【单选题】
新装置开车水冲洗使用___。
A. 新鲜水
B. 循环水
C. 除盐水
D. 除氧水
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
塔的吹扫结束的标志正确的是___。
A. 塔顶放空无物料气出来
B. 塔底液面计上放空无物料气出来
C. 塔底放空无物料气出来
D. 塔底液面计下放空无物料气出来
【单选题】
下列不是系统引氮气时所应注意的是___。
A. 引氮气时注意安全,防止窒息
B. 氮气进装置后,凡需进入容器内必须要进行氧含量分析
C. 与氮气管线相连的其他工艺介质管线、容器用盲板或双阀隔离,双阀之间的放空打开
D. 引氮气前系统需进行干燥
【单选题】
净化风与非净化风的主要区别是___。
A. 温度
B. 脱水
C. 比重
D. 使用量
【单选题】
克劳斯催化剂升温过程中,必须保证瓦斯___燃烧。
A. 过氧
B. 完全
C. 次当量
D. 缺氧
【单选题】
废热锅炉自产蒸汽泄放不出去,是因为___。
A. 蒸汽温度低
B. 蒸汽温度高
C. 蒸汽管网压力高
D. 蒸汽管网压力低
【单选题】
硫磺硫冷凝器管程内走的介质是___。
A. 反应过程气
B. 0.3MPa蒸汽
C. 4.0MPa蒸汽
D. 锅炉补充水
【单选题】
硫磺硫冷凝器在系统升温时应先___。
A. 对冷凝器进行补充水
B. 打开顶部放空阀
C. 通入蒸汽进行保温
D. 进行排污
【单选题】
硫磺硫冷凝器在系统升温初期用蒸汽保温,当过程气出口温度达到___℃,再注入除氧水。
A. 100
B. 120
C. 150
D. 200
【单选题】
正常生产时硫磺产生的凝结水一般作为___。
A. 并入凝结水管网
B. 作为废热锅炉用水
C. 就地排放
D. 作为伴热用水
【单选题】
酸性气燃烧炉一般升温初期流程,应为___。
A. 走高温掺合阀至焚烧炉
B. 走开工线至烟囱
C. 走反应器升温流程
D. 直接至焚烧炉焚烧
【单选题】
酸性气反应炉与尾气焚烧炉停炉的顺序正确的是___。
A. 酸性气反应炉先停
B. 尾气焚烧炉先停
C. 需要同时停
D. 没有先后顺序
【单选题】
尾气焚烧炉温度高时,应采取的措施是___。
A. 开大烟囱蝶阀
B. 关小炉用瓦斯量
C. 调小风量
D. 提高蒸汽发生器压力
【单选题】
硫磺捕集器出口安装的在线分析仪是___。
A. H2在线分析仪
B. PH值在线分析仪
C. H2S/SO2比值在线分析仪
D. 尾气SO2
【单选题】
过程气中COS含量高是因为___。
A. 原料气带水多
B. 原料气带烃多
C. 反应器床层温度低
D. 原料气带氨多
【单选题】
酸性气进炉带液较多,以下___操作不正确是。
A. 提高配风比
B. 加强分液罐压液
C. 降低配风比
D. 联系上游装置调整操作
【单选题】
酸性气燃烧炉炉膛温度高的原因___。
A. 酸性气中烃含量降低
B. 风机供风量下降
C. 酸性气中硫化氢浓度上升
D. 酸性气中氨含量上升
【单选题】
酸性气中含水量上升,酸性气燃烧炉炉膛温度___。
A. 上升
B. 下降
C. 变化
D. 无法确定
【单选题】
风机供风量上升,则尾气焚烧炉膛温度___。
A. 下降
B. 升高
C. 没有变化
D. 无法确定
【单选题】
汽包水满的现象是___。
A. 带水严重,蒸汽管网发生水击
B. 给水量不正常,小于正常上水量
C. 蒸汽温度上升
D. 蒸汽发汽量增大
【单选题】
溶剂再生塔压力高,溶剂再生效果___。
A. 好
B. 差
C. 一样
D. 无法确定
【单选题】
溶剂再生塔压力高,贫液中___。
A. 烃含量高
B. 硫化氢含量低
C. 烃含量低
D. 硫化氢含量高
【单选题】
以下___不是酸性气燃烧炉蒸汽发生器液位低的原因。
A. 给水量小于正常量
B. 蒸汽产量变大
C. 酸性气量突然上升
D. 蒸汽管网压力上升
【单选题】
溶剂再生塔液位低,如何调节___。
A. 提高酸性气抽出量
B. 提高蒸汽用量
C. 降低贫液抽出量
D. 回流量降低
【单选题】
溶剂再生塔顶温高的主要危害是___。
A. 利于解吸过程
B. 贫液泵容易抽空
C. 贫液中硫化氢含量上升
D. 腐蚀增加
【单选题】
贫液中H2S含量高的原因___。
A. 再生塔顶部温度高
B. 再生塔压力低
C. 富液中CO2含量偏高
D. 上游吸收塔温度高
【单选题】
联锁投用时机正确的是___。
A. 装置检修之后马上投用
B. 装置进酸气之前
C. 装置烘炉之前
D. 装置运行正常之后
【单选题】
装置发生联锁自保以后再次开车,必须对联锁进行___,否则无法进行操作。
A. 报警确认
B. 复位
C. 工作站重启
D. 投用确认
【单选题】
为防止操作人员对联锁的误操作,联锁命令必须进行___操作才能有效。
A. 工程师权限确认
B. 信号切除
C. 硬手操
D. 双重确认
【单选题】
在生产异常情况下,需要暂时切除联锁系统,是将联锁置于___状态。
A. 手动
B. 自动
C. 程序
D. 旁路
【单选题】
以下___不是溶剂再生塔压力高的原因。
A. 塔底蒸汽大
B. 酸性气后路不畅
C. 回流量小
D. 富液含H2S量低
【单选题】
以下___不是溶剂再生塔液位低的原因。
A. 塔底贫液排出量大
B. 气相夹带液相量大
C. 蒸汽量大
D. 回流量大
【单选题】
溶剂再生塔液位低的原因是___。
A. 进料量大
B. 塔底贫液排出量大
C. 蒸汽量小
D. 回流量大
【单选题】
克劳斯反应器进口H2S、SO2浓度上升,克劳斯反应器床层温度则___。
A. 上升
B. 下降
C. 无变化
D. 无法确定
【单选题】
克劳斯反应器床层温度下降,主要原因是___。
A. 反应器进口H2S、SO2浓度上升
B. 原料中硫化氢含量高被带入反应器
C. 催化剂自燃后缺氧影响反应
D. COS、CS2含量降低
【单选题】
若溶剂变得浑浊,则说明___。
A. 消泡剂加过量
B. 原料气含有氨
C. 带有硫化铁
D. 无法确定
【单选题】
停工时,克劳斯催化剂先进行___。
A. 钝化
B. 硫酸盐还原
C. 热浸泡
D. 烟气吹硫
【单选题】
停工时,克劳斯催化剂热浸泡操作时,应___。
A. 提高H2S与SO2比值
B. 提高反应器进口温度
C. 降低H2S与SO2比值
D. 降低反应器进口温度
【单选题】
克劳斯催化剂还原操作中保持过程气中硫化氢与二氧化硫比值在___,并运行24小时。
A. 1~2
B. 2~3
C. 3~4
D. 4~5
【单选题】
克劳斯催化剂还原操作反应方程式系数正确的是Al2(SO4)3+H2S→Al2O3+___SO2+H2O。
A. 1
B. 2
C. 3
D. 4
【单选题】
停工时候,装置降温的要求是___。
A. 慢
B. 快
C. 先慢后快
D. 无要求
推荐试题
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community