【判断题】
一般地,液体的粘度随温度的升高而降低
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
气体物质的溶解度一般随温度升高而减小
A. 对
B. 错
【判断题】
在单质分子中,元素的化合价为零
A. 对
B. 错
【判断题】
裂解反应温度越高,反应越容易进行,裂解深度也越高,因而乙烯收率越高
A. 对
B. 错
【判断题】
二次注汽是解决重质原料干点温度高于该原料裂解温度的问题,防止原料在对流段预热则结焦
A. 对
B. 错
【判断题】
离心泵调节进口流量容易造成气蚀而损坏泵
A. 对
B. 错
【判断题】
裂解炉的一次注汽量实际值=总量×60% .
A. 对
B. 错
【判断题】
柴油炉形成的焦相对松软小片状,乙烷裂介炉形成的焦解非常硬成块状.
A. 对
B. 错
【判断题】
燃料总管系统波动,不会对结焦造成较大的影响
A. 对
B. 错
【判断题】
裂解炉检修时不进炉膛检修燃料气火咀不用置换
A. 对
B. 错
【判断题】
裂解炉发生SD-2跳车,应打开挡板防止炉膛超温,放出热量
A. 对
B. 错
【判断题】
清焦时必须保证锅炉给水的最低流量
A. 对
B. 错
【判断题】
急冷水乳化后可以通过置换来解决
A. 对
B. 错
【判断题】
影响气油干点的最主要原因是急冷油塔的顶温
A. 对
B. 错
【判断题】
设备在爆炸的同时,必定会产生新物质
A. 对
B. 错
【判断题】
可燃物质在空气中的含量高于爆炸上限时,不会爆炸,但可能燃烧
A. 对
B. 错
【判断题】
烷烃对热的稳定性,随着分子量的增加而升高.
A. 对
B. 错
【判断题】
一般地,当裂解条件一定时,乙烷裂解的乙烯产率最高,随着C原子数地增加,乙烯收率逐惭降低
A. 对
B. 错
【判断题】
裂解原料在裂解炉管中停留时间越长,则反应越充分,乙烯收率越高
A. 对
B. 错
【判断题】
芳烃在裂解反应中不易发生开环反应,而易发生侧链断链反应
A. 对
B. 错
【判断题】
均匀调节系统与串级调节系统在形式上,控制目的上是一样的
A. 对
B. 错
【判断题】
回流比就是指回流量与塔顶馏出物的量之比
A. 对
B. 错
【判断题】
48U型炉的稀释蒸汽总量等于一次注汽量加上二次注汽量
A. 对
B. 错
【单选题】
风险单位的特点是___
A. 依赖性
B. 不同分布
C. 独立性
D. 单一性
【单选题】
估计一幢建筑物遭受火灾所致财产损失,责任损失和人员损失的损失频率是___
A. 一个风险单位遭受单一损失原因所致单一损失形态的损失频率
B. 一个风险单位遭受多种损失原因所致单一损失形态的损失频率
C. 一个风险单位遭受单一损失原因所致多种损失形态的损失频率
D. 多个风险单位遭受多种损失原因所致多种损失形态的损失频率
【单选题】
估计损失程度时不需要考虑的因素是___
A. 多个损失原因所致的各种损失后果
B. 一个损失原因所涉及的风险单位数
C. 同一损失原因所致的各种损失形态
D. 损失的时间性及损失金额
【单选题】
风险必须是纯粹风险,这是指___
A. 只有损失机会,而无获利可能
B. 风险必须具有可预测性
C. 风险的发生有致重大损失的可能性
D. 风险是否发生是不确定的
【单选题】
下列说法中不正确的是___
A. 保险具有“一人为众,众为一人”的互助特性
B. 保险的分摊损失补偿功能是靠建立保险基金来实现的
C. 保险是通过基金的方式将风险转嫁给保险人
D. 风险的客观存在是保险产生和存在的自然前提
【单选题】
关于理想的可保风险必须具备的条件,下列说法错误的是___
A. 风险是纯粹的
B. 风险具有一定的确定性
C. 风险有导致重大损失的可能
D. 风险具有现实的可测性
【单选题】
___分类是保险公司根据自身业务发展需要,按经营业务的重点,业务量,保险公司现有规模或保险市场需求状况等标准来对保险进行的分类
A. 保险的理论
B. 保险的实用
C. 保险的法律
D. 保险的经济
【单选题】
重复保险容易引发道德风险,这主要是因为___
A. 重复保险将可保风险进行了第二次转移
B. 重复保险将可保风险进行了纵向转移
C. 重复保险的保险金额总和超过了保险价值
D. 重复保险签订了两份以上的保险合同
【单选题】
对于___合同来说,保险利益在订立保险合同时必须存在,否则,保险合同无效
A. 财产保险
B. 意外损失保险
C. 人身保险
D. 责任保险
【单选题】
以下属于逆选择的情况是___。
A. 损失概率低于平均水平的人急于购买保险
B. 低收入阶层的人急于购买保险
C. 损失概率高于平均水平的人急于购买保险
D. 高收入阶层的人急于购买保险
【单选题】
下列关于保险利益的继承的说法中,错误的是___
A. 财产保险的投保人或被保险人死亡,其继承人自动获得继承财产的保险利益
B. 在人身保险中,被保险人死亡时,如属死亡保险,保险合同终止
C. 如果是以他人为被保险人的保险合同,投保人死亡的,其保险利益应当转给继承人
D. 如果是以他人为被保险人的保险合同,投保人死亡的,若对被保险人的利益专属投保人享有的,不能转移
【单选题】
我国《保险法》对保险人的说明义务采取的是___原则,在违反如实告知义务的主观要件上采取的是()原则
A. 严格责任,过失责任
B. 公平责任,过失责任
C. 过错责任,过错责任
D. 严格责任,过错责任
【单选题】
下列关于免除告知的事项,表述错误的是___
A. 任何降低风险的情况
B. 保险人在通常的业务活动中应当知道的情况
C. 经保险人申明需要告知的情况
D. 任何与默示或者明示担保条款重叠的情况
【单选题】
损失补偿的范围不包括___
A. 保险标的的实际损失
B. 合理费用
C. 其他费用
D. 预计损失
【单选题】
投保要约应自___起开始生效
A. 到达保险人时
B. 签订保险单
C. 首次交付保险费
D. 填写投保书
【单选题】
根据我国《保险法》的规定,如果保险合同未约定保险费交付地点,保险费应在___所在地交付
A. 保险人
B. 投保人
C. 被保险人
D. 受益人
【单选题】
在财产保险合同中,保险人要履行的义务不包括___
A. 支付保险赔偿金
B. 支付一切勘查费用
C. 支付诉讼费用
D. 支付施救费用
【单选题】
保险合同不因___而终止
A. 保险合同解除
B. 保险合同变更
C. 保险合同期限届满
D. 保险合同得到履行
推荐试题
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC