【单选题】
在地面,需升起扰流板进行检查时,可通过()___
A. 将作动筒上人工开锁装置,置于“0”位
B. 将作动筒上人工开锁装置置于“M”位
C. 使用撬棍
D. 放掉回液管的液压油
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
在电传操纵中,传统的机械操纵通道被什么替代()___
A. 发射机和接收机
B. 传输线和计算机
C. 液压作动筒
D. 液压管路
【单选题】
在飞行操纵控制法则中的直接法则有哪些保护()___
A. 失速保护
B. 高速保护
C. 没有保护
D. 载荷因子保护
【单选题】
在襟翼伸出过程中,为什么PCU中的收回电磁线圈会通电()___
A. 降低襟翼运动的速度
B. 增大马达的液压流量
C. 将襟翼锁定
D. 出现故障
【单选题】
在空中,襟翼手柄收回到“1”位时()___
A. 当飞机速度<210KT时,ECAM显示“1”构形
B. 当飞机速度>210KT时,ECAM显示“1”构形
C. 当飞机速度<210KT时,ECAM显示HF构形
D. 当飞机速度>210KT时,ECAM显示HF构形
【单选题】
在空中襟翼手柄放出到“1”位时,下列说法正确的是()___
A. 襟翼,缝翼都伸出
B. 仅缝翼伸出
C. 仅襟翼伸出
D. 当飞机速度<210KT时,襟/缝翼都伸出
【单选题】
在人工飞行中,ELAC可输出哪些信号给FAC()___
A. 偏航阻尼,升降舵配平
B. 偏航阻尼,协调转弯,方向舵配平
C. 升降舵配平,副翼操纵
D. 协调转弯,副翼操纵
【单选题】
在升降舵正常工作时,作动筒的工作情况()___
A. 一个作动筒处于工作模式,另一个处于定中模式
B. 两个作动筒都处于工作模式
C. 一个作动筒处于工作模式,另一个处于阻尼模式
D. 两个作动筒都处于阻尼模式
【单选题】
在正常情况下,拉平(flare)模式的保护有()___
A. 坡度和失速保护
B. 坡度和高速保护
C. 仅有失速保护
D. 俯仰姿态和失速保护
【单选题】
怎样抑制另一边侧杆的输出()___
A. 操纵侧杆时比另一侧用更大的劲
B. 通过按压优先控制按钮
C. 机长始终具有优先权
D. 拔出相应跳开关
【单选题】
可配平的水平安定面何时不能用?___
A. 黄和绿液压系统故障后
B. 决不会失效,总是可人工使用
C. 蓝液压系统故障后
D. 飞行增稳计算机1和2失效后
【单选题】
如果升降舵副翼计算机1和2故障:___
A. 升降舵和俯仰配平由扰流板升降舵计算机1和2控制
B. 俯仰操纵由飞行增稳计算机提供
C. 只能通过配平手轮实现俯仰操纵
D. 以上都不对
【单选题】
下面哪项陈述正确:___
A. 地面扰流板功能:所有扰流板放出
B. 减速板功能:扰流板1,2,3放出
C. 横侧功能:副翼+扰流板4和5放
D. 以上都不对
【单选题】
有多少液压电动马达驱动安定面的螺杆作动筒:___
A. 2
B. 3
C. 5
D. 以上都不对
【单选题】
当备用法则现用时,偏航阻尼:___
A. 可用(阻尼器极限被限制在方向舵±5°范围)
B. 失效
C. 正常或备份带防滞,备份不带防滞,停留刹车
D. 以上都不对
【单选题】
当两个方向舵配平功能接通时:___
A. 方向舵配平1和2一起控制它们的马达
B. 方向舵配平1控制单配平马达
C. 方向舵配平1控制其马达,方向舵配平2备份
D. 机械装置将优先权给方向舵配平
【单选题】
飞行增稳计算机的配平功能是:___
A. 俯仰配平
B. 方向舵配平
C. 副翼配平
D. 俯仰配平和方向舵配平
【单选题】
哪些操纵面用作地面扰流板?___
A. 扰流板1到4
B. 所有扰流板
C. 扰流板1到3
D. 以上都不对
【单选题】
哪些信号引起方向舵脚蹬运动?___
A. 转弯协调信号
B. 偏航阻尼信号
C. 方向舵配平信号
D. 以上都不对
【单选题】
有多少个液压系统驱动方向舵:___
A. 1
B. 2
C. 3
D. 以上都不对
【单选题】
在空中,FAC2如果临时断电,FAC2按钮“FAULT”灯亮且:___
A. 将自动复位
B. 能人工复位并进行安全测试
C. 能人工复位但不进行安全测试
D. 无法再次接通
【单选题】
FMGC内部测试在何时自动进行:___
A. 在地面,计算机通电时
B. 两台计算机之间有偏差时
C. 在空中发生失效时
D. 在空中自动驾驶接通时
【单选题】
在正常飞行操纵中,失速警告何时起动:___
A. 当达到148KTS速度时,缝翼未放出
B. 达到最大迎角时
C. 达到迎角保护时
D. 在正常法则中,对应失速警告的迎角未达到
【单选题】
ECAM警告显示页面上的缝翼系统1故障是什么意思:___
A. 缝翼襟翼操纵计算机1已失效
B. 一台缝翼襟翼操纵计算机的缝翼通道失效
C. AB都对
D. 以上都不对
【单选题】
襟翼和缝翼操纵计算机1(SFCC)故障时会发生什么情况:___
A. 什么也不发生
B. 襟翼和缝翼以半速工作
C. 襟翼系统失效
D. 以上都不对
【单选题】
当备用法则现用时,高速和大迎角保护将:___
A. 降级
B. 失效
C. 正常或备份带防滞,备份不带防滞,停留刹车
D. 以上都不对
【单选题】
如果襟翼1动力控制组件故障,会发生什么情况:___
A. 什么也不发生
B. 襟翼以半速工作
C. 襟翼失效
D. 以上都不对
【单选题】
升降舵和水平安定面正常由ELAC2控制,若ELAC2失效,则:___
A. 俯仰控制自动转换到ELAC1
B. 俯仰控制自动转换到SEC1和SEC2
C. 俯仰失去控制
D. 不确定
【单选题】
当AP衔接时,FMGC将俯仰指令送至:___
A. ELAC
B. SEC
C. ELAC和SEC
D. 不确定
【单选题】
如果EFCS系统所有的计算机失效,是否还能够对飞机进行俯仰控制?___
A. 能够
B. 不能
C.
D.
【单选题】
若绿液压系统失效,则横滚控制由:___
A. 副翼
B. 副翼和2、3、4号扰流板
C. 只能由2、3、4号扰流板控制
D. 不确定
【单选题】
共有几个液压系统向方向舵提供动力?___
A. 1
B. 2
C. 3
D. 不确定
【单选题】
下列哪一种情况会引起脚蹬运动?___
A. 偏航阻尼指令
B. 方向舵配平
C. 协调转弯指令
D. 不确定
【单选题】
当横滚和速度刹车指令叠加后超过扰流板的最大偏转角度时会出现:___
A. 速度刹车功能被禁止
B. 所有扰流板收到额外的放出指令,直到一个扰流板到最大偏转角
C. 另一边的扰流板往回收,直到两边的舵面差等于横滚指令
D. 不确定
【单选题】
地面扰流板可用的必要条件是:___
A. 地面扰流板预位,两个油门杆位于IDLE或以下
B. 地面扰流板没有预位,两个油门杆位于IDLE
C. 只要两个油门杆位于IDLE
D. 不确定
【单选题】
控制副翼的计算机是:___
A. ELAC
B. SEC
C. FAC
D. SFCC
【单选题】
当AP衔接时,FMGC将横滚指令送至:___
A. ELAC
B. FAC
C. 通过FAC至SEC
D. 以上都对
【单选题】
当系统有故障时,扰流板会:___
A. 保持在失效前的位置
B. 自动收回
C. 气动力使其收回
D. 不确定
【单选题】
哪一个计算机接收侧杆指令?___
A. 只有ELAC
B. ELAC和SEC
C. FCDC
D. 以上都不对
【单选题】
哪一项功能要使用垂直加速度计?___
A. 负载因数功能
B. 俯仰配平功能
C. 偏航阻尼功能
D. A和B
【单选题】
电子飞控系统EFCS中哪些计算机连到CFDS系统?___
A. ELAC和SEC
B. 只有FCDC
C. ELAC
D. 不确定
推荐试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity