【判断题】
制度管理是一个企业走向现代化的基础工程。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
企业文化的中心工作是帮助员工实现从社会人向企业人的角色转变。
A. 对
B. 错
【填空题】
1 公司的三条红线是:___、质量、环保
【填空题】
2 公司的企业价值观:共享成功 ___
【填空题】
3 公司的企业愿景:创行业标杆 ___
【填空题】
4 公司的企业精神:___创新求实
【填空题】
5 公司的企业使命:___共享未来
【填空题】
6 公司的核心理念:愚公移山 ___
【单选题】
铁在电积过程发生的反应有___
A. 氧化反应
B. 置换反应
C. 催化反应
D. 水解反应
【单选题】
按照国标规定,0#锌中镉含量应控制在___范围内。
A. 0.001%
B. 0.0015%
C. 0.002%
D. 0.0005%
【单选题】
以下不是锌电解液中的锰离子存在的价态的是___
A. +2价
B. +4价
C. +7价
D. +5价
【单选题】
锌电解新液成分中, Fe一般控制范围是___g/L。
A. Fe≤0.002
B. Fe≤0.02
C. Fe≤0.0002
D. Fe≤0.03
【单选题】
Pb-Ag两元合金阳极板,含Ag一般在___。
A. 0.2%-0.7%
B. 0.5%-0.9%
C. 0.6%-1%
D. 0.9%~l%
【单选题】
出装槽过程中有时因为烧板而发生“放炮”现象,放炮是( )反应产生的爆炸声音。___
A. 氧气与氢气反应
B. 氢气与酸雾反应
C. 电火花与酸雾反应
D. 氧气与酸雾反应
【单选题】
在一个供电系统中,列与列、槽与槽之间是 电路,而每个电解槽内的阴阳极则构成 电路。___
A. 串联、串联
B. 串联、并联
C. 并联、串联
D. 并联、并联
【单选题】
下列不属于电解槽上操作的“把四关”是___。
A. 导电关
B. 检查关
C. 添加剂关
D. 流量关
【单选题】
下列不属于提高电流效率途径的是___
A. 相对稳定的锌、酸含量
B. 合理使用添加剂
C. 消除或减少漏电损失
D. 控制适当高的电解液温度
【单选题】
在PH值为( )时,Zn2SO4会发生水解沉淀。___
A. 0.5-1.0
B. 4.8-5.2
C. 5.4-5.6
D. 5.2-5.4
【单选题】
根据生产经验,我们一般判断有机物烧板主要体现在析出锌的___。
A. 上半部
B. 下半部
C. 中间部位
D. 析出线和上半部
【单选题】
锌皮码垛高度要求是___
A. 800mm
B. 900mm
C. 850mm
D. 视情况而定
【单选题】
阳极泥中的锰主要是___形态存在的。
A. +2价
B. +4价
C. +5价
D. +7价
【单选题】
净液工段使用( )置换液体中的杂质,达到除杂的目的。___
A. 锑盐
B. 锑白
C. 锌粉
D. 黄药
【单选题】
阳极泥中含有多种有价金属,其中下列哪种金属含量最少___。
A. Ca
B. Pb
C. Ag
D. Au
【单选题】
电解液中比锌具有更负电性的金属离子是___。
A. Ge
B. Ni
C. As
D. Mg
【单选题】
锌电解废液含酸偏高,对浸出直接的影响有___
A. 中上清跑混
B. 加大了浓硫酸的使用量
C. 加大了投料量
D. 废液消耗不下
【单选题】
氢的超电压受( )因素影响。___
A. 电流密度
B. 阳极板平整度
C. 吐酒石的加入
D. 析出周期的长短
【单选题】
锌电解生产中的技术经济指标主要包括:( )、直流电单耗、阴极板单耗、阳极板单耗、碳酸锶单耗、骨胶单耗等。___
A. 槽电压
B. 交流单耗
C. 漏电量
D. 电流效率
【单选题】
电解液中的( )、镁、锰和碱金属的盐类及硅胶等,将增大电解液的电阻。___
A. Mg
B.
C. a C Fe
D. K
【单选题】
锌皮熔铸过程中,炉内没有以下那种气体?___
A. C0
B. 02
C. H2
D. Cl2
【单选题】
以下不是“设备使用者的“三好”要求”。___
A. 管好设备
B. 检查好设备
C. 修好设备
D. 用好设备
【单选题】
以下不是熔铸锌金属熔化后通常发生的反应:___
A. Zn+1/202=ZnO
B. Zn+H20=ZnO+H2
C. C+02 = C02
D. Zn+C02=ZnO+C
【单选题】
以下不是净化方法的是:___
A. 锌粉-锑盐法
B. 锌粉-黄药法
C. 锌粉-砷盐法
D. 以上均不是
【单选题】
使用灭火器扑救火灾时要对准火焰()喷射。 ___
A. 上部
B. 中部
C. 根部
【单选题】
锗烧板由背面往表面烧,形成黑色圆环,严重时形成大面积___。
A. 针状小孔
B. 圆形小孔
C. 葫芦瓢形孔
【单选题】
视析出锌含铅情况,应加入 ___。
A. 碳酸锶
B. 骨胶
C. 吐酒石
【单选题】
___是人体摄入生产性毒物的最主要、最危险的途径。
A. 呼吸道
B. 消化道
C. 皮肤
D. 眼睛
【单选题】
正常情况下新液与废液的混合比是___
A. 1:5
B. 1:8
C. 1:10
D. 1:18
【单选题】
在正式电解前阳极必须经过低温镀膜,镀膜温度为___
A. 20℃-30℃
B. 25℃-30℃
C. 25℃-35℃
【单选题】
使析出锌易于剥离的添加剂为___。
A. 吐酒石
B. 氯化铵
C. 动物胶
【单选题】
降低PbshO4溶液中Pb2+浓度,减少析出锌的含铅量的添加剂为___
A. 苯酚
B. 碳酸锶
C. 骨胶
D. 甲酚
【单选题】
对析出锌的表面质量及电流效率影响不大的杂质是___。
A. 铜
B. 钴
C. 铝
推荐试题
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering