【判断题】
钻机的核心设备是游车。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
钻井绞车刹车片磨损严重时,可导致刹把压到最低位置刹不住车。
A. 对
B. 错
【判断题】
检查油箱油位前,钻井绞车必须停止转动,待飞溅的油流回油箱后再进行检查。
A. 对
B. 错
【判断题】
更换钻井绞车刹带片时,发现中间部分刹带片磨损较大,而两端的刹带片磨损较小,那么只要换中间磨损较大的几块就行。
A. 对
B. 错
【判断题】
钻井绞车滚筒不转时,涡磁刹车挂上后也在起作用。
A. 对
B. 错
【判断题】
使用事故钻井绞车离合器,应先停车,后挂合,再启动电机。
A. 对
B. 错
【判断题】
现在使用的钻盘最大开口直径是36英寸。
A. 对
B. 错
【判断题】
转盘的润滑方式只有油脂一种。
A. 对
B. 错
【判断题】
如需切断转盘马达进行检查.保养时,应挂警示牌,检修转盘。
A. 对
B. 错
【判断题】
润滑油泵不工作或是润滑油路或滤器堵塞会导致变速箱冒烟。
A. 对
B. 错
【判断题】
禁止在坐卡瓦的一面焊接.敲打,保持转盘补心和卡瓦性能良好,可以防止造成钻杆划伤.缩径等伤害,将避免发生钻杆因损伤儿断裂等事故。
A. 对
B. 错
【判断题】
大钳牙板可以用铁钉或电焊条等固定。
A. 对
B. 错
【判断题】
安全卡瓦所卡物体外径为114.3-142.9mm时,要用11节的安全卡瓦。
A. 对
B. 错
【判断题】
吊钳未调平也可用。
A. 对
B. 错
【判断题】
安装井口打榔头时,拉锤击扳手绳子的人员应远离扳手运行方向,避免人员伤害。
A. 对
B. 错
【判断题】
螺丝打紧时要采取逐个均匀紧扣,是螺丝.钢圈受力均匀。
A. 对
B. 错
【判断题】
除锈砂轮必须带有安全护罩。
A. 对
B. 错
【判断题】
新建平台及大面积除锈时采用动力工具(如喷砂处理)。
A. 对
B. 错
【判断题】
液压千斤顶要使用专用液压油,严禁超载荷使用。
A. 对
B. 错
【判断题】
场地工的巡回检查路线是:值班房→节流管汇→指重表→吊钳→绞车→水刹车→井口工具→值班房。
A. 对
B. 错
【判断题】
大钳猫头绳长8-9m,中等硬度,无毛刺烧伤,用水手结与大钳连接。
A. 对
B. 错
【判断题】
检查绞车时,应在绞车停止工作(运转)的情况下进行。
A. 对
B. 错
【判断题】
交接班时可以不检查卫生情况。
A. 对
B. 错
【判断题】
在交接班的班前会上接班人员没必要汇报检查出来的问题,只要接班整改就行。
A. 对
B. 错
【判断题】
交接班人员要认真填写各种记录。
A. 对
B. 错
【判断题】
在钻井设备运转保养表内钳乙负责操作并填写的设备包括振动筛.除砂器.除泥器。
A. 对
B. 错
【判断题】
在填写钻井设备运转保养表中一般包括井名.日期.填写人.设备保养情况.保养周期等。
A. 对
B. 错
【判断题】
钻井报表中钻头的编号是指从开钻到完钻,各种类型的钻头连续编号。
A. 对
B. 错
【判断题】
压力表是专门测定液体压力的一种仪表。
A. 对
B. 错
【判断题】
润滑脂简称“黄油”,在许多情况下不能承担其它润滑液所不能承担的润滑工作。
A. 对
B. 错
【判断题】
润滑系统包括润滑脂润滑.滴油润滑和密封传动.飞溅或强制润滑。
A. 对
B. 错
【判断题】
PMS可以用来查询平台上各种设备的历史检修记录和设备的基本档案。
A. 对
B. 错
【判断题】
PMS将设备的保养内容以周期或运转时间为单位,安排一定的检保工作,并247.以指令表的形式均衡地安排给三师(轮机长.电气师.机械师),由三师具体负责日常检保工作的执行。
A. 对
B. 错
【判断题】
钻井报表中钻头的编号是指从开钻到完钻,各种类型的钻头连续编号。
A. 对
B. 错
【判断题】
重力指示仪是一种特制的弹簧液管压力表,它主要由弹簧管.放大机构.重力指示仪指针.灵敏表指针.表盘等组成。
A. 对
B. 错
【判断题】
钻井报表中的交班钻具组合是指所有的入井钻具和钻台上所立的钻具。
A. 对
B. 错
【判断题】
钻井液密度是单位体积钻井液所含物质的漏失量。
A. 对
B. 错
【判断题】
井口返出钻井液密度下降是正常情况。
A. 对
B. 错
【单选题】
七类高风险项目毛利率水平要求在___以上。
A. 5%
B. 10%
C. 15%
D. 18%
【单选题】
子分公司作为运营管理的实际管理主体及责任主体,应依据PPP合同及运营实施方案,以___为原则,做好运营工作。
A. 确保项目设备设施完好
B. 确保资金足额回收
C. 满足用户各类要求
D. 最大限度低成本运营
【单选题】
凡需进行分包的工程项目,原则上要实行___选择劳务企业,做到公平竞争、择优录用,原则上200万元以上的分包项目由三级公司负责组织施工招标工作。
A. 指定分包
B. 公开招(竞)标
C. 转包
D. 大包
推荐试题
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack