【判断题】
金属涂镀层的形成,从本质上讲和电镀是不相同的
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
毫伏表的灵敏度较高,所以使用毫伏表能精确地量出交、直流电压值
A. 对
B. 错
【判断题】
为了提高反相器的负向抗干扰能力,应使晶体三极管工作在深度饱和状态
A. 对
B. 错
【判断题】
基本RS触发器有0或1两种状态。当RD=0、SD=1时,无论触发器初态如何,触发器被置1
A. 对
B. 错
【判断题】
在双稳态触发器电路中,晶体三极管只有饱和及截止两种状态,因此在工作时晶体三极管不需经过放大工作状态
A. 对
B. 错
【判断题】
三端稳压器有一个输入端、一个输出端、一个公共端
A. 对
B. 错
【判断题】
防雷用的电抗元件是指电容器和电感线圈
A. 对
B. 错
【判断题】
凡大小和方向都随时间变化的电压和电流,称为正弦交流电压和正弦交流电流
A. 对
B. 错
【判断题】
同名磁极相互排斥,异名磁极相互吸引
A. 对
B. 错
【判断题】
四显示自动闭塞在列车追踪间隔时间内,一般划分为不少于4个闭塞分区排列信号机
A. 对
B. 错
【判断题】
ZP·W1-18型移频自动闭塞发送盒采用“N+1”热备方式,接收盒采用“1+1”或“N+1”热备方式
A. 对
B. 错
【判断题】
非电化四信息移频振荡器有两个主振频率,△f为45Hz
A. 对
B. 错
【判断题】
非电化四信息移频自动闭塞,闭塞分区被占用或轨道电路失效时,防护该闭塞分区的通过信号机应自动关闭
A. 对
B. 错
【判断题】
移频电源设备,区间和站内不能通用,在型号上有所区别
A. 对
B. 错
【判断题】
非电化四信息移频发送设备仅用24V直流稳压电源
A. 对
B. 错
【判断题】
集中式移频自动闭塞接收设备防雷由二级组成
A. 对
B. 错
【判断题】
电气化区段移频自动闭塞(ZP-89型),移频发送盘移频频率的变化为±1HZ
A. 对
B. 错
【判断题】
ZP.Y2-18型移频自动闭塞区间发送盘在“低出”测试孔测输出低频频率,误差应小于或等于±3‰
A. 对
B. 错
【判断题】
ZP.Y2-18型移频自动闭塞区间发送盘在“移频”测试孔测中心频率和上、下边频,误差应小于或等于±1Hz
A. 对
B. 错
【判断题】
ZP·W1-18型移频自动闭塞系统传输电缆长度设置7.5km
A. 对
B. 错
【判断题】
防锈漆是一种含防锈颜料且具有防锈能力的涂料
A. 对
B. 错
【判断题】
微机电缆绝缘的测试可以用MΩ表直接测量
A. 对
B. 错
【判断题】
信号电缆芯线间绝缘电阻、任一芯线对地绝缘电阻,使用高阻MΩ表测试,每km不小于400MΩ
A. 对
B. 错
【判断题】
车站监测设备由采集机和站机构成
A. 对
B. 错
【判断题】
电气化区段处理电缆故障时必须先将断开的两端外皮进行临时(这时要进行人身安全防护)接地处理,然后再进行电缆作业
A. 对
B. 错
【判断题】
U-T系统的频偏为±55Hz
A. 对
B. 错
【判断题】
消防设备和灭火工具要有专人管理,定期检查,保持完整好用
A. 对
B. 错
【判断题】
LKD1-T型车站列控中心维修机中故障信息可记录20天
A. 对
B. 错
【判断题】
扛抬笨重物品,每人承重一般不超过60kg
A. 对
B. 错
【判断题】
我国铁路信号设备采用的防雷元件主要有金属陶瓷放电管、氧化管、压敏电阻、硒片等
A. 对
B. 错
【判断题】
电缆穿过水沟、水渠时,应用塑料管防护
A. 对
B. 错
【判断题】
敌对信号机未关闭时,防护该进路信号机不能开放,这是联锁最基本的技术条件之一
A. 对
B. 错
【判断题】
电气化区段通过信号机处接触线对线路中心的偏移方向宜远离信号机,使之距离达3m以上,信号机构及梯子应接安全地线
A. 对
B. 错
【判断题】
站内联锁设备中,同一到发线上的对向列车进路为敌对进路
A. 对
B. 错
【判断题】
在电力牵引区段,进站信号机柱采用8.5m的水泥机柱
A. 对
B. 错
【判断题】
进站信号机的位置设在车站最外方道岔尖轨(顺向为警冲标)不少于25m的地方
A. 对
B. 错
【判断题】
当计算机联锁设备发生故障,使用应急台操纵道岔时,允许同时使用手摇把转换道岔
A. 对
B. 错
【判断题】
计算机联锁具有对室内外联锁设备的检测和监测功能
A. 对
B. 错
【判断题】
计算机联锁机房的安全保护地线与防雷保护地线可共用
A. 对
B. 错
【判断题】
计算机联锁系统是以微型计算机为主要技术手段实现车站联锁的系统
A. 对
B. 错
【判断题】
在DS6-11计算机联锁系统中由于工作机(A机)发生硬件故障造成死机故障或人工关机,BYUJ(运行继电器)落下
A. 对
B. 错
推荐试题
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic