【单选题】
户外落地变压器外廓与建筑物外墙距离小于【】m时,应考虑对建筑物的防火要求。___
A. 4
B. 5
C. 1
D. 2
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
用500V兆欧表测氧化锌0.22kV避雷器的绝缘电阻应不低于【】。___
A. 2MΩ
B. 10MΩ
C. 0.5MΩ
D. 5MΩ
【单选题】
高低压塑料绝缘电力电缆最低允许敷设温度为【】℃。___
A. 15
B. 10
C. KONG
D. 0
【单选题】
对于【】负荷,应由两个或多个电源供电。___
A. 1级
B. 2级
C. 3级
D. 特殊
【单选题】
电动机长时间过负载运行,【】大大超过额定电流,电动机过热。___
A. 转子电流
B. 绕组电流
C. 定子电流
D. 最小电流
【单选题】
成套开关柜、配电盘等漏电保护装置的动作电流数值选择为【】mA以上。___
A. 10
B. 100
C. 15
D. 50
【单选题】
某10kV高供高计用户接50/5电流互感器,若电能表读数为20kWh,则用户实际用电量为【】。___
A. 200kWh
B. 20000kWh
C. 2000kWh
D. 100000kWh
【单选题】
某村低压线路烧毁,需要检修处理,于是工作负责人就【】登杆检修。___
A. 立即派人
B. 经验明确无电压后
C. 经验明确无电压后,挂好接地线派人
D. 填写第二种工作票后立即派人
【单选题】
容量在【】kVA及以上的配电变压器,应装设空气过滤器。___
A. 60
B. 80
C. 100
D. 120
【单选题】
起重搬运工作,当设备需从低处运至高处时,可搭设斜坡下走道,但坡度应小于【】。___
A. 30
B. 25
C. 20
D. 15
【单选题】
使用电容器时有两项主要参数,即耐压值和电容量,而电容器耐压值是指加在其上电压的【】。___
A. 最大值
B. 瞬时值
C. 有效值
D. 平均值
【单选题】
一电感线圈接到f=50Hz的交流电路中,感抗XL=50Ω,若改接到f=150Hz的电源时,则感抗XL为【】Ω。___
A. 150
B. 250
C. 10
D. 60
【单选题】
断路器的额定电压应【】系统最高电压。___
A. 等于
B. 大于
C. 小于
D. 等于或大于
【单选题】
SL-2A型设备线夹适用的导线截面【】mm2。___
A. 35~50
B. 70~95
C. 120~150
D. 70~120
【单选题】
用于接通和断开电容器组的断路器其额定电流不应低于【】倍电容器组的额定电流。___
A. 1.1
B. 1.2
C. 1.3
D. 1.5
【单选题】
某工业用户一级重要电力客户,根据《国家电网公司业扩供电方案编制导则》规定,其供电电源【】采用双电源供电,并配置自备应急电源。___
A. 宜
B. 可
C. 应
D. 不应
【单选题】
集中器、采集终端等装置安装高度应适当,在电表房或电缆竖井内,如受位置局限,可适当降低安装高度,但底部离地面不得小于【】米。___
A. 0.5
B. 0.6
C. 0.7
D. 0.8
【单选题】
经电流互感器接入的低压三相四线电能表,其电压引入线应【】。___
A. 单独接入
B. 与电流线共用
C. 接在电流互感器二次测
D. 在电源侧母线螺丝出引出
【单选题】
《国网业扩供电方案编制导则》规定:【】在电网高峰负荷时功率因数不宜低于0.85。___
A. 100kVA及以上高压供电的电力客户
B. 其他电力客户和大中型电力排灌站
C. 农业用电客户
D. 趸购转售电企业
【单选题】
居民使用的单相电能表的工作电压是【】。___
A. 220V
B. 380V
C. 100V
D. KONG
【单选题】
地锚的抗拔力是指地锚受外力垂直向上的分力作用时,抵抗【】滑动的能力。___
A. 向左
B. 向右
C. 向上
D. 向下
【单选题】
楔形线夹属于【】金具。___
A. 接续
B. 联接
C. 拉线
D. 保护
【单选题】
10kV及以下电力接户线固定端当采用绑扎固定时,其绑扎长度应满足:当导线为25~50mm2时,应绑扎长度【】。___
A. ≥50mm
B. ≥80mm
C. ≥120mm
D. ≥200mm
【单选题】
剩余电流动作保护器安装时应避开邻近的导线和电气设备的【】干扰。___
A. 磁场
B. 电场
C. 电磁场
D. 电磁波
【单选题】
对已运行的电缆中间接头电阻与同长度同截面导线的电阻相比,其比值不应大于【】。___
A. 1
B. 1.2
C. 1.4
D. 1.5
【单选题】
按故障部位划分,电缆线路故障可分为【】。___
A. 接头故障和终端故障
B. 接地故障和断线故障
C. 本体故障和附件故障
D. 闪络故障和绝缘故障
【单选题】
两台单相电压互感器按V/V形连接,二次侧v相接地。若电压互感器额定变比为10000V/100V,一次侧接入线电压为10000V的三相对称电压。带电检查二次回路电压时,电压表一端接地,另一端接U相,此时电压表的指示值为【】V左右。___
A. 58
B. 100
C. 173
D. 0
【单选题】
《国家电网公司电费抄核收管理规则》规定,远程自动抄表正常运行后,对连续三个抄表周期出现抄表数据为零度的客户,0.4千伏非居民客户应抽取不少于的【】客户进行现场核实。___
A. 全部
B. 20%
C. 70%
D. 80%
【单选题】
三相电力变压器组别标号为D,yn2,所表示的是【】。___
A. 一次与二次线电压的相量差
B. 一、二次电流相量差
C. 铁芯与绕组的角度差
D. 电压电流相量差
【单选题】
剩余电流动作保护器对【】之间的漏电引起的危险能起保护作用。___
A. 相与相
B. 相与零
C. 相与地
D. 零与零
【单选题】
摇测电容器、电力电缆、大容量变压器、电机等设备时,绝缘电阻表必须在【】下,方可将测量笔接触或离开被测设备。___
A. 停转状态
B. 额定转速状态
C. 高速转动状态
D. 逐渐降速状态
【单选题】
绝缘套管表面的空气发生放电,叫【】。___
A. 气体放电
B. 气体击穿
C. 瓷质击穿
D. 沿面放电
【单选题】
对变压器绝缘影响最大的是【】。___
A. 温度
B. 水分
C. 杂质
D. 纯度
【单选题】
真空断路器的关键部件是【】。___
A. 真空灭弧室
B. 屏蔽罩
C. 波纹管
D. 动静触头
【单选题】
搭设跨越公路的跨越架,距路面的高度为【】。___
A. 4.5m
B. 5.5m
C. 6.5m
D. 7.5m
【单选题】
国家电网公司提出的“三集五大”中的‘三集“是指:【】___
A. 集团化、集约化、集中化
B. 人力资源、财务和物资集约化
C. 人力资源、财务和信息集约化
D. 财务、信息和物资集约化
【单选题】
在电价低的供电线路上,擅自接用电价高的用电设备或私自改变用电类别的,应按实际使用日期补交其差额电费,并承担【】倍差额电费的违约使用电费。___
A. 2
B. 3
C. 4
D. 5
【单选题】
纯电容电路的电压与电流频率相同,电流的相位超前于外加电压u为【】度。___
A. 60
B. 30
C. 90
D. 180
【单选题】
某低压配电室电源进线断路器两侧都装有隔离开关,在送电操作时,首先应合上【】。___
A. 电源进线断路器
B. 电源侧隔离开关
C. 负荷侧隔离开关
D. 无顺序要求
【单选题】
斜削法需先用电工刀以【】度角倾斜切入绝缘层,当切近芯线时,即停止用力。___
A. 45
B. 35
C. 25
D. 15
【单选题】
高压验电器绝缘部分长度,对10kV及以下不小于【】m。___
A. 0.8
B. 0.4
C. 1
D. 0.9
推荐试题
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
【单选题】
以下关于数据处理的叙述中,不正确的足___。
A. :数据处理不仅能预测不久的未来,自时还能影响未
B. :数据处理和数据分析可以为决策提供真知灼见
C. :数据处理的重点应从技术角度去发现和解释数据蕴涵的意义
D. :数据处理足从现实世界到数据,冉从数据到现实世界的过程
【单选题】
“互联网十制造”是实施《中国制造2025》的重要措施。以下对“互联网十制造”主要特征的叙述中,不正确的是___。
A. :数字技术得到普遍应用,设计和研发实现协同与共享
B. :通过系统集成,打通整个制造系统的数据流、信息流
C. :企业生产将从以用户为中心向以产品为中心转型
D. :企业、产品和用户通过网络平台实现联接和交互
【单选题】
信息技术对传统教育方式带来了深刻的变化。以下叙述中,不正确的是___。
A. :学习者可以克服时空障碍,实现随时、随地、随愿学习
B. :给学习者提供宽松的、内容丰富的、个性化的学习环境
C. :通过信息技术与学科教学的整合,激发学生的学习兴趣
D. :教育信息化的发展使学校各学科全部转型为电子化教育
【单选题】
厂参加技能考核的女工有___人。
A. :16
B. :18
C. :20
D. :24
【单选题】
(a+b-|a-b|)/2=___。
A. :a
B. :b
C. : min (a,b)
D. :max (a,b)
【单选题】
在信息收集过过程中,需要根据项目的目标把握数据___要求,既不要纳入过多无关的数据,也不要短缺主要的数据:既不要过于简化,也不要过于繁琐。
A. :适用性
B. :准确性
C. :安全性
D. :及时性