【判断题】
空调客车在运行中途或遇特殊情况必须带电作业时,可以单独进行作业
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
发生电气火灾,不应用水扑救,而应使用泡沫灭火器救火
A. 对
B. 错
【判断题】
只要人体不接触带电体,就不会触电
A. 对
B. 错
【判断题】
新造客车车电装置安装完毕后,对交流配线应使用1500V,50Hz交流电进行耐压试验
A. 对
B. 错
【判断题】
电子防滑器控制电源是48V直流电
A. 对
B. 错
【判断题】
在接触网未停电、未接地而处理车辆故障距接触网带电部分不足1m时,必须在无接触网线路上或按规定办理接触网停电手续后,方准进行作业
A. 对
B. 错
【判断题】
如果MGS电子防滑器上显示“7。2”时,表明轮对的车轮防滑出错
A. 对
B. 错
【判断题】
利用接触网供电的空调客车,其照明电源采用单相220V交流电
A. 对
B. 错
【判断题】
用沙土灭火时,距接触网2M以上者,可不停电
A. 对
B. 错
【判断题】
旅客列车运行途中,严禁关闭电子防滑器装置、轴温报警装置和其他报警装置
A. 对
B. 错
【判断题】
25T客车逆变器工作时输出电压AC380V±10%,工作频率50HZ±1HZ
A. 对
B. 错
【判断题】
电子防滑器的电磁排风阀安装于空气分配阀与副风缸的连接管路上。()[2
A. 对
B. 错
【判断题】
目前我国25型客车使用鞍式车钩复原装置
A. 对
B. 错
【判断题】
电铃、开关、插座等分解检修,作用良好,安装牢固,各开关开闭位置一致,上关下开
A. 对
B. 错
【判断题】
应急电源输出线“+”、“—”对车体无漏电,漏电电流值不得超过20mA
A. 对
B. 错
【判断题】
手动合闸接通负载,KM1闭合,电池向应急负载供电,应急指示灯亮
A. 对
B. 错
【判断题】
电采暖接线盒端子无松动,配线无老化,变色,过热,线号清晰,密封胶圈无破损
A. 对
B. 错
【判断题】
油炸锅温度可调控器应可靠,动作在50—150℃内调节
A. 对
B. 错
【判断题】
蒸饭箱电热管温度超过限温230℃时必须断开限温器停止加热
A. 对
B. 错
【判断题】
关上蒸饭箱门打开进水阀,按下启动按钮绿色指示灯亮,开始加热蒸饭
A. 对
B. 错
【判断题】
给水装置组成后须做注水试验,水位显示器及其它各部作用良好,无漏泄
A. 对
B. 错
【判断题】
顺号调节器是调节显示车厢号的作用
A. 对
B. 错
【判断题】
分线盒内接线柱螺栓须紧固,螺母、垫圈须用铜制品
A. 对
B. 错
【判断题】
配线管内主干线允许截换,各支线部分允许截换,但必须焊接牢固
A. 对
B. 错
【判断题】
客车空调装置包括通风、制冷、加热、加湿、自动控制等设备
A. 对
B. 错
【判断题】
空调客车空调配电柜中转换继电器是用来均衡压缩机工作时间的
A. 对
B. 错
【判断题】
ZF系列电开水炉电热管电源为单相交流220V、50Hz
A. 对
B. 错
【判断题】
运行途中,KP-2A型控制箱失控,摘下RD3,电机仍发电,说明SCR短路
A. 对
B. 错
【判断题】
目前我国客车上常用的三通阀有103型、GL3两种
A. 对
B. 错
【判断题】
新造客车质量验收中,绝缘试验不合格,属于致命缺陷
A. 对
B. 错
【判断题】
各个电气设备的金属外壳,可以相互串接后接地
A. 对
B. 错
【判断题】
客车照度的测量应在隔绝外界光源,所有门窗关闭,一般照明灯全开的满载旅客的运行状态下进行
A. 对
B. 错
【判断题】
主视图应反映该零件主要结构及形状特征
A. 对
B. 错
【判断题】
热量总是从温度高的物体传到温度低的物体
A. 对
B. 错
【判断题】
湿度是湿空气的状态参数之一,它表示空气中所含水分的数量
A. 对
B. 错
【判断题】
列车编组中,任何位置上子车连续连挂不得超过2辆
A. 对
B. 错
【判断题】
凡新造或更换绕组的发电机皆须进行1次交流耐压试验
A. 对
B. 错
【判断题】
从理论上讲,摩擦减振器与油压减振器的减振原理是相同的
A. 对
B. 错
【判断题】
工艺纪律就是工艺规程
A. 对
B. 错
【判断题】
班组实行劳动定额管理就是按车间下达定额组织生产
A. 对
B. 错
【判断题】
发现踏面剥离时,应立即测量,超过运用限度时应立即甩车
A. 对
B. 错
推荐试题
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.