【单选题】
BA018 油浸纸绝缘电力电缆的额定电压为___。
A. 110 kV
B. 66 kV
C. 35 kV及以下
D. 6 kV
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
BA018 当额定电压超过35 kV时,适合采用___。
A. 油浸纸绝缘电力电缆
B. 橡皮绝缘电力电缆
C. 充油电力电缆
D. 全塑料电力电缆
【单选题】
BA018 控制电缆用于交流___配电装置的二次回路中。
A. 1000 V及以下
B. 500 V及以下
C. 380 V及以下
D. 220 V及以下
【单选题】
BA019 电力电缆的终端头金属外壳___。
A. 必须接地
B. 在配电盘装置一端须接地
C. 在杆上须接地
D. 有时接地,有时不接地
【单选题】
BA019变电所的电缆沟、隧道、电缆井、电缆架及电缆线段的巡查至少每___进1次。
A. 季
B. 月
C. 半年
D. 年
【单选题】
BA01电力电缆的载流量与___无关。
A. 额定的最高允许温度
B. 电缆周围的环境湿度
C. 电缆周围的环境温度
D. 电缆各部的结构尺寸
【单选题】
BA020 一定高度的避雷针下有一个安全区域,这个区域称为___。
A. 安全区
B. 保护范围
C. 保护半径
D. 放电区
【单选题】
BA020 变电所中保护电气设备免受直接雷击的设备是___。
A. 避雷针
B. 避雷线
C. 阀式避雷器
D. 氧化锌避雷器
【单选题】
BA020 高压架空输电线路通常采用___防雷措施。
A. 避雷针
B. 避雷器
C. 避雷线
D. 防雷放电间隙
【单选题】
BA021 为防止感应雷电波入侵变电所;击穿电气设备,有效措施是在被保护设备上并联___。
A. 电阻
B. 电容
C. 电感
D. 避雷器
【单选题】
BA021 按雷电波所来方向,避雷器一般应安装在被保护设备的___。
A. 前面
B. 后面
C. 同一面上
D. 下面
【单选题】
BA021变电所的母线上装设避雷器是为了___。
A. 防止直击雷
B. 防止反击过电压
C. 防止雷电侵入
D. 防止感应过电压
【单选题】
BA022 管型避雷器常用于___线路中绝缘薄弱环节的保护。
A. 耐张段
B. 小跨越
C. 大跨越
D. 直线段
【单选题】
BA022 管型避雷器是电力线路和变电所进出线的主要___元件。
A. 防雷保护
B. 放电
C. 间隙
D. 灭弧
【单选题】
BA022 当线路上遭到雷击耐,大气过电压使___避雷器的外部和内部间隙击穿。
A. 阀式
B. 管型
C. 磁吹
D. 氧化锌
【单选题】
BA023 阀式避雷器的火花间隙由铜片制成,每对间隙用___厚的云母垫圈隔开。
A. 5--10mm
B. 3~5mm
C. 1--2 mm
D. 0.5--1 mm
【单选题】
BA023 流过阀式避雷器的冲.击电流所产生的电压降称为___电压。
A. 放电
B. 残余
C. 灭弧
D. 冲击
【单选题】
BA023 按外部过电压选择变电所的绝缘时,应以___为基础。
A. 变压器所能耐受的电压
B. 变电所设备的最低耐受电压
C. 阀式避雷器的残压
D. 避雷针的残压
【单选题】
BA024 FCD1系列磁吹避雷器具有拉长电弧,产生强烈的___作用使电弧熄灭,因此断流容量大。
A. 燃弧
B. 游离
C. 去游离
D. 重燃
【单选题】
BA025 氧化锌避雷器阀片由___等烧结成的多晶体半导体陶瓷非线性元件制成。
A. 碳化硅
B. 氧化锌或氧化铋
C. 多晶硅
D. 单晶硅
【单选题】
BA025 氧化锌避雷器在大气过电压作用下呈___特性泄放雷电流。
A. 高电阻
B. 较高电阻
C. 低电阻
D. 零电阻
【单选题】
BA025 在电力系统中,使用氧化锌避雷器的主要原因是它___。
A. 造价低
B. 便于安装
C. 保护性能好
D. 不用维护
【单选题】
BA026 电抗器分接开关的接触电阻应不大于___。
A. 500µΩ
B. 700µΩ
C. 1000µΩ
D. 2000µΩ
【单选题】
BA026 电抗器铁芯穿芯螺杆的绝缘电阻值应不低于___。
A. 0.1 MΩ
B. 0.41MΩ
C. 0.7 MΩ
D. 1 MΩ
【单选题】
BA026 在电网中装设串联电抗器的目的是___。
A. 提高电网电压水平
B. 补偿电网接地时的电容电流
C. 限制短路电流
D. 提高电网电能质量
【单选题】
BA027 有关并联电抗器铁芯柱的铁饼一般采用___叠片。
A. 辐射式
B. 折叠式
C. 符合式
D. 冲压式
【单选题】
BA027 NKL型电抗器的型号中的字母“N”表___。
A. 电抗器
B. 水泥柱式结构
C. 户内式结构
D. 铝电缆
【单选题】
BA027 电抗器的基本结构是___。
A. 有铁芯,有线圈
B. 有铁芯,无线圈
C. 无铁芯,有线圈
D. 无铁芯,无线圈
【单选题】
BA028 电磁操作机构的型号用字母___表示。
A. CD
B. T
C. CY
D. CS
【单选题】
BA028 弹簧储能分合闸操作机构的型号用字母___表示。
A. CD
B. CY
C. CT
D. CS
【单选题】
BA028 手动操作机构的型号用字母___表示。
A. CD
B. T
C. CS
D. CY
【单选题】
BA029 电磁操作机构主要适用于___断路器。
A. 10 kV
B. 35 kV
C. llo kV及以下
D. 220 kV及以下
【单选题】
BA029 电磁操作机构是指用___的操作机构。
A. 人力合闸
B. 电动机合闸与分闸
C. 电磁铁合闸
D. 弹簧储能实现合闸
【单选题】
BA029 电磁操作机构的合闸线圈动作电压不低于额定电压的___。
A. 75%
B. 85%
C. 80%
D. 90%
【单选题】
BA030 液压操作机构适用于配套110 kV以上高压___。
A. 隔离开关
B. 负荷开关
C. 断路器
D. 接触器
【单选题】
BA030 CY3型液压操作机构合闸线圈的绝缘电阻不小于___。
A. 0.5 MΩ
B. 1 MΩ
C. 2 MΩ
D. 5MΩ
【单选题】
BA030 CY4型液压机构如果储压筒有划痕,高压油越过活塞进入氮气中,则压力表指不与正常时相比___。
A. 高
B. 低
C. 不变
D. 不一定
【单选题】
BA031 弹簧操作机构储能时需要的电源容量___。
A. 较小
B. 较大
C. 一般
D. 很大
【单选题】
BA031 弹簧储能操作机构暂时失去电源时仍可进行___分合操作。
A. 多次
B. 2次
C. 1次
D. 5次
【单选题】
BA031 弹簧储能操作机构在分闸时弹簧___。
A. 已储能
B. 释放
C. 未储能
D. 开始储能
【单选题】
BA032 电容器的无功输出功率与电容器的电容___。
A. 成反比
B. 成正比
C. 成比例
D. 不成比例
推荐试题
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack
【单选题】
What is the best definition of hairpinning?___
A. ingress traffic that traverses the outbound interface on a device
B. traffic that enters one interface on a device and that exits through another interface
C. traffic that enters and exits a device through the same interface
D. traffic that tunnels through a device interface
【单选题】
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?___
A. authPriv
B. authNo Priv
C. noAuthNoPriv
D. NoauthPriv
【单选题】
You have implemented a dynamic blacklist, using security intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for usiness pur poses. Which action can you take to retain the blacklist while allowing users to access the approve d sites?___
