【单选题】
所有车站设备在运营开始前确认完毕。若有故障,___在车站级综合监控工作站上进行操作开启。
A. 多职能队员【站控】
B. 多职能队员【列控】
C. 多职能队员【巡视】
D. 多职能队长
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
按照集团多职能队伍岗位工作标准,多职能队长【车站】可以由___岗位通过培训考核进行晋升。
A. 多职能队员【站控)
B. 多职能队员【巡视】
C. 车站检修工
D. 以上都正确
【单选题】
所有车站设备在运营开始前确认完毕。若有故障,在车站级综合监控工作站上进行操作开启。若开启成功多职能队员【站控】查看该设施设备反馈信号情况;若不成功,___进行就地级操作开启,并将故障情况及时上报中央调度员。
A. 多职能队员【巡视】
B. 多职能队员【列控】
C. 多职能队员【站控】
D. 多职能队长
【单选题】
列车工况不包含___。
A. 清客
B. 退出正线服务
C. 洗车
D. 折返
【单选题】
以下___场景下无需列车低速运行。
A. 洗车
B. 蠕动
C. 远程RM
D. 工况转换
【单选题】
具备自动开关站功能的车站,___设备不根据时间表自动开关。
A. 空调
B. 照明
C. 卷帘门
D. AFC
【单选题】
无人值守全自动运行列车在区间丢失定位后调度员应采取的措施是___。
A. 远程重启车载控制器
B. 启动蠕动模式
C. 启动远程RM功能
D. 施加单车全自动运行授权
【单选题】
以下不属于系统或人工对车辆基地或正线休眠的列车实施唤醒作业的是___。
A. 系统根据出库计划自动唤醒
B. 调度员通过ATS执行远程人工唤醒
C. 多职能队员【列控】登车现地人工唤醒
D. 多职能队员【巡视】登车现地人工唤醒
【单选题】
以下不属于运营前根据车站早间启运时间表自动开启各车站的设备是___。
A. 电/扶梯和卷帘门
B. PIS显示屏
C. AFC
D. 车站照明以及通风等设备
【单选题】
在运营开始前,多职能队员【站控】应通过CCTV确认___无安全隐患后,进行远程开启。
A. PIS显示屏
B. 电/扶梯和卷帘门
C. AFC
D. 车站照明以及通风等设备
【单选题】
运营前,根据出库计划自动唤醒指定列车作为巡道车。多职能队员【列控】经授权后登上巡道车。巡道车自动匹配运营计划后由多职能队员【列控】人工驾驶巡道。巡道完成后由多职能队员【列控】转为___进入正线运营服务。
A. AM模式
B. CAM模式
C. EUM模式
D. FAM模式
【单选题】
运营前,根据出库计划自动唤醒指定列车作为巡道车,多职能队员【列控】以___进行列车巡道作业。
A. AM模式
B. CM模式
C. EUM模式
D. FAM模式
【单选题】
若列车欠停或过停在5m【可配置】范围内,列车以___自动调整对位。若经3次【可配置】仍无法对位,ATS应告警并自动弹框由中央调度员确认后列车跳过本站运行至下一站。
A. JOG模式
B. RM模式
C. CM模式
D. WM模式
【单选题】
列车停站计时结束后,列车从站台自动发车时,以下不属于信号系统的功能分配是___。
A. 应能根据时刻表自动排列发车进路并开放信号
B. 应能在驾驶台显示屏显示发车倒计时
C. 应能在车门和站台门关闭锁闭条件满足后自动发车
D. 车门关闭前应通过车辆关闭车门声光报警提示车门即将关闭
【单选题】
在车站运营开始前,以下___不属于车站综合监控系统的功能分配。
A. 根据时间表启动车站环控系统早间运行模式功能
B. 根据时间表启动车站公共区正常运行照明模式功能
C. 远程监控,就地开启出入口卷帘门,同时联动CCTV显示相关区域的视频图像功能
D. 根据时间表开启PIS显示屏显示乘客导向信息功能
【单选题】
在车站运营开始前,以下___不属于车站综合监控系统的功能分配。
A. 根据时间表启动车站环控系统早间运行模式功能
B. 远程监控,就地开启车站电/扶梯,同时联动CCTV显示相关区域的视频图像
C. 根据时间表启动车站公共区正常运行照明模式功能
D. 根据时间表开启PIS显示屏显示乘客导向信息功能
【单选题】
列车停站计时结束后,列车从站台自动发车时,以下不属于信号系统的功能分配是___。
A. 应能根据时刻表自动排列发车进路并开放信号
B. 应能在驾驶台显示屏显示发车倒计时
C. 应能在车门和站台门关闭锁闭条件满足后自动发车
D. 车门关闭前应通过车辆关闭车门声光报警提示车门即将关闭
【单选题】
列车根据运营计划或调度命令在指定的车站结束运营,通过人工现场确认方式进行列车清客,以下不属于信号系统的功能分配是___。
A. 应能根据运营计划,向车辆、综合监控和通信发送清客信息
B. 对常规的结束运营清客应自动扣车
C. 清客确认按钮被激活后应自动取消自动扣车,并自动发车回库或进入停车线
D. 车站PIS应能根据信号指令显示列车清客信息
【单选题】
列车退出运营,运行至车辆基地或正线休眠点等指定区域进行休眠作业,以下不属于系统或人工对车辆基地或正线休眠的方式是___。
A. 多职能队员(【巡视】登车现地人工休眠
B. 中央调度员通过ATS执行远程人工休眠
C. 多职能队员【列控】登车现地人工休眠
D. 信号系统根据运营计划自动休眠
【单选题】
在场内作业中,对于非ATC控制区域的调车,车辆基地调度员人工排列进路,多职能队员【列控】按照调车计划采用___将列车驶入指定目的地。
A. FAM模式
B. AM模式
C. CAM模式
D. RM或EUM模式
【单选题】
关于全自动驾驶的技术优势描述不正确的是___。
A. 具备更完善的故障自诊断和自愈功能,提供更高的安全性和可靠性
B. 实现人力资源的综合利用,提高运营成本
C. 改善工作环境,降低运营人员劳动强度
D. 列车运行全过程的防护,实现安全运营
【单选题】
在实际运营管理中的全自动驾驶系统已经能够实现的___要求。
A. 高密度行车组织
B. 安全行车
C. 准点行车
D. 以上都正确
【判断题】
申通地铁集团的共同使命:运载温馨、营造和谐。
A. 对
B. 错
【判断题】
上海地铁识别标志:上海轨道交通标志外圈圆形状为“上海”英文字SHANGHAI第一个字母“S”,在“S”中间是一个“M”,它是国际上地铁专用英文字“Metro”的第一个字母,这两个字母组合连接在一起为“上海地铁”缩写,也表示地铁环城行驶,四通八达之意。
A. 对
B. 错
【判断题】
职业道德具有适用范围的有限性,只有一些重要的工作才要遵守职业道德。
A. 对
B. 错
【判断题】
在日常工作中,个人行为需要服从整体行动,局部工作要服从全局需要。
A. 对
B. 错
【判断题】
轨道交通是城市的重要基础设施,是社会公益性事业。
A. 对
B. 错
【判断题】
职业道德具有适用范围的有限性,只有一些重要的工作才要遵守职业道德。
A. 对
B. 错
【判断题】
换乘车站视情况关闭单向或双向换乘通道是车站启动二级大客流的现场处置措施。
A. 对
B. 错
【判断题】
企业进行“职业道德”的教育是当仁不让的职责。
A. 对
B. 错
【判断题】
在培养职业道德的同时,对于旧思想旧意识,只要不影响工作就可得过且过。
A. 对
B. 错
【判断题】
票务信息管理系统中发票入库及票根回收审核权限为值班站长。
A. 对
B. 错
【判断题】
值班站长交接班时,需要对车站客流情况,设备设施运行情况,生产任务情况,生产物资、备品备件、工器具使用情况等交接,并在相应台账上登记。
A. 对
B. 错
【判断题】
值班员负责发布非突发案(事)件引发的三级大客流启动、撤销命令。
A. 对
B. 错
【判断题】
“四长联动”机制中的四长主要指的是站长、轨道公安警长、属地区长、属地派出所所长。
A. 对
B. 错
【判断题】
因故障等原因造成列车运行延误15min以上时,车站因根据票务处理规定对持有有效票的乘客进行放行处理,并告知乘客7个工作日内可到指定车站进行退票。
A. 对
B. 错
【判断题】
城市轨道交通必须贯彻“安全第一,以人为本”的设计原则。
A. 对
B. 错
【判断题】
全自动驾驶系统通过对列车的精确定位及实时跟踪,有效缩短行车间隔,提高旅行速度。
A. 对
B. 错
【判断题】
轨道交通运营网络的形成条件之一是:城市中必须至少有两条以上已经开通并各自独立运行的轨道交通线路。
A. 对
B. 错
【判断题】
无人值守下的列车自动运行是最高等级的全自动驾驶。
A. 对
B. 错
【判断题】
城市轨道交通运营调度是列车运行的组织、领导和指挥者。
A. 对
B. 错
推荐试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.