【填空题】
41.[31621)康明斯发电车中膨胀水箱的水位与散热器排气室的水位是___。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
相平
解析
暂无解析
相关试题
【填空题】
42.[31622)运用客车质量鉴定条件中,发电车交流输油泵失效或直流、手动输油泵同时失效属___故障。
【填空题】
43.[31623)1FC5356发电机的AVR只能___原励磁系统的励磁电流
【填空题】
44.[31624)1FC5发电机当___分流电阻R断路时,可能引起发电机端电压升高到450 V以上。
【填空题】
45.[31625)防止蓄电池长时间大电流放电,当单格电压降至1.8 V或电解液密度降至___时,应重新充电。
【填空题】
46.[31626)发电车启动蓄电池电解液液面应高于极板___,不漏液。
【填空题】
47.[31627)康明斯KTA-19G2柴油机C级保养的时间间隔为___。
【填空题】
48.[31628)冷态气门间隙是在康明斯柴油机___级保养中进行。
【填空题】
49.[31629)康明斯发电车所使用的1FC5356发电机定子绕组高温报警温度为___
【填空题】
50.[31630)康明斯发电车中,当柴油机转速高于___时,将发生超速停机报警保护
【填空题】
51.[31631)康明斯KTA-19G2柴油机中低油压停机报警传感器的接线有___根。
【填空题】
52.[31632)康明斯KTA-19G2柴油机中低水温报警传感器的接线有___根。
【填空题】
53.[31633)在康明斯发电车电气控制电路图中,欠电压脱扣保护整流装置是___
【填空题】
54.[31634)在康明斯发电车电气控制电路图中,过电流保护整流装置是___。
【填空题】
55.[31635)在康明斯发电车电气控制电路图中,合闸整流装置是___。
【填空题】
56.[31636)在康明斯发电车电气原理图的起机电路中,FSV是___元件
【填空题】
57.[31637)零件图中尺寸标注的基准一定是___。
【填空题】
58.[31638)看零件图就是根据现有视图想象出零件的___。
【填空题】
59.[31639)基本偏差为一定的轴的公差带,与不同基本偏差的孔的公差带形成各种配合的一种制度叫___。
【填空题】
60.[31640)基本偏差为一定的孔的公差带,与不同基本偏差的轴的公差带形成各种配合的一种制度叫___。
【填空题】
61.[31641)形位公差的基准代号包括___、圆圈、连线、字母。
【填空题】
62.[31642)形位公差的基准代号包括基准符号、圆圈、连线、___。
【填空题】
63.[31643)中国列车运行控制系统___有两个子系统是车载子系统和___。
【填空题】
64.[31644)铁路信息技术一类设备包括服务器端设备、___和不间断运行的客户端设备。
【填空题】
65.[31645)地对车车辆运行安全监控体系对客车运行进行监控的是THDS和___。
【填空题】
66.[31646)康明斯发电车中并车电路中采用___同步指示灯。
【填空题】
67.[31647)配备KTA-19G2柴油机的康明斯发电车并车时可输出电功率最大为___。
【填空题】
68.[31648)康明斯发电车中并车所采用的方法为___。
【填空题】
69.[31649)发电机准同期法并车时常采用灯光并列法,康明斯发电车中采用___。
【填空题】
70.[31650)康明斯发电车中实际控制电源电压为直流电的断路器是___。
【填空题】
71.[31651)低压断路器中的电磁脱扣承担___保护作用。
【填空题】
72.[31652)康明斯发电车所使用的1FC5356发电机由主发电机、励磁机和___组成。
【填空题】
73.[31653)康明斯发电车所使用的1FC5356发电机采用可控相复励,其励磁电流由电压和电流两个分量合成,其中电压分量和电流分量分别由电抗器和___提供。
【填空题】
74.[31654)机械图中,比例1:2属于___比例。
【填空题】
75.[31655)康明斯KTA-19G2柴油机中油温传感器的接线有___。
【填空题】
76.[31656)运用客车质量鉴定条件中,发电车油温、水温不符合规定属___故障。
【填空题】
77.[31657)康明斯发电车柴油机中,油压传感器是采用___传感器。
【填空题】
78.[31658)康明斯KTA-19G2柴油机中低油压预报警传感器的接线有___。
【填空题】
79.[31659)康明斯发电车所使用的1FC5356发电机定子绕组高温报警感温元件采用___。
【填空题】
80.[31660)康明斯发电车所使用的1FC5356发电机定子绕组高温报警温度为___。
【填空题】
81.[31661)康明斯KTA-19G2柴油机中高水温预报警传感器的接线有___。
推荐试题
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance