【单选题】
当不知道被测电流的大致数值时,应该先使用___量程的电流表试测。
A. 较小
B. 中间
C. 较大
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
绝缘靴(鞋)要定期试验,试验周期一般为___个月。
A. 1
B. 3
C. 6
【单选题】
绝缘手套要定期试验,试验周期一般为___个月。
A. 1
B. 3
C. 6
【单选题】
在变压器内部发生故障(如绝缘击穿、相间短路、匝间短路、铁芯事故等)产生___时,接通信号或跳闸回路,进行报警或跳闸,以保护变压器。
A. 气体
B. 液体
C. 固体
【单选题】
真空灭弧室的金属屏蔽筒的作用之一是___。
A. 导电作用
B. 吸附电弧产生的金属蒸气
C. 绝缘作用
【单选题】
拆除临时接地线的顺序是___。
A. 先拆除接地端,后拆除设备导体部分
B. 先拆除设备导体部分,后拆除接地端
C. 同时拆除接地端和设备导体部分
【单选题】
SF6负荷开关装设的___可随时监测开关本体内充入的SF6气体压力。
A. 气体密度计
B. 温度计
C. 气体流量计
【单选题】
有些高压电容器内部设有放电电阻,能够通过放电电阻放电,当电容器与电网断开后,放电电阻在___分钟后使电容器殘压降至75V以下。
A. 1
B. 10
C. 20
【单选题】
小容量配电所高压侧通常采用隔离开关-熔断器或跌落式熔断器、___等主接线形式。
A. 隔离开关
B. 负荷开关-熔断器
C. 熔断器
【单选题】
在电力系统内部能量的传递或转化过程中引起的过电压称为___。
A. 大气过电压
B. 内部过电压
C. 感应过电压
【单选题】
在中性点经消弧线圈接地系统中,如果消弧线圈选择得当,可使接地点电流小于___,而不会产生断续电弧和过电压现象。
A. 电弧电流
B. 补偿电流
C. 生弧电流
【单选题】
人工急救胸外挤压法应以每分钟约___次的频率有节奏均匀的挤压,挤压与放松的时间相当。
A. 100
B. 80
C. 60
【单选题】
辅助保护是为补充主保护和后备保护的性能或当主保护和后备保护退出运行而增设的___。
A. 电流保护
B. 电压保护
C. 简单保护
【单选题】
并列运行时,如果其中一台变压器发生故障从电网中切除时,其余变压器___。
A. 必须停止运行
B. 仍能继续供电
C. 肯定也发生故障
【单选题】
人工急救胸外挤压法应以每分钟约___次的频率有节奏均匀的挤压,挤压与放松的时间相当。
A. 100
B. 80
C. 60
【单选题】
对于接线方式较为简单的小容量变电所,操作电源常常采用___。
A. 直流操作电源
B. 交流操作电源
C. 逆变操作电源
【单选题】
在电气设备上工作,保证安全的电气作业组织措施有:___;工作许可制度;工作监护制度;工作间断、转移和终结制度。
A. 工作票制度
B. 操作票制度
C. 防火安全制度
【单选题】
电气设备附近遭受雷击,在设备的导体上感应出大量与雷云极性相反的束缚电荷,形成过电压,称为___。
A. 直接雷击过电压
B. 感应雷过电压
C. 雷电反击过电压
【单选题】
10kV变、配电所应在___上装设阀型避雷器。
A. 单组母线和每回路架空线路
B. 每组母线和单回路架空线路
C. 每组母线和每回路架空线路
【单选题】
在感性负载交流电路中,采用___的方法可提高电路功率因数。
A. 串联电阻
B. 并联电容
C. 串联电容
【单选题】
为防止直接雷击高大建筑物,一般多采用___。
A. 避雷针
B. 避雷线
C. 避雷器
【单选题】
用高压验电器验电时应戴绝缘手套,并使用与被测设备___的验电器。
A. 相应电压等级
B. 高一电压等级
C. 低一电压等级
【单选题】
小母线编号中,I段直流控制母线正极用___表示。
A. +KM2
B. -KM2
C. +KM1
【单选题】
高压熔断器熔体中间焊有___的小锡(铅)球。
A. 降低熔点
B. 升高熔点
C. 保持熔体材料熔点
【单选题】
当消弧线圈的电感电流大于接地电容电流时,接地处具有多余的电感性电流,这种补偿方式称为___。
A. 欠补偿
B. 过补偿
C. 全补偿
【单选题】
造成运行中的高压电容器发热的原因之一是___。
A. 内部发生局部放电
B. 频繁投切使电容器反复受浪涌电流影响
C. 外壳机械损伤
【单选题】
安装在烟囱顶上的避雷针直径不应小于下列数值___。
A. 10mm
B. 20mm
C. 25mm
【单选题】
在开关电器中,气体吹动电弧的方法为纵吹时,气体吹动方向与电弧轴线相___。
A. 平行
B. 垂直
C. 倾斜30o角度
【单选题】
造成运行中的高压电容器外壳渗漏油的原因之一是___。
A. 电容器内部过电压
B. 内部产生局部放电
C. 运行中温度剧烈变化
【单选题】
额定电压是指变压器___,它应与所连接的输变电线路电压相符合。
A. 相电压
B. 线电压
C. 最大电压
【单选题】
对于接地电阻测量仪探针位置说法正确的是___。
A. 将电位探针插在离接地体20m的地下,电流探针插在离接地体40m的地下
B. 将电流探针插在离接地体20m的地下,电位探针插在离接地体40m的地下
C. 将电位探针插在离接地体20m的地下,电流探针插在离电位探针40m的地下
【单选题】
110KV及以下线路保护测控装置不具备___功能。
A. 三相一次或二次重合闸
B. 过电流保护
C. 断路器保护
【单选题】
电力系统中的各级电压线路及其联系的各级___,这一部分叫做电力网,或称电网。
A. 变、配电所
B. 断路器
C. 隔离开关
【单选题】
高压电气设备停电检修时,防止检修人员走错位,误入带电间隔及过分接近带电部分,一般采用___进行防护。
A. 绝缘台
B. 标示牌
C. 遮拦防护
【单选题】
消弧线圈实际是一个铁芯线圈,其___很小,电抗很大。
A. 电阻
B. 电压
C. 电抗
【单选题】
连接于线路终端的变压器称为降压变压器,其一次侧额定电压与输变电线路的电压等级___。
A. 相差10%
B. 相差20%
C. 相差30%
【单选题】
如果在交接班过程中,有事故要处理,仍由___负责处理,必要时可请接班人员协助工作。
A. 交班人员
B. 接班人员
C. 调度员
【单选题】
变压器的额定电流等于绕组的额定容量除以该绕组的额定电压及相应的相系数___。
A. 三相为1,单相为√3
B. 单相和三相均为1
C. 单相和三相均为√3
【单选题】
运行值班人员在室外进行巡回检查,如高压设备发生接地时,不得接近故障点___以内。
A. 1m
B. 2m
C. 8m
【单选题】
根据对触电事故发生统计分析,触电事故随季节有明显的变化,每年___季较为易发、集中。
A. 一;二
B. 二;三
C. 三;四
【单选题】
下列关于阀型避雷器阀电阻片特性描述正确的是___。
A. 正常电压时阀片电阻很小
B. 过电压时阀片电阻很大
C. 正常电压时阀片电阻很大
推荐试题
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed