【多选题】
供电设施、受电设施的___和运行应符合国家标准或电力行业标准。
A. 设计
B. 安装
C. 施工
D. 试验
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ACD
解析
暂无解析
相关试题
【多选题】
下列哪项符合《中华人民共和国电力法》规定的电力生产与电网运行应当遵循的原则___。
A. 安全
B. 经济
C. 优质
D. 高效
【多选题】
《居民用户家用电器损坏处理办法》规定属于电阻电热类家用电器的是___。
A. 电饭煲
B. 电茶壶
C. 电热水器
D. 电风扇
【多选题】
有下列情形之一的,不经批准即可中止供电,但事后应报告本单位负责人。___
A. 不可抗拒力和紧急避险
B. 破坏电力设施行为
C. 恶意拖欠电费者
D. 确有窃电行为
【多选题】
简化客户工程查验,对于重要电力客户,重点查验___、多电源闭锁装置、电能计量装置等内容。
A. 供电电源配置
B. 自备应急电源
C. 非电性质保安措施
D. 涉网自动化装置
【多选题】
简化竣工检验内容,竣工检验的资料审验主要审查设计、施工、试验单位资质,___。
A. 设备试验报告
B. 保护定值调试报告
C. 接地电阻测试报告
D. 调度许可设备命名
【多选题】
重要电力客户需提交___等资料并办理设计审查申请。
A. 计审查申请表
B. 设计单位资质等级证书复印件
C. 设计单位资质等级证书原件
D. 设计图纸及说明(设计单位盖章)
【多选题】
低压居民客户提交的申请资料时,下列选项中可作为低压居民客户有效身份证明的有___。
A. 身份证
B. 军人证
C. 护照
D. 户口簿或公安机关户籍证明
【多选题】
业务受理环节,煤矿客户需提交的许可证或资格证有___。
A. 煤炭生产许可证
B. 矿长资格证
C. 矿长安全资格证
D. 采矿许可证
E. 安全生产许可证
【多选题】
《供电营业规则》规定:什么情况下,保安电源应由用户自备___
A. 在电力系统瓦解或不可抗力造成供电中断时,仍需保证供电的
B. 用户自备电源比从发电厂供给更为经济合理的
C. 在不可抗力紧急避险造成供电中断时,仍需保证供电的
D. 用户自备电源比从电力系统供给更为经济合理的
【多选题】
《分布式电源接入系统典型设计》中规定,电能表应具备___,配有标准通信接口,具备本地通信和通过电能信息采集终端远程通信的功能,电能表通信协议符合DL/T 645。
A. 双向有功
B. 四象限无功计量功能
C. 事件记录功能
D. 分时计价
【多选题】
《中华人民共和国电力法》规定:___用户执行相同的电价标准。
A. 对同一电网内的
B. 同一电压等级
C. 同一用电类别
D. 同一供电点
【多选题】
分布式电源并网逆变器应具备___,在频率电压异常时自动脱离系统的功能。
A. 过压保护
B. 过流保护
C. 短路保护
D. 孤岛检测
【判断题】
对电能替代项目、电动汽车充换电设施,其红线外供配电设施,由公司出资建设。
A. 对
B. 错
【判断题】
两回路及以上线路供电,并有并路倒闸操作的客户不需要实行电力调度管理。
A. 对
B. 错
【判断题】
自备应急电源与电网电源之间应装设可靠的电气或机械闭锁装置,防止倒送电。
A. 对
B. 错
【判断题】
当不具备设计计算条件时,10kV变电所电容器安装容量可按变压器容量的20%~30%确定。
A. 对
B. 错
【判断题】
分布式电源的发电出口以及与公用电网的连接点均应安装电能计量装置,原则上应通过两套用电信息采集设备,实现对用户上、下网电量信息的自动采集。
A. 对
B. 错
【判断题】
对于新报装用户,用户工程报装申请与分布式电源接入申请一起受理,分布式电源接入系统方案制定应在用户接入系统方案审定后开展。
A. 对
B. 错
【判断题】
受理客户受电工程中间检查的期限规定为,自接到客户申请之日起,高压供电客户不超过5个工作日。
A. 对
B. 错
【判断题】
特级重要电力客户应具备两路及以上电源供电条件。
A. 对
B. 错
【判断题】
农业用电功率因数不宜低于0.80。
A. 对
B. 错
【判断题】
业扩受理的危险点有:客户申请资料不完整或与实际不符,致后续环节存在安全隐患。
A. 对
B. 错
【判断题】
供电设备计划检修时,对35千伏及以上电压等级供电的客户的停电次数,每年不应超过1次;对10千伏电压等级供电的客户,每年不应超过3次。
A. 对
B. 错
【判断题】
业扩报装受理的煤改电项目,必须实现单独计量功能。
A. 对
B. 错
【判断题】
目3×1.5(6)A、3×100V三相三线有功电能表,经200/5电流互感器和10000/100电压互感器计量,则其倍率为4000。
A. 对
B. 错
【判断题】
居民客户更名业务考核时限从业务受理创建时间到完成时间为2个工作。
A. 对
B. 错
【判断题】
Ⅱ类计量装置电能表准确度等级为有功电能表1.0级,无功电能表2.0级。
A. 对
B. 错
【判断题】
《自备应急电源与电网电源之间应装设可靠的电气闭锁装置,防止倒送电。
A. 对
B. 错
【判断题】
重要电力客户是指在国家或者一个地区(城市)的社会、政治、经济生活中占有重要地位,对其中断供电将可能造成人身伤亡、较大环境污染、较大政治影响、较大经济损失、社会公共秩序严重混乱的用电单位或对供电可靠性有特殊要求的用电场所。重要电力客户认定一般由各级供电企业或电力客户提出,经上级电力主管部门批准。
A. 对
B. 错
【判断题】
分对第一类380(220)伏接入电网分布式电源客户,无需审查设计文件
A. 对
B. 错
【判断题】
高层主体建筑内不应设置油浸变压器的变电所。
A. 对
B. 错
【判断题】
集中安装在用电端的无功补偿装置主要用于提高功率因数、降低线路损耗。
A. 对
B. 错
【判断题】
电变电所采用双层布置时,变压器应设在上层。
A. 对
B. 错
【判断题】
用有防止不同电源并联运行要求时,来自不同电源的进线低压断路器与母线分段的低压断路器之间应设防止不同电源并联运行的电气或机械联锁。
A. 对
B. 错
【判断题】
在因充换电设施接入引起的公共电网改造 工程由客户投资建设 。
A. 对
B. 错
【判断题】
变供电电源配置、自备应急电源及非电性质保安措施等,应满足有关规程、规定的要求是重要电力客户的设计审查重点。
A. 对
B. 错
【判断题】
变电简化竣工检验内容,竣工检验的现场查验重点检查是否符合经审查合格的设计文件要求,以及影响电网安全运行的设备,包括与电网相连接的设备、自动化装置、电能计量装置、谐波治理装置和多电源闭锁装置等。
A. 对
B. 错
【判断题】
供电方案包含客户用电申请概况、接入系统方案、受电系统方案、计量计费方案、送电启动方案等5部分内容
A. 对
B. 错
【判断题】
对已有的客户资料或资质证件但已超出有效期的,客户可不再提供。
A. 对
B. 错
【判断题】
用户自备应急电源是指由用户自行配备的,在正常供电电源全部发生中断的情况下,能满足用户生产负荷可靠供电的独立电源。
A. 对
B. 错
推荐试题
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases