【填空题】
23083.___若回转轴前工序加工径向尺寸为 d1,本工序加工径向尺寸到 d2,则其在直径上的工序余量为 d1-d2。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
T
解析
暂无解析
相关试题
【填空题】
23084.___当实际生产中不宜选择设计基准作为定位基准时,则应选择因基准不重合而引起的误差最小的表面作定位基准。
【填空题】
23085.___千分表的传动机构中传动的级数要比百分表多,因而放大比更大,测量精度也更
【填空题】
23086.___测量复杂轮廓形状零件可选用万能工具显微镜。
【填空题】
23087.___孔的圆柱度误差是沿孔轴线方向取不同位置测得的最大差值即为孔的圆柱度误差。
【填空题】
23088.___表面粗糙度高度参数 Ra 值愈大,表示表面粗糙度要求愈高;Ra 值愈小,表示表
【填空题】
23089.___机床的日常维护与保养,通常情况下应由后勤管理人员来进行。
【填空题】
23090.___导轨面直线度超差会使进给机构噪声加大。
【填空题】
23091.___职业道德的主要内容包括:爱岗敬业、诚实守信、办事公道、服务群众、奉献社
【填空题】
23092.___带的失效形式主要是打滑与疲劳破坏。
【填空题】
23093.___链传动只能用于平行轴间的传动。
【填空题】
23094.___影响蜗轮副啮合精度的因素以蜗杆轴线偏移蜗轮轮齿对称中心面为最大。
【填空题】
23095.___数控铣床在进给系统中采用步进电机,步进电机按电脉冲数量转动相应角度。
【填空题】
23096.___显示器的主要原理是以电流刺激液晶分子产生点、线、面配合背部灯管构成画面。
【填空题】
23097.___消除一般的病毒,拔掉网线后,用杀毒软件杀毒,然后再把相关的系统补丁补上。
【填空题】
23098.___平行线法的展开条件应满足且在投影面上反映实长。
【填空题】
23099.___选择精基准时,先用加工表面的设计基准为定位基准,称为基准重合原则。
【填空题】
23100.___改善零件、部件的结构工艺性,可便于加工和装配,从而提高劳动生产率。
【填空题】
23101.___销在机械中除起到连接作用外还可起定位作用和保险作用。
【填空题】
23102.___市场经济时刀具企业只负责生产专用刀具,标准刀具、非标准刀具都由用户行业
【填空题】
23103.___由于零件的相互运动,使摩擦表面的物质不断损失的现象叫磨损。磨损过程中, 单位时间内材料的磨损量不变。
【填空题】
23104.___在数值计算过程中,已按绝对坐标值计算出某运动段的起点坐标及终点坐标,以增量尺寸方式表示时,其换算公式:增量坐标值=终点坐标值-起点坐标。
【填空题】
23105.___GSK990M 数控系统孔加工数据:G73 方式中,P 规定孔底暂停时间,单位为 s。
【填空题】
23106.___CAXA 制造工程师软件中“网格面”要求所有的 U 向和 V 向曲线都必须有交点。
【填空题】
23107.___CAXA 制造工程师可以直接生成 G 代码,不需要生成刀位文件再作处理。
【填空题】
23108.___GSK983 系统编辑程序时,按地址键和数字键即可直接插入。
【填空题】
23109.___数控机床既可以自动加工,也可以手动加工。
【填空题】
23110.___数控加工中,程序调试的目的:一是检查所编程序是否正确,再就是把编程零点, 加工零点和机床零点相统一。
【填空题】
23111.___标准麻花钻主切削刃上各点处的后角大小不相等,外缘处最小,约为 1~4 度。
【填空题】
23112.___汽轮机高中压外缸结构要素复杂,模型的建立困难。某高中压外缸模型的特征量多达 600 多个,而特征建立的顺序直接影响着后面 NC 加工的进行。
【填空题】
23113.___4 轴联动或 5 轴联动加工与 5 个以上轴的同时加工,称为多轴加工。
【填空题】
23114.___加工整体叶轮,需要注意的主要问题是避免干涉,曲面的自身干涉和曲面间的面间干涉。
【填空题】
23115.___铣床床台上的T形槽,其用途之一为当基准面。
【填空题】
23116.___深孔钻削过程中,钻头加工一定深度后退出工件,借此排出切屑。并进行冷却润滑,然后重新向前加工,可以保证孔的加工质量。
【填空题】
23117.___圆柱凸轮槽的加工前的数学处理步骤如下:①把弧长展开设为 X 坐标值;②把导程设为 Y 坐标值;③利用软件对转变后的 XY 平面曲线进行插值运算,最后生成 XY 平面内的加工代码;④把 X 值___转换成角度值。如果插值点非常多,则可利用 Excel 文件进行处理。
【填空题】
23118.___为了便于安装工件,工件以孔定位用的过盈配合心轴的工作部分应带有锥度。
【填空题】
23119.___难加工材料主要是指切削加工性差的材料,不一定简单地从力学性能上来区分。如在难加工材料中,有硬度高的,也有硬度低的。
【填空题】
23120.___当转子的转速大大高于临界转速时,振动剧烈。
【填空题】
23121.___尺寸链按功能分为装配尺寸链和工艺尺寸链。
【填空题】
23122.___杠杆千分尺的测量压力是由微动测杆处的弹簧控制的。
【填空题】
23123.___合像水平仪是一种用来测量对水平位置,或垂直位置微小偏差的几何量仪。
推荐试题
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud