刷题
导入试题
【单选题】
(36506)钢结构涂料施工性能的主要测定方法有漆膜厚度测量、黏度、干燥时间、弹性和___。(1.0分)
A. 耐水性
B. 流动性
C. 抗冻性
D. 耐冲击性
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
(36508)钢筋混凝土盖板箱涵应在沉降缝外围敷设___宽的防水层。(1.0分)
A. 0.2m
B. 0.3m
C. 0.4m
D. 0.5m
【单选题】
(36509)在严寒地区,对涵洞两端应检查有无___。(1.0分)
A. 流水
B. 积雪
C. 冻害
D. 埋压
【单选题】
(36510)桁梁涂装后应抽验主要杆件的___进行涂装质量检查。(1.0分)
A. 10%
B. 20%
C. 30%
D. 40%
【单选题】
(36511)拱桥温度伸缩缝和拱顶前后各___范围内不允许有钢轨接头。(1.0分)
A. 1m
B. 2m
C. 3m
D. 4m
【单选题】
(36512)支座的类型主要决定于梁的种类、跨度和___。(1.0分)
A. 恒载
B. 荷载
C. 动载
D. 墩台高度
【单选题】
(36513)锚螺栓埋入墩台深度不得少于___。(1.0分)
A. 200mm
B. 250mm
C. 280mm
D. 300mm
【单选题】
(36514)漆膜失效的检查方法主要有肉眼观察、手摸、___和滴水检查。(1.0分)
A. 滴油
B. 刮验
C. 光照
D. 测厚仪
【单选题】
(36515)木排架主要有卧木排架和___。(1.0分)
A. 立木排架
B. 桩基排架
C. 双排架
D. 通天排架
【单选题】
(36516)滑车的穿挂方法主要有普通穿法和___。(1.0分)
A. 直穿法
B. 花穿法
C. 双穿法
D. 交叉穿法
【单选题】
(36517)导坑开挖的工作面中,二氧化碳的浓度不得超过___。(1.0分)
A. 0.2%
B. 0.3%
C. 0.4%
D. 0.5%
【单选题】
(36518)抬轿式扣轨铺设时先在路肩适当位置上搭设___枕木垛。(1.0分)
A. 四个
B. 六个
C. 八个
D. 十个
【单选题】
(36519)普通混凝土使用搅拌机搅拌时,时间不得超过___。(1.0分)
A. 2.5min
B. 3min
C. 3.5min
D. 4min
【单选题】
(36520)拱圈放样是比较复杂和精细的工作,应在___进行。(1.0分)
A. 样台
B. 现场
C. 图纸
D. 实验室
【单选题】
(36521)防水混凝土主要有普通防水混凝土、外加剂防水混凝土和___(1.0分)
A. 膨胀防水混凝土
B. 粗骨料防水混凝土
C. 细骨料防水混凝土
D. 速凝防水混凝土
【单选题】
(36522)墩台顶面标高与设计标高偏差不得超过___。(1.0分)
A. 5mm
B. 10mm
C. 15mm
D. 20mm
【单选题】
(36523)砌筑小跨度拱圈一般采用___。(1.0分)
A. 整体砌筑法
B. 对称砌筑法
C. 分段砌筑法
D. 预留空缝砌筑法
【单选题】
(36524)捣固机械车组在混凝土桥面作业时,必须事先拆除护轨,并应测定轨枕底的石砟厚度,厚度不足___时,不得进行捣固。(1.0分)
A. 100mm
B. 150mm
C. 200mm
D. 250mm
【单选题】
(36525)不宜采用齿轮传动是___。(1.0分)
A. 小中心距传动
B. 大中心距传动
C. 要求传动比恒定
D. 要求传动效率高
【单选题】
(36526)在铁路初测阶段,常沿铁路线路每___左右建立一个水准点,作为今后铁路测量的基本依据。(1.0 分)
A. 0.5km
B. 1km
C. 1.5km
D. 2km
【单选题】
(36527)桥跨结构在计算荷载最不利组合作用下,横向倾覆稳定系数不应小于___。(1.0分)
A. 1.1
B. 1.2
C. 1.3
D. 1.4
【单选题】
43/99380.(36528)手工矫正变形型钢和钢结构杆件的方法有板正法、斜悬沉打法、拍打法、摔震法和___。(1.0分)
A. 反正法
B. 锤展法
C. 直线法
D. 交叉法
【单选题】
(36529)滑车组的牵引计算分为精确算法和___。(1.0分)
A. 动力算法
B. 近似算法
C. 荷载算法
D. 承重力算法
【单选题】
(36531)桥梁上常用的铆钉为___。(1.0分)
A. 锥体铆钉
B. 半埋头铆钉
C. 埋头铆钉
D. 半圆头铆钉
【单选题】
(36532)插入式振捣器相邻两个插入位置的距离不得大于作用半径的___。(1.0分)
A. 3倍
B. 2.5倍
C. 2倍
D. 1.5倍
【单选题】
(36533)铁路上常用的防水砂浆多是以___为主要成分的五矾防水剂配制而成。(1.0分)
A. 碳酸钠
B. 硅酸钠
C. 氮酸钠
D. 硫酸钠
【单选题】
(36534)内燃机按___分类,可分为往复活塞式内燃机、旋转活塞式内燃机、轮式内燃机等。(1.0分)
A. 基本工作原理
B. 所用燃料
C. 工作循环冲程数
D. 旋转活塞式
【单选题】
(36535)湿度超过30%的木材,横纹承压容许应力降低___。(1.0分)
A. 10%
B. 15%
C. 18%
D. 20%
【单选题】
(36536)沿对角线方向,铆钉中心间最小容许距离为___。(1.0分)
A. 2d
B. 3d
C. 3.5d
D. 4d
【单选题】
(36537)高强度螺栓的承载能力是用___表示的。(1.0分)
A. 抗拉强度
B. 抗压强度
C. 抗滑强度
D. 抗剪强度
【单选题】
(36538)高于___的砂浆不能使用抗冻砂浆。(1.0分)
A. M20
B. M15
C. M10
D. M7.5
【单选题】
(36539)雷雨时不得接近高压电杆___以内。(1.0分)
A. 10m
B. 5m
C. 3m
D. 2m
【单选题】
(36540)四缸柴油机,各缸做功的间隙角度为___。(1.0分)
A. 45°
B. 30°
C. 120°
D. 180°
【单选题】
(36541)___不是组成铸钢摇轴支座的部件。(1.0分)
A. 上下摆
B. 锚栓
C. 底板
D. 摇轴
【单选题】
(36542)明桥面线路钢轨爬行做定期检查记录,控制爬行量不得超过___。(1.0分)
A. 10mm
B. 15mm
C. 20mm
D. 30mm
【单选题】
(36543)隧道限界的检查方法常用的是___和摄影法。(1.0分)
A. 经纬仪法
B. 水准仪法
C. 横断面
D. 目视法
【单选题】
(36545)钢结构涂装劣化2级中,起泡、裂纹、脱落面积是___。(1.0分)
A. F<3%
B. F<5%
C. 5%≤F<16%
D. F<20%
【单选题】
(36546)直流电动机转速调节方便,调速范围广,启动转矩大,制动转矩大,易于快速启动和停机,___方便可靠。(1.0分)
A. 使用
B. 维修
C. 控制
D. 安全
【单选题】
(36547)高强度螺栓的承载力比铆钉大___。(1.0分)
A. 35%
B. 30%
C. 25%
D. 20%
【单选题】
(36548)墩台变形观测工作一般___一次,观测资料积累并绘制图表。(1.0分)
A. 三个月
B. 六个月
C. 一年
D. 二年
【单选题】
(36549)用食指在涂膜上轻轻一擦,整个手指黏附大量颜料粒子或出现露底,即为粉化___。(1.0分)
A. 1级
B. 2级
C. 3级
D. 4级
推荐试题
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用