【单选题】
空调客车的空调温控器夏季应设定为___。
A. 18~22 ℃
B. 22~26 ℃
C. 24~28 ℃
D. 26~30 ℃
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
当空调客车的环境温度低于___时,严禁开启空调设备制冷。
A. 15 ℃
B. 16 ℃
C. 17 ℃
D. 18 ℃
【单选题】
当空调客车的环境温度低于___时,须开启电伴热装置。
A. 0 ℃
B. 3 ℃
C. 5 ℃
D. 10 ℃
【单选题】
TFX1型防滑器故障代码为“••”表示___。
A. 第一轴速度传感器故障
B. 第二轴速度传感器故障
C. 第三轴速度传感器故障
D. 系统已全部失去防滑保护作用
【单选题】
BSP客车充电机无充电电流的原因可能是___。
A. 充电支路熔断器RD2(RL8-20 A)芯断
B. 充电机控制板上个别电子元器件坏
C. 蓄电池箱内的温度传感器坏
D. ABC三项都可能
【单选题】
KP-2A控制箱限流充电回路的作用是当充电电流过大时,降低发电机的___,达到将充电电流限制在一定范围内的目的。
A. 输出端电流
B. 输出功率
C. 锯齿波电压
D. CW1两端电压
【单选题】
25K型空调客车电源控制柜分___和控制回路两部分。
A. 照明回路
B. 空调回路
C. 主回路
D. 显示回路
【单选题】
25G型空调客车电源控制柜主回路电源为三相交流___,50 Hz。
A. 380 V
B. 220 V
C. 110 V
D. 600 V
【单选题】
25G型空调客车电源控制柜控制回路电源为___220 V,50 Hz。
A. 三相交流
B. 恒定直流
C. 单相交流
D. 脉动直流
【单选题】
在全列空调客车中,直流负载可分为一般直流负载和___两类。
A. 应急负载
B. 特殊直流负载
C. 重点直流负载
D. 蓄电池充电负载
【单选题】
统型应急电源控制系统的蓄电池过充电保护电压整定值为___。
A. 50~52 V/54~56 V
B. 58 V/64 V
C. 54~56 V/58~60 V
D. 48 V /46 V
【单选题】
两台35 kV•A逆变器___。
A. 互为正连锁
B. 互相热备份
C. 互为反连锁
D. 互相支援
【单选题】
统型应急电源的整流模块U2输出48 V直流电,经电感器L2、电容器C101___ 后,向外输出48V直流电源。
A. 限压
B. 振荡
C. 逆变
D. 滤波
【单选题】
统型应急电源控制箱合闸时,空气断路器跳闸,说明有短路现象,应检查负载、___、输出电容是否短路。
A. 整流模块U2
B. 整流变压器
C. 接触器KM
D. 控制按钮
【单选题】
他励直流发电机的外特性是指在额定励磁电流下,负载电流变化时___的变化规律。
A. 端电压
B. 电源电压
C. 定子绕组两端电压
D. 以上说法均不对
【单选题】
转子的不平衡量,可用___表示。
A. 偏心距
B. 重径积
C. 平衡精度
D. 偏心距,重径积和平衡精度
【单选题】
为了提高制冷效果,应该把毛细管靠近冷凝器的一段锡焊在吸气管上,以保证两管间的___能良好地进行。
A. 物质
B. 热交换
C. 冷
D. 汽液
【单选题】
在毛细管的入口部分,应装设200目左右的过滤网,以防止在运用中被系统内___堵塞。
A. 油
B. 水
C. 污垢
D. 冰
【单选题】
MS730CP6C塞拉门是高速旅客列车使用的系列化外摆塞拉门,___之分。
A. 无左右
B. 有左右
C. 有上下
D. 无上下
【单选题】
MS730CP6C塞拉门是高速旅客列车使用的系列化外摆塞拉门,驱动方式为___。
A. 气动
B. 电动
C. 手动
D. 自动
【单选题】
单相逆变器的作用是将DC 110 V的输入变换成单相___输出,供给单相负载使用。
A. DC 48 V
B. DC 110 V
C. AC 220 V/50 Hz
D. DC 600 V
【单选题】
空调客车的空调温控器冬季应设定为___。
A. 14~16 ℃
B. 16~18 ℃
C. 18~20 ℃
D. 20~22℃
【单选题】
TCP4-008/600(L)型DC 110 V充电机微机板指示灯具有一定的含义:如果VL0灭,VL5亮,表示___。
A. IGBT保护
B. 变压器原边过流
C. 系统过热
D. 接触器KM2故障
【单选题】
列车整备原则上应使用外接电源供电,用电时间一般不超过___。
A. 1 h
B. 2 h
C. 3 h
D. 4 h
【单选题】
正常情况下,逆变器、充电器带电电路对地绝缘电阻须大于___。
A. 5 M
B. 10 M
C. 20 M
D. 15 M
【单选题】
使用手提式风钻、电钻,操作时站立位置要适当,钻孔高度不得超过工作者___,不得用力过猛。
A. 头部
B. 肩部
C. 腰部
D. 腿部
【单选题】
快达KD-3型电开水炉的9号电极一旦发生开路时会造成___。
A. 保温发热管无法正常工作
B. 开水炉持续工作不停止
C. 开水炉停止工作
D. 电磁阀不能正常进水
【单选题】
安装功率表时,必须保证电流线圈、电压线圈分别与负载相___。
A. 串联
B. 并联
C. 串联,并联
D. 并联,串联
【单选题】
运用客车中集便装置中污物箱的真空度为___。
A. -55~-39 kPa
B. -45~-29 kPa
C. -35~-19 kPa
D. -25~-9 kPa
【单选题】
运用客车中集便装置中真空便器中冲水装置须作用良好,冲水时间约___。
A. 1~2 s
B. 2~3 s
C. 3~4 s
D. 4~5
【单选题】
运用客车中轴温报警器同车同侧轴温显示温差不超过___
A. 2 ℃
B. 3 ℃
C. 4 ℃
D. 5℃
【单选题】
TCP4-008/600___型DC 110 V充电机弱电试验:给充电机提供( )电源,充电机模块开始自检,稍后VL0,VL2和VL5点亮,模块内风机开始工作,表明充电机自检正常。
A. DC 110 V
B. DC 48 V
C. AC 220 V
D. AC 380 V
【单选题】
TCP4-008/600___型DC 110 V充电机空载试验:系统接入( )电源,充电机开始启动工作,待输出稳定后测量输出电压为121 V±1 V。
A. DC 110 V
B. DC 600 V
C. AC 220 V
D. AC 330 V
【单选题】
TCP4-008/600___型DC 110 V充电机重载试验:给充电机带上( )标称负载,充电机能正常工作。
A. 2 kW
B. 3 kW
C. 5 kW
D. 8 kW
【单选题】
J5型发电机的电枢绕组(又称工作绕组)的作用是产生___并向机外输出电能。
A. 感应电流
B. 感应电势
C. 感应电压
D. 感应磁场
【单选题】
J5型发电机的___共有12个线圈。
A. 激磁绕组
B. 定子铁芯上
C. 电枢绕组
D. 转子铁芯
【单选题】
KP-2A控制箱触发器回路的主要元件CW1的作用是在电路中起___作用。
A. 稳压输出
B. 电源电压
C. 电压比较
D. 工作电压
【单选题】
在客车A1级检修时,应急电源电池电压低于___时,欠压保护须起作用。
A. 40 V±1 V
B. 42 V±1 V
C. 44 V±1 V
D. 45 V±1 V
【单选题】
981型应急电源当交流断电时,电池在应急控制系统的控制下向轴温报警装置、应急灯、___等需应急工作的直流负载供电。
A. 信息显示屏
B. 电茶炉
C. 尾灯插座
D. 客室照明
【单选题】
同一组蓄电池中各个蓄电池的容量互差不得超过___。
A. 5%
B. 10%
C. 15%
D. 20%
【判断题】
最高运行速度160 km/h及以上的客车应采用密接式车钩,安装客车行车安全监测系统。
A. 对
B. 错
推荐试题
【填空题】
47.中国人民解放军海军成立于___年。
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC