【多选题】
简述牵引箱中电容器充放电的过程 ___
A. 当列车牵引准备好,主电路高速断路器(HB)闭合后,闭合接触器(KM2),通过受流器(+206=11-X11)输入的高压电源经隔离开关(MQS)、充放电电阻(R1)给支撑电容(C)充电,当电容电压在一定时间且上升到一定值时, KM1 闭合,电容充电完成。
B. 在正常情况下,电容的放电由固定放电电阻(R4)完成,将电容端电压放电到 50V 以下的时间小于5min。
C. 当对高压电路和 VVVF 逆变器检修或维护保养时,则充放电电阻(R1)与隔离开关的联锁辅助开关( MQS1 )形成直流支撑电容的快速放电回路,从而使电容通过放电电阻快速放电。
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
ABC
解析
暂无解析
相关试题
【多选题】
辅助高压箱的工作原理是什么? ___
A. 在刀开关BQS 置于运行位同时刀开关 AQS 置于运行位情况下,受流装置输入的 DC1500V 高压通过刀开关BQS,刀开关AQS 和熔断器 AF 为辅助电源提供电源,熔断器 AF 对主电路起保护作用。当采用车间电源对辅助电源供电时,将BQS 置于车间位,辅助电源即转为车间电源供电。该电路有联锁功能,即当使用车间电源供电或置于切除位时,受流装置被禁止升弓动作。
B. 车间电源实现互锁电路,辅助高压箱车间电源柜门处设有限位开关 KT1,实现两 TC 车车间电源互锁功。柜门闭合时,KT1 处于“断开”状态;当柜门打开时,KT1 变为“闭合”状态,外部控制继电器线圈得电,地面电源通过车间电源为 SIV 供电,当另一车辅助高压箱车间电源柜门打开时,本车外部控制继电器线圈失电,无法送入高压。即实现当一车辅助高压箱使用车间电源供电,另一车辅助高压箱车间电源柜门不允许打开功能。
【多选题】
试分析LC 滤波电路作用?___
A. LC 滤波电路吸收直流输入端的谐波电压,对输入电源网络的高频信号和电压尖峰干扰有抑制作用,
B. 同时又能抑制逆变器对输入电源网络的干扰,并使电容器C两端电压保持稳定并将电压波动限制在允许范围内。
【多选题】
试分析跳主断的原因?___
A. 差分电流大于50A、充电超时、充电接触器(KM2)卡合、短接接触器(KM1)卡合;
B. 元件故障、硬件判断网压过压、硬件判断直流过压、硬件判断直流过流、斩波1过流、斩波2过流、电源故障、板不在位;
C. 软件判断网压过压、软件判断中间电压过压、MCU生命信号中断、主断线圈减载故障。
【多选题】
在哪些情况下,TCMS 将取消发向所有的DCU 的牵引指令及牵引/制动设定值: ___
A. 司机室连锁故障;牵引系统方向故障;
B. 车门未全部关闭,且无“车门旁路”信号;
C. 列车停放制动未缓解,且无“停放制动缓解旁路”信号;
D. 列车安全环路断开或者列车完整性环路断开;
E. 制动系统触发紧急制动 (针对紧急制动列车线到某个制动系统的硬线断落这种情况);
F. 列车发出牵引指令后,5 秒内列车仍然不能缓解所有制动;
G. 列车总风管压力低于 5.5bar,且无“总风压力旁路”信号;
H. 列车速度大于 5Km/h,非制动工况下检测到列车制动未缓解。
【多选题】
试分析扩展供电逻辑? ___
A. 当网压达到额定值且持续15 秒后,才进行扩展供电逻辑 ;
B. 检测到一台 SIV 通信故障、380V 输出不正常或者SIV 的KMA 继电器未闭合 ;
C. 向空调发送减载指令 ;
D. 如果在 15S 内接收不到空调完成减载的反馈,再将空调设置为通风模式(空调在与网络通信中断的情况下,必须保证不得处于全载工况) ;
E. 当空调处于半载或者通风工况下, TCMS 通过DXM 输出“扩展供电”指令(高电平有效);
F. SIV 恢复正常工作后,TCMS 立即撤销“扩展供电”指令,5S 后再撤销“空调减载”指令;
G. TCMS 发出“扩展供电”指令后1 秒内收不到“扩展供电反馈”信号,TCMS 报“扩展供电接触器故障”。
【多选题】
在哪些情况下,TCMS 系统的HMI 会提示司机进入紧急牵引模式: ___
A. 出现两个或两个以上DCU 通信故障(由VCMe 诊断);
B. 出现操作端 HMI 通信故障(由HMI 诊断);
C. 出现两个或两个以上BCU 通信故障(由VCMe 诊断);
D. 司机控制器牵引/制动手柄电位器故障(由VCMe 诊断)。
【多选题】
试分析空调预冷模式:___
A. 如果系统一开机即检测到室内温度 Ti≥31.5℃,则执行预冷模式。
B. 首先四台通风机均运行,同时新风阀关闭,回风阀打开,延时35s后两点断开,以下动作同全冷模式相同;
C. 若在自动模式下,ACCU如有收到MVB发过来的“关闭预冷信号”则立即退出预冷模式,执行UI553自动模式。
D. 当Ti温度降到Tic-1℃以下,或者预冷持续15分钟后,预冷状态结束,此时系统根据目标温度和室内温度差值工作在相应工作模式,新风阀,回风阀均打开。
【多选题】
当那些条件同时满足时,TCMS通过DXM输出“扩展供电”指令(高电平有效): ___
A. 检测到一台SIV通信故障、380V输出不正常或者SIV的KMA继电器未闭合 ;
B. 向空调发送减载指令 ;
C. 如果在15S内接收不到空调完成减载的反馈,再将空调设置为通风模式(空调在与网络通信中断的情况下,必须保证不得处于全载工况) ;
D. 当空调处于半载或者通风工况下, TCMS通过DXM输出“扩展供电”指令(高电平有效)SIV恢复正常工作后,TCMS立即撤销“扩展供电”指令,5S后再撤销“空调减载”指令,
E. TCMS发出“扩展供电”指令后1秒内收不到“扩展供电反馈”信号,TCMS报“扩展供电接触器故”。
【多选题】
年检作业动态调试中,需要做哪些旁路试验?___
A. 门零速旁路功能检查;
B. 门关好旁路功能检查;
C. 所有制动缓解旁路功能检查;
D. 停放制动旁路功能试验;
E. 警惕旁路功能。
推荐试题
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.