【单选题】
对稳压精度要求高时,应采用___稳压电路。
A. 并联;
B. 串联;
C. 并串联;
D. 串并联;
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
稳压管内阻___,稳压性能越好。
A. 为0;
B. 趋于;
C. 越大;
D. 越小;
【单选题】
逆变整流电路是先把直流逆变成交流,然后再把交流又整流成___的过程。
A. 交流;
B. 直流;
C. 交直流;
D. 脉动直流;
【单选题】
逆变电路的作用是将直流电变成频率可变的或某一固定频率的___。
A. 直流电;
B. 交流电;
C. 高频电源;
D. 低频电源;
【单选题】
逆变电路UPS电源不宜带___负载。
A. 电阻性;
B. 电容性;
C. 电感性;
D. 混合型;
【单选题】
凝汽式发电厂的特点是___。
A. 建设周期短,基建投资较小;
B. 燃料利用总效率较高;
C. 利用电能产生热能向用户供给;
D. 建设在用户附近;
【单选题】
供热式发电厂的特点是___。
A. 建设周期短,基建投资较小;
B. 燃料利用总效率较高;
C. 利用电能产生热能向用户供给;
D. 建设在靠近燃料的产地;
【单选题】
提高输电电压,可以提高___。
A. 电能质量;
B. 输电电流;
C. 功率损耗;
D. 电能损耗;
【单选题】
电力系统是由发电机.___和用电设备组成。
A. 输电线路;
B. 配电线路;
C. 电力变压器;
D. 电力网;
【单选题】
担负着输送电能和分配电能任务的是___。
A. 电力系统;
B. 电力线路;
C. 电力网;
D. 配电网;
【单选题】
电力网是指由___组成的网络。
A. 各电压等级的电力线路;
B. 各电压等级的电力线路和各类变电所;
C. 发电机变压器.输电线路;
D. 一个电压等级的配电线路;
【单选题】
输电网是由___的输电线路和与其相连的变电所组成。
A. 35KV及以下;
B. 35KV及以上;
C. 110KV及以下;
D. 110KV及以上;
【单选题】
1000KV及以上的电力网称为___电力网。
A. 超高压;
B. 特高压;
C. 高压;
D. 中压;
【单选题】
我国电力系统额定频率为 50 Hz,3×10 kW 及以上系统允许频率偏差不超过___。
A. ±5%;
B. ±10%;
C. ±0.2 Hz;
D. ±0.5 Hz;
【单选题】
《全国供用电规则》规定,35 k V 及以上供电系统,电压变换幅度不超过___。
A. ±5%;
B. ±7%;
C. ±0.2 % ;
D. ±10 %;
【单选题】
频率是供电质量标准之一,我国电力系统的额定频率为___。
A. 0.02 s ;
B. 0.2 s;
C. 50 Hz;
D. 60 Hz;
【单选题】
由发电厂.输配电网络及各类电力用户组成的整体称为___。
A. 电力系统;
B. 电力网;
C. 输电线路;
D. 配电网;
【单选题】
发电厂在任何时刻发出的功率必须等于该时刻用电设备所需的功率与输送和分配环节中的___之和。
A. 无功功率;
B. 损失功率;
C. 机械功率;
D. 视在功率;
【单选题】
由输电线路和相连的变电所组成的部分称为___。
A. 电力系统;
B. 电力网;
C. 输电线路;
D. 配电网;
【单选题】
一切不正常的相与相之间或相与地之间的连通统称为___。
A. 短路;
B. 通路;
C. 回路;
D. 断路;
【单选题】
短路电流比正常电流大许多倍,而且会产生___效应,使导体之间产生很大的机械应力。
A. 作用力;
B. 反作用力;
C. 电动力;
D. 扭力;
【单选题】
一相对地之间的短路与电力系统中性点的接地方式___。
A. 有关;
B. 无关;
C. 关系不确定;
D. 关系不大;
【单选题】
电气设备在短路电流电动力的作用下,可发生___变形.瓷件拉坏等破坏作用,使事故进一步扩大。
A. 硬母线;
B. 电气设备;
C. 基础;
D. 构架;
【单选题】
短路持续时间长,可造成并列运行的发电机失去___。
A. 电压;
B. 控制;
C. 同步;
D. 励磁;
【单选题】
三相系统中中间相在三相短路时所受的电动力___。
A. 比两相短路时所受的电动力大;
B. 比两相短路时所受的电动力小;
C. 与两相短路时所受的电动力相同;
D. 无法确定;
【单选题】
短路电流通过电气设备,使设备发热___,持续时间长可使设备过热损坏。
A. 严重;
B. 增加;
C. 减少;
D. 不变;
【单选题】
发生三相金属性短路时,在短路点将产生___,使设备严重损坏。
A. 故障;
B. 电弧;
C. 破坏;
D. 大电流;
【单选题】
下列关于短路电流的发热,___是正确的。
A. 单相接地时发热大;
B. 两相短路时发热大;
C. 三相短路时发热大;
D. 所有短路发热一样大;
【单选题】
系统在最大运行方式下运行时,具有___短路阻抗值。
A. 最小;
B. 最大;
C. 平均;
D. 较大;
【单选题】
系统发生短路后产生的短路电流最大的一种运行方式,称为___运行方式。
A. 最小;
B. 最大;
C. 事故;
D. 正常;
【单选题】
因运行方式改变使阻抗变小,那么短路电流将___
A. 增大;
B. 减小;
C. 不变;
D. 异常;
【单选题】
系统发生短路后产生的短路电流最小的运行方式,称为___运行方式。
A. 最大;
B. 最小;
C. 5E常;
D. 异常;
【单选题】
一般根据系统最小运行方式下的短路电流来校验继电保护装置的___。
A. 可靠性;
B. 选择性;
C. 灵敏性;
D. 返回系数;
【单选题】
根据电力系统运行工作需要而进行的接地称为___。
A. 工作接零;
B. 工作接地;
C. 保护接地;
D. 保护接零;
【单选题】
因工作需要将电气装置和系统的任何一部分与土壤良好接触的电气连接称为___。
A. 接零;
B. 接地;
C. 保护接地;
D. 重复接地;
【单选题】
电气设备外壳保护接地适用于___运行方式。
A. 中性点不接地;
B. 无中性线;
C. 中性点直接接地;
D. 小电流接地;
【单选题】
接零的目的是为了___。
A. 电气设备的正常运行;
B. 防静电;
C. 防雷击;
D. 人身和设备安全;
【单选题】
对于一级负荷,应由___供电,以保证供电持续性。
A. 2个电源;
B. 2段母线;
C. 2个独立电源;
D. 单独电源;
【单选题】
负荷率用来衡量规定时间内___的变动情况,以及考核电气设备的利用程度。
A. 电压;
B. 电流;
C. 负荷;
D. 功率;
【单选题】
采取无功补偿设备调整系统电压时,对系统来说,___。
A. 调整电压的作用不明显;
B. 既补偿了系统的无功功率,又提高了系统的电压;
C. 不起无功功率补偿的作用;
D. 只起调整电压的作用;
【单选题】
用户的端电压降低,原因在于该系统___不足。
A. 电压;
B. 电流;
C. 无功电源;
D. 有功电源;
推荐试题
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator