【多选题】
绝缘子出现以下()现象需要更换。___
A. 放电痕迹超过 有效绝缘长度 的 10%
B. 出现贯通性裂 纹
C. 绝缘子本体线 性弯曲度超过1%
D. 接触网绝缘部 件的泄漏距离 不少于 250mm
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
BCD
解析
暂无解析
相关试题
【多选题】
接触线磨耗全面测量位置包括()。___
A. 电连接线夹两 侧
B. 定位线夹两侧
C. 接头线夹处接 触线磨耗
D. 跨中接触线磨耗
【多选题】
刚性悬挂线岔的检修标准有哪些()。___
A. 渡线接触线应 比正线接触线 高出 0~7mm
B. 单开道岔 , 两 悬挂点的汇流 排中心线间距200±30mm
C. 交 叉 渡 线 道 岔,两悬挂汇 流排中心线分 别 距 交 叉 点100±20mm
D. 线岔处在受电 弓可能同时接 触两支接触线 范围内的两支 接触线应等高
【多选题】
刚性接触网系统中需要按设计要求接地 的包括()。___
A. 接触网支持结构
B. 设备底座
C. 开关底座
D. 支持装置底座
【多选题】
接触网动态检测的目的、意义是()。___
A. 发现接触网 的缺陷
B. 为接触网的调整提供依据
C. 能为既有线运营管理提供维 修参考依据
D. 同时能够在新线路检查工程质量和为验收提供依据
【多选题】
以下属于接触网硬点引起的故障有()。___
A. 接触线和受电 弓的机械损伤
B. 电弧烧伤影响 取流
C. 弓网故障
D. 局部磨耗发展 为接触线断线
【多选题】
造 成 接 触 网 电 连 接 事 故 的 主 要 原 因 有()。___
A. 电连接线夹接 触 不 良 或 脱 落。
B. 电连接线驰度 过大,机车通 过时刮坏。
C. 开关引线与电 联 接 接 线 错 误。
D. 电连接线截面 不够或连接不 合理造成电连 接线的烧伤。
【多选题】
腕 臂 的 类 型 按 跨 越 的 股 道 数 量 可 分 为()。___
A. 单线路腕臂
B. 双线路腕臂
C. 绝缘腕臂
D. 非绝缘腕臂
【多选题】
关于铜承力索优缺点,以下说法正确的 有()。___
A. 导电性好
B. 抗腐蚀性强
C. 价格较高
D. 机械性能比钢 承力索高
【多选题】
关于吊索的安装要求,正确的是()。___
A. 吊索长度必须 符合规定,误 差 不 超 过 ± 50mm(两心形 环的外缘之间 的距离)
B. 钳压管的压接必须符合要求
C. 钳压管与心形 环连接处必须 密贴
D. 吊 索 线 应 顺 直,不得有弯 曲、变形或散 股
【多选题】
下列哪些是接触线的线材型号()。___
A. GJ-70
B. TJ-180
C. CTAH120
D. Ris120
【多选题】
以下属于接触轨授流方式的是()。___
A. 上部授流方式
B. 下部授流方式
C. 侧部授流方式
D. 局部授流方式
【多选题】
下列有关分段绝缘器与列车行车方向的相对安装方向的选项不正确的是()。___
A. 刚性悬挂接触、网分段绝缘器 、长导流板端为 、车辆受电弓出弓侧。
B. 短导流板端为 车辆受电弓进 入侧
C. 刚性悬挂接触 网分段绝缘器 长导流板端为 车辆受电弓出 弓侧,短导流 板端为车辆受 电弓进入侧。
D. 刚性悬挂接触 网分段绝缘器 长导流板端为 车辆受电弓进 入侧,短导流 板端为车辆受 电弓出弓侧。
【多选题】
接触网隔离闸刀是轨道交通接触网牵引供电系统的重要设备之一,主要用于接触网的()。___
A. 故障切除
B. 分段停电检修
C. 分段停电作业
D. 改变供电运行方式
【多选题】
设立锚段便于在接触线和承力索两端设置补偿装置,以调整线索的()。___
A. 弛度
B. 强度高
C. 张力
D. 长度
【多选题】
架空接触网缺陷分为()。___
A. 制造缺陷
B. 供电运营
C. 管理缺陷
D. 施工或维修缺陷
【多选题】
以下不属于支持装置的作用是()。___
A. 用来将接触线固定在设计的 位置上,并承受导线所受的 风力、之字力和曲线上的水 平分力
B. 用来支持和悬 吊接触悬挂, 将接触悬挂的 负荷传递给支柱B
C. 用来将接触线 固定在一定位 置上,并承受导线所受的一切外力
D. 用来支持悬吊腕臂,将接腕臂的负荷传递 给支柱
【多选题】
评价接触网弓网受流性能优劣与否包括以下哪个方面()?___
A. 接触线和受电弓之间的压力
B. 接触线高度
C. 接触线与受电弓的接触状态
D. 离线的燃弧持续时间
【多选题】
柔性接触网拉出直线段为( )曲线段为( )___
A. 正负300mm
B. 正负250mm
C. 正负200mm
D. 正负350mm
【多选题】
图纸中必要的尺寸包括( )、( )、( )。___
A. 规格尺寸
B. 装配关系尺寸
C. 工艺尺寸
D. 安装尺寸
E. 允许尺寸
【多选题】
接触网平面图一般可分为( )平面图和( )平面图。___
A. 地面接触网
B. 隧道接触网
C. 接触网站场
D. 接触网区间
【多选题】
连接零件包括连接器、()、长定位环、套管绞环、()、接触线及承力索接头线夹。___
A. 定位环
B. 支持器
C. 定位线夹
D. 套管双耳
【多选题】
接触网零件发展的方向是采用优质材料,实现挤压成型模式,并要求零件结构新颖、( )、( )。___
A. 载荷能力强
B. 强度高
C. 重量轻
D. 防腐性能好
【多选题】
零件的刚度分为( )和( )两种。___
A. 表面接触刚度
B. 表面变形刚度
C. 整体变形刚度
D. 整体接触刚度
【多选题】
为了提高零件的整体刚度,( )或( )。___
A. 增大截面的惯性矩
B. 增大截面的防腐措施
C. 增大截面应力
D. 可增大零件截面尺寸
【多选题】
影响零件寿命的主要因素有:()、___以及相对运动零件接触表面的磨损等三方面。(AB)
A. 材料的疲劳
B. 材料的腐蚀
C. 零件尺寸大小
D. 环境状况
【多选题】
影响零件疲劳强度的主要因素有( )、( )、( )。___
A. 应力集中
B. 载荷能力强
C. 绝对尺寸
D. 表面状态
【多选题】
磨耗从成因上讲,可以分为( )、( )和( )。___
A. 物理磨耗
B. 电气磨耗
C. 化学磨耗
D. 机械磨耗
【多选题】
磨损主要有( )、( )、( )和( )。___
A. 粘着磨损
B. 接触疲劳磨损
C. 磨料磨损
D. 腐蚀磨损
【多选题】
电气磨耗是指( )和( )。___
A. 粘结磨耗
B. 电离子转移
C. 颗粒磨耗
D. 电弧烧损
【多选题】
机械磨耗分为( )和( )___
A. 粘结磨耗
B. 电离子转移
C. 颗粒磨耗
D. 电弧烧损
【多选题】
软、硬横跨形式的支持定位装置主要包括( ),( )和吊弦等。___
A. 横向承力索
B. 上、下部定位绳
C. 定位器
D. 馈线
【多选题】
定位器具有一定的倾斜度,其倾斜度规定在( )~( )之间。___
A. 1:5
B. 1:0.5
C. 1:2
D. 1:10
【多选题】
支柱在接触网中的作用可分为( )、转换支柱、( )、( )、( )、道岔支柱等几种。___
A. 中间支柱
B. 中心支柱
C. 定位支柱
D. 锚柱
【多选题】
刚性架空接触网悬挂点的正线最大跨距:曲线为( )m,直线为( )m。___
A. 5~7
B. 7~9
C. 9~10
D. 10~11
【多选题】
隔离开关的触头要有足够的( )和( )。___
A. 粘合力
B. 压力
C. 摩擦力
D. 自清扫能力
【多选题】
按锚段关节的所含跨距数可分为( )、( )、( )、( )等几种不同形式。___
A. 一跨
B. 二跨
C. 三跨
D. 四跨
【多选题】
中国电气化铁路建设初期,采用的是铜接触线,主要型号为( )、( )、( )型。___
A. TCG-85
B. TCG-100
C. TCG-110
D. TCG-120
【多选题】
采用合金的目标是提高接触线的( )、( )和( )___
A. 抗拉强度
B. 耐磨耗性能
C. 导电性能
D. 高温软化性能
【多选题】
吊弦一般有环节吊弦、活动吊弦、( )吊弦和( )吊弦。___
A. 弹性
B. 隔离
C. 整体
D. 分布
【多选题】
验电和装设、拆除接地线,必须由( )人进行,()人操作,1人监护,其岗位等级分别不低于初级(包括初级)。___
A. 1
B. 2
C. 3
D. 4
推荐试题
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level