【单选题】
Wheredoesawarningmessageappear?___
A. A.Upperarea
B. B.Leftmemoarea
C. C.Rightmemoarea
D. D.STATUSpage
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
B
解析
暂无解析
相关试题
【单选题】
ThePFR(POSTFLIGHTREPORT)ismaseupfrom:___
A. A.onlytheLASTLEGECAMREPORT
B. B.theLASTLEGECAMREPORTandtheLASTLEGREPORT
C. C.onlytheLASTLEGREPORT
D.
【单选题】
PFR过滤数据库的作用是:___
A. A.滤去虚假的或不正确的故障/信息
B. B.滤去所有的ECAM警告信息
C. C.滤去所有的故障信息
D. D.只滤去CLASS3级故障信息
【单选题】
当DMC1和DMC3同时故障时,会发生:___
A. A.机长的PFD和ND无显示,但上ECAM上仍显示正常
B. B.只有付驾驶的PFD和ND显示,此时下ECAM显示系统页
C. C.DMC2负责六个显示器的显示
D. D.失去机长的PFD和ND显示,并且无系统页显示
【单选题】
当按压ECAM面板上的紧急取消(EMERCANC)时:___
A. A.所有的警告信息被取消
B. B.所有的音响警告被取消
C. C.仅取消红色的警告信息
D. D.不能取消琥珀色的注意信息
【单选题】
当出现一条LEVEL2级警告时,驾驶仓会出现哪些效应?___
A. A.警告喇叭响,有信息显示和主警告灯亮
B. B.警告喇叭响,无信息显示,但主注意灯亮
C. C.仅有红色的信息出现而无警告灯亮
D. D.主注意灯亮,有音响警告和信息显示
【单选题】
机内自测试(BITE)数据被送至哪一个系统收集?___
A. A.电子集中飞机监控(ECAM)
B. B.多功能控制显示组件(MCDU)
C. C.数字式飞行数据记录器(DFDRS)
D. D.集中故障显示系统(CFDS)
【单选题】
加速度计测量的线性加速度信号由哪个组件变换成数字信号?___
A. A.集中故障显示接口组件(CFDIU)
B. B.飞行数据接口组件(FDIU)
C. C.系统数据收集组件(SDAC)
D. D.固态飞行数据记录器(SSFDR)
【单选题】
类型二系统的定义是:___
A. A.输入/输出都采用ARINC429总线
B. B.输入/输出都采作ARINC629总线
C. C.输入/输出都采用离散信号
D. D.输出用ARINC429信号,输入用离散信号
【单选题】
哪些信息显示在左提醒(MEMO)区?___
A. A.正常提醒信息,独立故障和主故障
B. B.仅正常提醒信息
C. C.仅从属故障信息
D. D.独立故障信息,主故障信息和从属故障信息
【单选题】
哪一个计算机计算飞行阶段?___
A. A.显示管理计算机(DMC)
B. B.系统数据集中器(SDAC)
C. C.飞行警告计算机(FWC)
D. D.飞行管理制导计算机(FMGC)
【单选题】
在地面上,CFDS的哪个功能在备份方式中有效?___
A. A.系统报告和测试功能
B. B.最近航段报告和最近航段ECAM报告
C. C.历史报告
D. D.航后报告(PFR)
【单选题】
?在空中,CFDS的哪一个功能有效?___
A. A.最近航段报告和最近MECAM报告
B. B.电子状态页,最近航段报告
C. C.目前航段报告和目前航段ECAM报告.
D. D.?
【单选题】
哪些信息显示在左提醒(MEMO)区:___
A. A.正常提醒信息,独立故障和主故障信息
B. B.仅正常提醒信息
C. C.仅从属故障信息
D. D.独立故障信息,主故障信息和从属故障信息
推荐试题
【填空题】
27.20世纪80年代末、90年代初,随着东欧剧变和苏联解体,持续近半个世纪的冷战格局被打破。 “___ ” 是当前乃至今后相当长时期内世界主要战略力量对比的总体态势和总体特征。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone