【单选题】
高级工]空调机组的动力干线由_______引出。___
A. 空调控制柜
B. 电源控制柜
C. 应急电源箱
D. 电源主干线
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
高级工]25K型空调客车的空调控制柜[KLC40C-1T1]中6号线是_______控制线。___
A. 取暖
B. 制冷
C. 通风
D. 自动**
【单选题】
高级工]使用空调机组空气预热器时,须先开启通风机运行;停用时,须先关闭空气预热器,_______后方准关闭通风机。___
A. 5min
B. 8min
C. 10min
D. 15min
【单选题】
高级工]机车供电的空调客车,在列车始发前_______连挂机车后须立即开启空调对车厢进行预冷、预热。___
A. 20min
B. 30min
C. 40min
D. 50min
【单选题】
高级工]空调客车的空调温控器冬季应设定为_______。___
A. 14~16℃
B. 16~18℃
C. 18~20℃
D. 20~22℃
【单选题】
高级工]空调客车的空调温控器夏季应设定为_______。___
A. 18~22℃
B. 22~26℃
C. 24~28℃
D. 26~30℃
【单选题】
高级工]当空调客车的环境温度低于_______时,严禁开启空调设备制冷。___
A. 15℃
B. 16℃
C. 17℃
D. 18℃
【单选题】
高级工]当空调客车的环境温度低于_______时,严禁开启电伴热装置。___
A. 0℃
B. 3℃
C. 5℃
D. 10℃
【单选题】
高级工]日本三菱JH514YZE型压缩机,额定输出功率3.75kW线圈绕组的阻值是_______。___
A. 3.08
B. 2.25
C. 1.43
D. 20
【单选题】
高级工]全制冷状态时,吸入和吹出的空气温差约为_______时为正常。___
A. 5~8℃
B. 10~12℃
C. 8~10℃
D. 5~6℃
【单选题】
高级工]制冷剂在蒸发器中蒸发_______热量,机组由此向外输出制冷量。___
A. 吸收
B. 释放
C. 传递
D. 输送
【单选题】
高级工]膨胀阀是利用蒸发器出口处的过热度来自动调节蒸发器的制冷量,并对制冷剂起_______作用。___
A. 节流升压
B. 调节流量
C. 节流降压
D. 调节压力
【单选题】
高级工]制冷设备的特点是低温,因此润滑油的_______不能选择过高。___
A. 闪点
B. 黏度
C. 蒸发温度
D. 凝固点
【单选题】
高级工]液体制冷剂通过节流阀的过程是一个节流过程,其节流前后焓值_______。___
A. 增加
B. 减少
C. 不变
D. 改变
【单选题】
高级工]根据压缩机的工作原理,压缩机可分为_______型和速度型两种。___
A. 面积
B. 体积
C. 容积
D. 复合
【单选题】
高级工]压缩机在制冷系统中用来压缩和输送制冷剂_______。___
A. 液体
B. 气体
C. 蒸气
D. 能量
【单选题】
高级工]制冷剂汽化吸收大量的汽化潜热,把空气的_______带走。___
A. 冷气
B. 热气
C. 热量
D. 湿气
【单选题】
高级工]装有毛细管的制冷系统,在压缩机停机后,需要_______min才能再次启动。___
A. 1-2
B. 2-3
C. 3-5
D. 5min以上
【单选题】
高级工]冷凝压力过高会导致压缩机超载运行,容易损坏_______。___
A. 压缩机零件
B. 冷凝器
C. 蒸发器
D. 节流装置
【单选题】
高级工]某一制冷压缩机型号为4FS7B,S表示_______。___
A. 直接启动
B. 制冷剂剂
C. 皮带传动
D. 气缸布置形式
【单选题】
高级工]压缩机的最高排气温度规定为:R12不超过_______℃。___
A. 100
B. 130
C. 150
D. 200
【单选题】
高级工]高速压缩机一般采用的润滑方式是_______。___
A. 飞溅式润滑
B. 强制式润滑
C. 人工润滑
D. 被动润滑
【单选题】
高级工]理论制冷循环中,制冷压缩机吸入的是_______蒸气。___
A. 高温
B. 湿饱和
C. 干饱和
D. 过热
【单选题】
高级工]在蒸发器中,制冷剂液体在_______温度下沸腾转变为蒸气。___
A. 较低
B. 较高
C. 普通
D. 正常
【单选题】
高级工]制冷剂在蒸发器内蒸发温度与蒸发_______相对应,即蒸发压力升高,其蒸发温度也跟着升高。___
A. 环境
B. 条件
C. 压力
D. 速度
【单选题】
高级工]制冷剂蒸气进入冷凝器,其自身因受冷却凝结为_______。___
A. 冰
B. 水
C. 露
D. 液体
【单选题】
高级工]热力膨胀阀是利用蒸发器出口制冷剂的_______自动调节供给蒸发器内制冷剂流量的节流阀。___
A. 过冷度
B. 过热度
C. 温度
D. 湿度
【单选题】
高级工]使用毛细管节流的制冷系统不需要_______,因而充入的制冷剂数量较少。___
A. 蒸发器
B. 冷凝器
C. 贮液器
D. 汽液分离器
【单选题】
高级工]汽液分离器是防止_______制冷剂直接进入压缩机的装置。___
A. 过量
B. 气体
C. 液体
D. 气液混合物
【判断题】
[高级工] 25K型空调客车,由车底分线盒引入配电柜的导线为10²mm
A. 对
B. 错
【判断题】
[高级工] 25K型空调双层客车漏电烟火报警器设定值为150mA
A. 对
B. 错
【判断题】
[高级工] 25K型空调双层客车漏电烟火报警器设定值为200mA
A. 对
B. 错
【判断题】
[高级工] BSP青藏车冷凝水管橡胶管应每年(或每运行400000km)检查一次,在每年夏天第一次使用空调时检查
A. 对
B. 错
【判断题】
[高级工] KLD-29PU型空调机组29是表示机组制冷量约为29kW
A. 对
B. 错
【判断题】
[高级工] KLD-29PU型空调机组的P48J20ZY-G航空插头中使用了20根相同直径的导线
A. 对
B. 错
【判断题】
[高级工] KLD-29PU型空调机组的冷凝风机外框架与空调机组箱体用6枚8M螺栓进行固定
A. 对
B. 错
【判断题】
[高级工] KLD-40PU型空调机组,机组包括全封闭压缩机2台,离心风机1台,蒸发器1台,冷凝器2台,电加热器1台,压力控制器4个,低温保护继电器1个,气液分离器2台,各自组成两个制冷系统
A. 对
B. 错
【判断题】
[高级工] KLD-40PU型空调机组40是表示机组制冷量约为40kW
A. 对
B. 错
【判断题】
[高级工] 备用空调车的发电车须每隔一个月启动机组一次
A. 对
B. 错
【判断题】
[高级工] 单元式空调机组中修周期为三年
A. 对
B. 错
【判断题】
[高级工] 当环境温度低于16℃时,严禁开启空调设备制冷
A. 对
B. 错
推荐试题
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface