【单选题】
2个中央油箱油泵电门ON时,中央油泵的工作状态是:___
A. 中央油箱2个泵一直工作,需要人工关断
B. 在泵的输出压力低于6PSI时,泵会自动停止工作
C. 中央油箱低油面传感器变干后,泵会自动停止工作
D. B,C都对
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
下列何种条件可以使地面加/放油面板990VU控制电路通电___
A. 飞机AC BUS通电
B. 高油面传感器测试电门按压
C. 990VU接近面板上的微动电门作动
D. 飞机电瓶电门接通
【单选题】
配平油箱T-TANK的作用是___
A. 增加额外的载油量
B. 增加额外的载油量并用于飞机的升力控制
C. 用于飞机的重心控制
D. 飞机的起飞阶段对发动机供油
【单选题】
配平油箱油泵可以工作要满足 ___
A. 高度>FL255,L/G 和S/F收上,油量高于低油面
B. 在地面
C. 仅FCMC控制
D. 仅人工控制
【单选题】
拆燃油泵需不需要放油___
A. 需要,里面有单向活门
B. 不需要,有个
C. 需要
D. 不需要,有个单向活门
【单选题】
什么时候当配平油箱低油量被探测,隔离活门仍然打开___
A. 配平油箱选择电门设在OPEN
B. 飞机下降时FCMC自动命令
C. 前XFR人工P/B被选择
D. AUX XTF
【单选题】
在最后内侧油箱开始供油,飞机CG向后移,将发生什么___
A. 外侧向内侧传输开始
B. CG保持接近在后极限位
C. 前传输开始
D.
【单选题】
燃油控制和监控由何种计算机实现___
A. FQIC和CMC
B. FCMC
C. FWC
D. FMGEC
【单选题】
驾驶舱头顶燃油配平人工控制电门的功用是___
A. 向前和向后串油
B. 只有向前串油
C. 只有向后串油
D. 向前和向后都不可实现
【单选题】
驾驶舱头顶261VU面板上FCMC1跳开关作用是___
A. 对FCMC1计算机重新启动
B. 拔出后可拆下FCMC1计算机
C. 拔出后按下可以是FCMC1和FCMC2转换对燃油系统控制
D. 拔出后可切断FCMC1的电源
【单选题】
绿系统发动机驱动泵(EDP)位于___
A. 1号发动机
B. 2号发动机
C. 1,2发动机
D. 冲压涡轮RAT
【单选题】
应急恒速液压发电机的驱动液压源是___
A. 绿系统液压
B. 黄系统液压
C. 蓝系统液压
D. 绿黄系统 液压
【单选题】
黄系统在地面自动工作的条件是___
A. 货舱门打开的过程中
B. 起落架舱门收上的过程中
C. 仅在2发工作的过程中
D. 在地面黄系统不能自动工作
【单选题】
液压系统余油收集油罐共有___
A. 1个
B. 2个
C. 3个
D. 4个
【单选题】
绿系统勤务面板位于那里?___
A. 右主轮舱前方
B. 右主轮舱后方
C. 左主轮舱前方
D. 左主轮舱后方
【单选题】
冲压涡轮(RAT)位于那里?___
A. 右主轮舱前方
B. 右主轮舱后方
C. 左主轮舱前方
D. 右大翼4号襟翼整流罩内
【单选题】
液压储压器预充压力是:___
A. 3000PSI
B. 1885PSI左右
C. 低于3000PSI的任意值
D. 没有必要预充
【单选题】
优先活门在什么情况下使用?___
A. 绿系统压力高时
B. 压力低时
C. 绿和黄系统压力高时
D. 驾驶舱人工操作时
【单选题】
在什么情况下,冲压空气涡轮自动放出:___
A. 绿黄系统油箱低油量且速度大于100节
B. 蓝电动泵故障
C. 只能人工放出
D. 蓝泵供压低于1ATA750PSI
【单选题】
正常使用中,蓝液压系统由谁供压?___
A. 动力转换组件
B. 发动机驱动泵
C. 电动泵
D. 冲压空气涡轮
【单选题】
冲压空气涡轮在何时收起:___
A. 飞行中
B. 地面
C. 地面和飞行中
D. 自动收起
【单选题】
二号发动机驱动:___
A. 蓝系统
B. 绿系统
C. 黄系统泵和绿系统
D. 蓝系统和绿系统
【单选题】
防火关断活门关断:___
A. 蓝和黄系统
B. 黄和绿系统
C. 绿和蓝系统
D. 绿,蓝和黄系统
【单选题】
壳体回油滤的作用___
A. 壳体回油到油箱前除去油液中的杂质
B. 检查液压泵的状况
C. A和B
D. 以上说法都不对
【单选题】
正常 情况下,左右发反喷使用的液压源是___
A. 左右发同时使用绿系统液压
B. 左右发分别使用绿黄系统液压
C. 左右发分别使用蓝黄系统液压
D. 左右发分别使用绿蓝系统液压
【单选题】
所有液压油箱加油是通过___
A. 绿系统液压勤务面板
B. 黄系统液压勤务面板
C. 蓝系统液压勤务面板
D. 各自的系统液压勤务面板
【单选题】
液压系统的防火关断活门控制是在___
A. 驾驶舱液压控制面板
B. 驾驶舱火警控制面板
C. 地面液压控制面板
D. 地面电源控制面板
【单选题】
液压系统的优先活门可以___
A. 地面进行系统渗漏检查
B. 关断主飞行控制油路
C. 关断次飞行控制油路
D. 关断大流量用户的油路
【单选题】
液压油箱气源增压到的压力是___
A. 8PSI
B. 50PSI
C. 60PSI
D. 3000PSI
【单选题】
液压系统正常供应时,ECAM系统页面显示的压力值是什么颜色的?___
A. 红色
B. 绿色
C. 琥珀色
D. 蓝色
【单选题】
液压的ECAM系统页面中显示的活门符号代表那个活门?___
A. 安全活门
B. 顺序活门
C. 火警关断活门
D. 优先活门
【单选题】
人工放出冲压涡轮(RAT)的电门位于那里?___
A. 前仪表板
B. 中控台
C. 头顶面板
D. 遮光板
【单选题】
各系统油箱人工放气活门位于何处?___
A. 全在绿系统勤务面板
B. 全在蓝系统勤务面板
C. 全在主轮舱内
D. 在各自系统的勤务面板内
【单选题】
什么情况下会触发“EDP LOW PRESSURE”ECAM警告信息:___
A. P<3000PSI
B. P<1750PSI
C. P<50PSI
D. P=0PSI
【单选题】
以下哪个部件不能给黄系统增压?___
A. RAT
B. 手摇泵
C. 电动泵
D. EDP
【单选题】
黄系统渗漏测试活门位于___
A. 黄系统低压总管组件(MANIFOLD)
B. 黄系统高压总管组件(MANIFOLD)
C. 黄系统地面勤务总管组件(MANIFOLD)
D. 黄系统液压油箱出口总管组件(MANIFOLD)
【单选题】
货舱人工打开手动泵可以在地面给哪个系统增压___
A. 绿系统
B. 黄系统
C. 蓝系统
D. 黄系统和蓝系统
【单选题】
绿系统优先活门位于___
A. 绿系统低压总管组件(MANIFOLD)
B. 绿系统高压总管组件(MANIFOLD)
C. 绿系统刹车总管组件(MANIFOLD)
D. 绿系统地面勤务总管组件(MANIFOLD)
【单选题】
黄系统液压油箱位于那个轮舱___
A. 左主轮舱前
B. 右主轮舱前
C. 轮舱后部
D. 轮舱龙骨梁上方
【单选题】
正常刹车由那个系统提供液力?___
A. 绿系统
B. 黄系统
C. 蓝系统
D. 绿系统和黄系统
【单选题】
失去绿系统时:___
A. 放起落架正常
B. 收起落架正常
C. 起落架必须重力放出
D. 起落架不能收放
推荐试题
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall