. 再生制动时,若电容两端电压上升至一定值时,触发电阻制动斩波模块,调节斩波模块开关元件导通角,将电容两端电压稳定在一定的电压值,此时为再生和电阻混合制动。
B. 若电容两端电压或电网电压回落,则由电阻制动转换为再生制动。
C. 牵引或制动工况时,通过触发导通斩波模块,能抑制因空转等原因引起的瞬时过电压。
【多选题】
简述人工广播失效的检查方法___。
A. 将激活端切换到对面司机室,如果可以进行人工广播则为广播控制盒故障。
B. 如果单节车厢有没广播则为该车厢功放设备故障。
C. OCC广播开关处于闭合状态时会造成人工广播暂时失效。
D. 检查广播控制盒面板上的“激活”指示灯是否亮起,没有亮表示处于非激活端状态,无法进行人工广播。
【多选题】
TCMS 可以对列车运行的相关参数进行积累计算和保存,便于列车检修和维护。记录的参数包括哪些内容?___
A. 列车累计运行里程(km);
B. 列车日运行里程(km);
C. 列车累计牵引能耗(kWh);
D. 列车累计电制动能耗(kWh);
E. 列车累计辅助系统能耗(kWh);
F. TCMS 系统累计运行时间(h)。
【多选题】
请阐述高速断路器以及隔离开关的功能。___
A. 高速断路器的功能:当在电路中出现严重的干扰情况时,比如过流、牵引逆变器故障或短路等,高速断路器能安全断开牵引设备与接触电网的连接,以此来保护牵引逆变器等设备。
B. 隔离开关的功能:一个是用于车间电源转换,另一个则是高速断路器前的隔离接地
【多选题】
DCU软件主要由如下控制功能软件组成?___
A. 变流器逻辑保护及特性控制。
B. 速度处理及斩波控制。
C. 粘着利用控制。
D. 牵引电机控制
【多选题】
牵引逆变器输入电路中线路电感器的作用是什么?___
A. 牵引系统中的线路电感器与电容器组成LC滤波电路,作用是减少线路电压的瞬变和谐波,稳定逆变单元的输入直流电压。
B. 保证逆变单元得到一个优质的直流电压。
C. 同时线路电感器也起扼流作用,目的是防止电感器后端在引起接地短路或逆变单元故障产生的瞬间浪涌电流时,起到扼制突变和平顺电流的作用。
D. 因此线路电感器通常也会称为平波电感器。
【多选题】
简述牵引箱中电容器充放电的过程 ___
A. 当列车牵引准备好,主电路高速断路器(HB)闭合后,闭合接触器(KM2),通过受流器(+206=11-X11)输入的高压电源经隔离开关(MQS)、充放电电阻(R1)给支撑电容(C)充电,当电容电压在一定时间且上升到一定值时, KM1 闭合,电容充电完成。
B. 在正常情况下,电容的放电由固定放电电阻(R4)完成,将电容端电压放电到 50V 以下的时间小于5min。
C. 当对高压电路和 VVVF 逆变器检修或维护保养时,则充放电电阻(R1)与隔离开关的联锁辅助开关( MQS1 )形成直流支撑电容的快速放电回路,从而使电容通过放电电阻快速放电。
【多选题】
辅助高压箱的工作原理是什么? ___
A. 在刀开关BQS 置于运行位同时刀开关 AQS 置于运行位情况下,受流装置输入的 DC1500V 高压通过刀开关BQS,刀开关AQS 和熔断器 AF 为辅助电源提供电源,熔断器 AF 对主电路起保护作用。当采用车间电源对辅助电源供电时,将BQS 置于车间位,辅助电源即转为车间电源供电。该电路有联锁功能,即当使用车间电源供电或置于切除位时,受流装置被禁止升弓动作。
B. 车间电源实现互锁电路,辅助高压箱车间电源柜门处设有限位开关 KT1,实现两 TC 车车间电源互锁功。柜门闭合时,KT1 处于“断开”状态;当柜门打开时,KT1 变为“闭合”状态,外部控制继电器线圈得电,地面电源通过车间电源为 SIV 供电,当另一车辅助高压箱车间电源柜门打开时,本车外部控制继电器线圈失电,无法送入高压。即实现当一车辅助高压箱使用车间电源供电,另一车辅助高压箱车间电源柜门不允许打开功能。
【多选题】
试分析LC 滤波电路作用?___
A. LC 滤波电路吸收直流输入端的谐波电压,对输入电源网络的高频信号和电压尖峰干扰有抑制作用,
B. 同时又能抑制逆变器对输入电源网络的干扰,并使电容器C两端电压保持稳定并将电压波动限制在允许范围内。
【多选题】
试分析跳主断的原因?___
A. 差分电流大于50A、充电超时、充电接触器(KM2)卡合、短接接触器(KM1)卡合;
B. 元件故障、硬件判断网压过压、硬件判断直流过压、硬件判断直流过流、斩波1过流、斩波2过流、电源故障、板不在位;
C. 软件判断网压过压、软件判断中间电压过压、MCU生命信号中断、主断线圈减载故障。
【多选题】
在哪些情况下,TCMS 将取消发向所有的DCU 的牵引指令及牵引/制动设定值: ___
A. 司机室连锁故障;牵引系统方向故障;
B. 车门未全部关闭,且无“车门旁路”信号;
C. 列车停放制动未缓解,且无“停放制动缓解旁路”信号;
D. 列车安全环路断开或者列车完整性环路断开;
E. 制动系统触发紧急制动 (针对紧急制动列车线到某个制动系统的硬线断落这种情况);
F. 列车发出牵引指令后,5 秒内列车仍然不能缓解所有制动;
G. 列车总风管压力低于 5.5bar,且无“总风压力旁路”信号;
H. 列车速度大于 5Km/h,非制动工况下检测到列车制动未缓解。
【多选题】
试分析扩展供电逻辑? ___
A. 当网压达到额定值且持续15 秒后,才进行扩展供电逻辑 ;
B. 检测到一台 SIV 通信故障、380V 输出不正常或者SIV 的KMA 继电器未闭合 ;
C. 向空调发送减载指令 ;
D. 如果在 15S 内接收不到空调完成减载的反馈,再将空调设置为通风模式(空调在与网络通信中断的情况下,必须保证不得处于全载工况) ;
E. 当空调处于半载或者通风工况下, TCMS 通过DXM 输出“扩展供电”指令(高电平有效);
F. SIV 恢复正常工作后,TCMS 立即撤销“扩展供电”指令,5S 后再撤销“空调减载”指令;
G. TCMS 发出“扩展供电”指令后1 秒内收不到“扩展供电反馈”信号,TCMS 报“扩展供电接触器故障”。
【多选题】
在哪些情况下,TCMS 系统的HMI 会提示司机进入紧急牵引模式: ___
A. 出现两个或两个以上DCU 通信故障(由VCMe 诊断);
B. 出现操作端 HMI 通信故障(由HMI 诊断);
C. 出现两个或两个以上BCU 通信故障(由VCMe 诊断);
D. 司机控制器牵引/制动手柄电位器故障(由VCMe 诊断)。
【多选题】
当主电路断开时,如何对滤波电抗器进行放电?___
A. 通过续流二极管V1和阻尼电阻R2组成续流支路,
B. 在主电路断电时,用以释放滤波电抗器中的能量。
【多选题】
哪些条件均满足时 ,闭合充电接触器。 ___
A. 主断反馈状态为闭合
B. 方向手柄非零位
C. 网压大于1300V
D. 无斩波开通标志
【多选题】
哪些条件均满足时 ,闭合短接接触器。 ___
A. 充电接触器反馈状态为闭合已达3s
B. 中间电压不低于1300V且大于网压的85%
C. 方向手柄非零位
【多选题】
试分析空调预冷模式:___
A. 如果系统一开机即检测到室内温度 Ti≥31.5℃,则执行预冷模式。
B. 首先四台通风机均运行,同时新风阀关闭,回风阀打开,延时35s后两点断开,以下动作同全冷模式相同;
C. 若在自动模式下,ACCU如有收到MVB发过来的“关闭预冷信号”则立即退出预冷模式,执行UI553自动模式。
D. 当Ti温度降到Tic-1℃以下,或者预冷持续15分钟后,预冷状态结束,此时系统根据目标温度和室内温度差值工作在相应工作模式,新风阀,回风阀均打开。
【多选题】
当那些条件同时满足时,TCMS通过DXM输出“扩展供电”指令(高电平有效): ___
A. 检测到一台SIV通信故障、380V输出不正常或者SIV的KMA继电器未闭合 ;
B. 向空调发送减载指令 ;
C. 如果在15S内接收不到空调完成减载的反馈,再将空调设置为通风模式(空调在与网络通信中断的情况下,必须保证不得处于全载工况) ;
D. 当空调处于半载或者通风工况下, TCMS通过DXM输出“扩展供电”指令(高电平有效)SIV恢复正常工作后,TCMS立即撤销“扩展供电”指令,5S后再撤销“空调减载”指令,
E. TCMS发出“扩展供电”指令后1秒内收不到“扩展供电反馈”信号,TCMS报“扩展供电接触器故”。
【多选题】
年检作业动态调试中,需要做哪些旁路试验?___
A. 门零速旁路功能检查;
B. 门关好旁路功能检查;
C. 所有制动缓解旁路功能检查;
D. 停放制动旁路功能试验;
E. 警惕旁路功能。
【单选题】
司机台气压表里白色指针表示___。
A. Tc车主风管压力
B. 主风管压力
C. Tc车主风缸压力
D. 主风缸压力
【单选题】
司机台气压表里红色指针表示___。
A. Tc车主风管压力
B. 主风管压力
C. Tc车第一轴制动缸压力
D. 主风缸压力
【单选题】
受电弓升弓气压为___
A. 550kpa
B. 700kpa
C. 500kpa
D. 450kpa
【单选题】
当主风管压力小于___时,列车封锁牵引。
A. 550kpa
B. 600kpa
C. 500kpa
D. 450kpa
【单选题】
当主风管压力小于___时,列车产生紧急制动。
A. 550kpa
B. 700kpa
C. 500kpa
D. 450kpa
【单选题】
当风压小于___时,一台空压机开始工作。
A. 550kpa
B. 700kpa
C. 500kpa
D. 750kpa
【单选题】
当风压小于___时,两台空压机开始工作。
A. 550kpa
B. 700kpa
C. 500kpa
D. 750kpa
【单选题】
总风压力高于___时,安全阀动作。
A. 700kpa
B. 900kpa
C. 1000kpa
D. 1050kpa
【单选题】
慢行模式限速为___。
A. 15km/h
B. 10km/h
C. 5km/h
D. 3km/h
【单选题】
退行模式限速___。
A. 15km/h
B. 10km/h
C. 5km/h
D. 3km/h
【单选题】
紧急牵引限速___。
A. 75km/h
B. 60km/h
C. 45km/h
D. 30km/h
【单选题】
拖动模式限速___。
A. 75km/h
B. 60km/h
C. 45km/h
D. 30km/h
推荐试题
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps