【单选题】
当驾驶舱应急灯开关放ARM位,何时可自动接通应急照明?___
A. 当115VAC汇流条无电时
B. 当28VDC汇流条无电时
C. 当28VAC汇流条无电时
D. 不确定
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
应急灯光系统是否可在客舱进行控制?___
A. 可以,只能人工接通,无自动接通控制
B. 可以,有人工接通,自动接通控制
C. 不能控制
D. 不确定
【单选题】
从PTP面板或MCDU上对应急灯光系统进行测试时,是否可判断出具体有故障的EPSU?___
A. 可以
B. 不可以,若有故障时,必须到每个EPSU上检查
C.
D.
【单选题】
当驾驶舱的按钮开关放AUTO位时,电子舱的顶灯:___
A. 当该area的电子舱门打开时,灯亮
B. 当任一电子舱门打开时,灯亮
C. 当飞机着陆后,灯亮
D. 不确定
【单选题】
主轮舱的照明灯控制开关位于:___
A. 驾驶舱顶板上
B. 左轮舱
C. 液压舱
D. 右轮舱
【单选题】
当发现着陆灯组件上存在燃油污染时:___
A. 查找漏油点并进行维修
B. 更换着陆灯组件
C. 接通着陆灯
D. B和C都正确
【单选题】
当更换飞机外部灯光时,不要用手指接触灯泡的玻璃部分.___
A. 正确
B. 错误
C.
D.
【单选题】
在增强型灯光系统中,驾驶舱按钮开关上的指示灯为:___
A. 灯泡
B. LED发光二极管
C.
D.
【单选题】
在增强型灯光系统中,客舱内的阅读灯为:___
A. 老式灯泡,可调节方向
B. 老式灯泡,不可调节方向
C. LED,可调节方向
D. LED,不可调节方向
【单选题】
“ALIGN”灯什么情况下会闪亮___
A. 当ADIRU校准结束
B. 在校准过程中出现IRS误差
C. 当进入NAV选择方式后5分钟内未输入当前位置
D. A+B+C
【单选题】
“Retard”语音信息在什么情况下出现___
A. 当RA低于10ft且A/T和AP脱开
B. 当RA低于10ft且A/T和AP处于LAND方式
C. 当RA低于20ft且A/T和AP处于LAND方式
D. 当RA低于10ft
【单选题】
1号AOA测试时,正常结果是___
A. 叶片向上转动5度
B. 叶片向下转动5度
C. 叶片向上转动15度
D. 叶片向下转动15度
【单选题】
3号空速管位于___
A. 机身前部左侧
B. 机身前部右侧
C. 机身后部左侧
D. 机身后部右侧
【单选题】
A320飞机上的ADM共有几个___
A. 6个
B. 7个
C. 8个
D. 9个
【单选题】
A320飞机有几个静压孔___
A. 3个
B. 4个
C. 5个
D. 6个
【单选题】
A320飞机有几个迎角传感器(AOA)___
A. 2个
B. 3个
C. 4个
D. 5个
【单选题】
A320飞机有几个总温探头(TAT)___
A. 2个
B. 3个
C. 4个
D. 5个
【单选题】
A320飞机有几根空速管___
A. 2根
B. 3根
C. 4根
D. 5根
【单选题】
ADF1故障时,ND上的显示会___
A. 出现红色的ADF指针符号和故障旗
B. 出现红色的ADF指针符号
C. 出现红色的ADF故障旗
D. 不再显示ADF信息
【单选题】
ADF安装在飞机的什么地方___
A. 前设备舱
B. 主设备舱
C. 前货舱
D. 后货舱
【单选题】
ADF的NCD数据如何显示___
A. 红色故障旗
B. 白色的虚线
C. 原有的地面台标和指针消失
D. 不显示
【单选题】
ADF方位角表示___
A. 飞机真航向和飞机与地面导航台连线之间的夹角
B. 飞机磁航向和飞机与地面导航台连线之间的夹角
C. 磁北方向和飞机与地面导航台连线之间的夹角
D. 机头和飞机与地面导航台连线之间的夹角
【单选题】
ADF天线预放大器的电源来自___
A. 飞机正常汇流条的28VDC
B. 飞机正常汇流条的115VAC
C. ADF提供的28VDC
D. ADF提供的12VDC
【单选题】
ADF指针可显示在___
A. ECAM
B. PFD
C. ND
D. MCDU
【单选题】
ADIRS(大气数据和惯性基准系统)的初始化校准可通过哪些设备进行___
A. MCDU(多功能控制显示组件)和RMP(无线电管理面板)
B. ADIRSCDU(ADIRS控制显示组件)
C. ADIRSCDU和FCU(飞行控制组件)
D. MCDU(多功能控制显示组件)和ADIRSCDU(ADIRS控制显示组件)
【单选题】
ADIRS的备用仪表系统包括___
A. 备用地平仪和备用磁罗盘
B. 备用地平仪、备用高度表和备用磁罗盘
C. 备用地平仪、备用高度表、备用空速表和备用磁罗盘
D. 备用地平仪、备用高度表、备用空速表、备用升降速表和备用磁罗盘
【单选题】
ADIRU3从哪儿接收GPS信号___
A. 仅GPS1
B. 仅GPS2
C. GPS1或GPS2
D. GPS1和GPS2
【单选题】
ADIRU3可从哪儿接收TAT信号___
A. 机长侧的TAT传感器
B. 副驾驶侧的TAT传感器
C. 备用TAT传感器
D. A+B+C
【单选题】
ADIRU使用的测量元件为___
A. 仅有激光陀螺
B. 仅有加速度计
C. 激光陀螺和加速度计
D. 固态速率陀螺
【单选题】
ADM的工作电压为___
A. 5VDC
B. 13.5VDC
C. 28VDC
D. 115VAC
【单选题】
ADR1故障时必须采取什么措施___
A. 将AIRDATA转换至CAP3位置
B. 保持AIRDATA在NORM位置
C. 将AIRHDG转换至CAP3位置
D. 保持AIRHDG在NORM位置
【单选题】
AOA的测试包含在ADR的哪个测试菜单中(针对LITTON公司的ADIRU)___
A. 地面检测
B. 输出测试
C. 系统测试
D. 接口测试
【单选题】
AOA的信号如何向ADIRU提供___
A. 直接提供
B. 通过ADM进行转换后提供
C. AOA3直接提供,AOA1和AOA2通过ADM进行转换后提供
D. 仅有AOA1直接提供
【单选题】
ATC1的高度信号来自于___
A. RA1和2
B. ADIRU1和ADIRU3
C. ADIRU1、2和3
D. RA和ADIRU
【单选题】
ATC的询问与回答频率分别是___
A. 1030MHz和1090MHz
B. 1090MHz和1030MHz
C. 1060MHz和1120MHz
D. 1120MHz和1060MHz
【单选题】
DDRMI的航向基准信号来自于___
A. ADIRU1
B. ADIRU2
C. ADIRU3
D. ADIRU1或ADIRU3
【单选题】
DDRMI的航向信号来自于___
A. ADIRU1或2
B. ADIRU1或3
C. ADIRU2或3
D. ADIRU1、2或3
【单选题】
DDRMI上的DME窗口显示虚线时,表示___
A. DME故障
B. DME超出范围
C. VOR故障
D. DDRMI故障
【单选题】
DMC1接收哪个RA的高度数据___
A. 仅接收RA1
B. 仅接收RA2
C. RA1,当RA2故障时
D. RA2,当RA1故障时
【单选题】
DME、ATC和TCAS是否可以同时工作___
A. 不能
B. 可以
C. DME工作不受影响
D. TCAS工作不受影响
【单选题】
DME和ATC之间的抑制同轴电缆作用是___
A. 抑制DME工作
B. 抑制ATC工作
C. 当其中一个组件发射时,抑制另一个接收
D. 抑制同时发射和接收
推荐试题
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto