【判断题】
客户重要负荷的保安电源必须由供电公司提供,不可由客户自备
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
控制电缆的选用(型号、规格)及配置符合规范规定,其敷设途径应在二次设备正常运行条件下能进行维护工作
A. 对
B. 错
【判断题】
拉开高压跌落式熔断器开关操作,应先拉开两边相,再拉中间相
A. 对
B. 错
【判断题】
拉线的经济夹角是30°
A. 对
B. 错
【判断题】
拉线盘只有混凝土拉线盘
A. 对
B. 错
【判断题】
拉线主线应在NUT线夹的凸肚侧
A. 对
B. 错
【判断题】
雷电时,可以用兆欧表在停电的高压线路上测量绝缘电阻
A. 对
B. 错
【判断题】
冷缩式电缆头套管用辐射交联热收缩材料制成
A. 对
B. 错
【判断题】
两部制电价计费的用户,其固定电费部分不实行《功率因数调整电费办法》
A. 对
B. 错
【判断题】
两个同频率正弦量相等的条件是最大值相等
A. 对
B. 错
【判断题】
没有电压就没有电流,没有电流也就没有电压
A. 对
B. 错
【判断题】
每年至少对剩余电流动作保护器用试跳器试验一次
A. 对
B. 错
【判断题】
某非工业用户装10kV100kV·A专用变压器用电,其计量装置在二次侧的,应免收变损电量电费
A. 对
B. 错
【判断题】
耐张串上的弹簧销子、螺栓及穿钉应由下向上穿。当有特殊困难时可由内向外或由左向右穿入
A. 对
B. 错
【判断题】
配电变压器,对于高压绝缘,应选用1000V的兆欧表进行绝缘电阻的测量
A. 对
B. 错
【判断题】
配电变压器是根据能量守恒原理工作的电气设备
A. 对
B. 错
【判断题】
配电变压器台架金具螺栓穿入方向是水平顺线路者,由电源侧向负荷侧穿入;横线路位于两侧者向内穿入,中间的由左向右穿,垂直的由上向下穿
A. 对
B. 错
【判断题】
配电线路的基础主要是底盘
A. 对
B. 错
【判断题】
配电线路的巡视时,只需巡视线路本体元件的情况即可
A. 对
B. 错
【判断题】
配电线路上对横担厚度的要求是不应小于4mm
A. 对
B. 错
【判断题】
配电箱盘面上的电气元器件、出线口、瓷管头等距盘面边缘均不得小于80mm
A. 对
B. 错
【判断题】
普通三相配电变压器内部是由三个单相变压器组成的
A. 对
B. 错
【判断题】
起重机不能吊运额定起重量,都是起升机构额定功率不足造成的
A. 对
B. 错
【判断题】
气温低于-10℃时,要将电缆预先加热后方可进行制作电缆头
A. 对
B. 错
【判断题】
汽油发电机励磁机励磁绕组断线,检查励磁机励磁绕组电阻应为无限大。结果是空载电压过高
A. 对
B. 错
【判断题】
钳形电流表在测量中选择量程要先张开铁心动臂,必须在铁心闭合情况下更换电流档位
A. 对
B. 错
【判断题】
窃电时间无查明时,窃电日数至少以一百八十天计算,每日窃电时间:动力用户按6小时计算;照明用户按12小时计算
A. 对
B. 错
【判断题】
热缩电缆头是由PVC塑料材料制成
A. 对
B. 错
【判断题】
人力施放电缆时,所有人员应交替应站在电缆两侧,以便展放
A. 对
B. 错
【判断题】
任何被测设备,当电源被切断后就可以立即进行绝缘测量了
A. 对
B. 错
【判断题】
任何单位和个人不得在距电力设施周围400米范围内(指水平距离)进行爆破作业
A. 对
B. 错
【判断题】
容量为100kVA的用户要执行两部制电价
A. 对
B. 错
【判断题】
容量在30kvar以下的柱上电力电容器一般采用跌落式熔断器保护。熔丝元件一般按电力电容器额定电流的2~3倍选择
A. 对
B. 错
【判断题】
熔断器的额定电流应小于熔断体的额定电流
A. 对
B. 错
【判断题】
熔体的额定电流,指熔体允许长期通过而不熔化的最小电流
A. 对
B. 错
【判断题】
如果Ⅰ级客户不愿意或拒绝双电源供电方案,供电公司应说服客户采用双电源供电,否则供电部门可以拒绝供电
A. 对
B. 错
【判断题】
如果三相正弦量频率相同、幅值相等、彼此间相位差为0°,即三者同相,则称它们为负序对称三相正弦量
A. 对
B. 错
【判断题】
如果施工临时电源是低压三相四线供电,可以采用三芯电缆另加一根导线当零线供电
A. 对
B. 错
【判断题】
如果用电信息采集失败,需要由人工补抄,抄表计划则要求进行调整
A. 对
B. 错
【判断题】
如用户委托设计任务的内容与供电方案的内容不一致,应以用户委托设计任务的内容为准。任何设计单位,不得变更供电方案中所确定的供电电压等级、受电容量、电气主接线、两路电源的运行方式、保安措施、计量方式、计量电流互感器变比
A. 对
B. 错
【判断题】
若穿过每匝线圈的磁通量相同,则该线圈的磁链与其匝数N成反比,与穿过的磁通量成正比
A. 对
B. 错
推荐试题
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config