A. Create a whitelist and manually add the approved addresses.
B. Disable the dynamic blacklist and deny the specif ic address on a whitelist while permitting the others
C. Edit the dynamic blacklist to remove the approved addresses
D. Disable the dynamic blacklist and create a static blacklist in its place
【单选题】
When connecting to an external resource,you must change a source IP address to use one IP address from a range of 207.165.201.1 to 207.165.1.30. Which option do you implement ?___
A. dynamic source NAT that uses an IP ad dress as a mapped source
B. static destination NAT that uses a subnet as a real de stination
C. dynamic source NAT that uses a range as a mapped source
D. static destination NAT that uses a subnet as a real source
【单选题】
Refer to the exhibit. 【nat(ins,any)dynamic interface】Which ty pe of NaT is configured on a Cisco ASA?___
A. dynamic NAT
B. source identity NAT
C. dynamic PAT
D. identity twice NAT
【单选题】
Which mitigation technology for web-based threats prevents the removal of confidential data from the network?___
A. CTA
B. DCA
C. AMP
D. DLP
【单选题】
Refer to the exhibit. What is the effect of the given configuration?___
A. It establishes the preshared key for the switch
B. It establishes the preshared key for the firewall.
C. It establishes the preshared key for the Cisco ISE appliance
D. It establishes the preshared key for the router.
【多选题】
What are two major considerations when choosing between a SPAN and a TAP when plementing IPS?___
A. the type of analysis the iS will perform
B. the amount of bandwidth available
C. whether RX and TX signals will use separate ports
D. the way in which media errors will be handled
E. the way in which dropped packets will be handled
【多选题】
What are two direct-to-tower methods for redirecting web traffic to Cisco Cloud Web Security?___
A. third-party proxies
B. Cisco Catalyst platforms
C. Cisco NAC Agent
D. hosted PAC files
E. CiSco ISE
【多选题】
Which three descriptions of RADIUS are true? ___
A. It uses TCP as its transport protocol.
B. Only the password is encrypted
C. It supports multiple transport protocols
D. It uses UDP as its transport protocol
E. It combines authentication and authorization
F. It separates authentication,authorization,and accounting
【多选题】
Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10?___
A. using switchport trunk native vlan 10 command on trunk ports
B. enabling BPDU guard on all access ports
C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
D. applying ACl between VLAN
E. using switchport mode access command on all host ports
F. using switchport nonegotiate command on dynamic desirable ports
【多选题】
What are two features of transparent firewall mode ___
A. It conceals the presence of the firewall from attackers
B. It allows some traffic that is blocked in routed mode
C. It enables the aSA to perform as a router.
D. It acts as a routed hop in the network.
E. It is configured by default
【多选题】
Which two models of A sa tend to be used in a data center?___
A. 5555X
B. 5585X
C. ASA service module
D. 5512X
E. 5540
F. 5520
【多选题】
Which two statements about hardware-based encrption are true?___
A. It is widely accessible
B. It is potentially easier to compromise than software-based encryption. It requires minimal configuration
C. It requires minimal configuration
D. It can be implemented without impacting performance
E. It is highly cost-effective
【多选题】
In which two modes can the Cisco We b Security appliance be de ployed?___
A. as a transparent proxy using the Secure Sockets Layer protocol
B. as a transparent proxy using the Web Cache Communication Protocol
C. explicit proxy mode
D. as a transparent proxy using the Hyper Text Transfer Protocol
E. explicit active mode
【单选题】
1.三相刀开关的图形符号与交流接触器的主触点符号是___。
A. 一样的
B. 可以互换
C. 有区别的
D. 没有区别
【单选题】
2.刀开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
3.行程开关的文字符号是___。
A. QS
B. SQ
C. SA
D. KM
【单选题】
4.交流接触器的文字符号是___。
A. QS
B. SQ
C. SA
D. KM