【判断题】
若某种离子容易与树脂结合,则也容易被置换下来。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【判断题】
只需监督混床出水电导率,就可控制混床的失效点。
A. 对
B. 错
【判断题】
再生三要素是再生时间、再生流速、再生浓度。
A. 对
B. 错
【判断题】
化学平衡时,如果增加反应物的浓度,可以破坏它的平衡。
A. 对
B. 错
【判断题】
在标准状况下,每摩尔的任何气体的体积都是22.4升。
A. 对
B. 错
【判断题】
盐酸能和金属氧化物反应生成盐和水。
A. 对
B. 错
【判断题】
提高水温,可以降低氧气在水中的溶解量。
A. 对
B. 错
【判断题】
电导率能判断水的纯度。
A. 对
B. 错
【判断题】
切换水泵时,应先启动备用泵,运行正常后,再停欲停水泵,然后调节负荷至所需。
A. 对
B. 错
【判断题】
为提高低温水的混凝效果常用的方法是增大加药量和投加高分子助凝剂。
A. 对
B. 错
【判断题】
一级离子交换除盐系统的单元制是指将一个H型交换器,一个除碳器和一个OH型交换器串联在一起,组成一个独立的运行系统。
A. 对
B. 错
【判断题】
采用逆流再生的离子交换器再生后,底层交换剂的含Na量对出水水质起着决定性的作用。
A. 对
B. 错
【判断题】
逆流再生工艺是指运行时,水流向下流动,再生时再生液向上,流动的对流水处理工艺。
A. 对
B. 错
【判断题】
混合床可以看作是由许许多多阴、阳树脂交错排列而组成的多级式复床。
A. 对
B. 错
【判断题】
混床反洗分层的目的,就是将运行中造成的破碎与正常颗粒的树脂完全分开,以防影响再生效果。
A. 对
B. 错
【判断题】
鼓风除碳器的作用是使水中的CO2随吹过的空气排入大气。
A. 对
B. 错
【判断题】
除碳器的设置对阳床除硅有利。
A. 对
B. 错
【判断题】
试车调试坚持高标准、严要求,做到“四不开车”(条件不具备不开车、程序不清楚不开车、指挥不在场不开车、出现问题不解决不开车),确保试车安全。
A. 对
B. 错
【判断题】
坚持“早试车、早投产”的原则,首先是工艺装置开工,其后确保安全环保设施尽早开工,这是试车工作的指导思想。
A. 对
B. 错
【判断题】
调试前冲洗设备时,冲洗管段,特别是出水口的工作情况,做好排水工作,并派人检查排水路线,有问题及时处理。
A. 对
B. 错
【判断题】
酸雾吸收器的作用是节约用酸,回收利用。
A. 对
B. 错
【判断题】
树脂的离子交换速度主要取决于离子间的化学反应速度。
A. 对
B. 错
【判断题】
树脂颗粒的大小,对水处理工艺过程有较大影响。
A. 对
B. 错
【判断题】
使用化学仪表在测量过程中,偶然误差是不可避免的,也难以控制,只有增加平行测定次数,才能使其测定的平均值比较真实的接近真实值。
A. 对
B. 错
【判断题】
树脂变质后,可通过复苏处理恢复树脂的交换能力。
A. 对
B. 错
【判断题】
阴阳浮床再生时,需将树脂移到树脂清洗罐中再生。
A. 对
B. 错
【判断题】
再生剂浓度的大小是通过自用水流量来调节的。
A. 对
B. 错
【判断题】
电动机空载启动和带负载启动,启动电流是不一样的。
A. 对
B. 错
【判断题】
混床失效时,出水的电导率和二氧化硅含量同时升高。
A. 对
B. 错
【判断题】
混床反洗分层时流量越大分层越明显。
A. 对
B. 错
【判断题】
对锅炉化学清洗评价,主要是根据测定金属的腐蚀速度,钝化膜的质量和机组启动后的水汽质量。
A. 对
B. 错
【判断题】
法兰连接中,垫片的主要作用是保护法兰。
A. 对
B. 错
【判断题】
一般来说,树脂的颗粒越小,交换反应速度越快,但压力损失相应增大。
A. 对
B. 错
【填空题】
1.化学水处理站设备规模为___,设备最大产水量是___。
【填空题】
2.凝结水处理站规模:透平凝结水处理___,工艺凝结水处理___。
【填空题】
3.酸碱罐区设___台浓度为___的容积为___的盐酸储罐,___台浓度为___的容积为___的液碱储罐。
【填空题】
4.原水经___去除水中大部分___等杂质,保证出水满足阳床进水要求。
【填空题】
5.阳床出水进入___,除去水中溶解二氧化碳后,由___送至阴床。
【填空题】
6.凝结水处理站处理的凝结水主要来源于各装置___后和___所产生的凝结水。
【填空题】
7.古雷锅炉给水水质指标:pH___,二氧化硅≤___,电导率≤___。
【填空题】
8.古雷中和池废水pH排放标准为:___。
推荐试题
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing