【多选题】
下面关于测量误差的说法正确的是___。
A. 测量误差是客观存在,不可避免的
B. 偶然误差无明显规律,但有其自身的特性
C. 增加测量次数可降低偶然误差的影响
D. 偶然误差服从一定的统计规律
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCD
解析
暂无解析
相关试题
【多选题】
保护煤柱主要留设方法有___两种。
A. 垂线法
B. 垂直断面法 、C经验法 D、作图法
【多选题】
《煤矿测量规程》中的“三下”采煤指的是___的采煤。
A. 公路下
B. 建筑物下
C. 水体下
D. 铁路下
【多选题】
地表移动全过程通常分为___三个阶段。
A. 初始期
B. 稳定期
C. 活跃期
D. 衰减期
【多选题】
经纬仪“三轴”误差指的是___。
A. 视准轴误差
B. 水平轴误差
C. 竖轴误差
D. 水准管轴误差
【多选题】
下面关于地表等高线的说法正确的有___。
A. 同一条等高线上各点的高程相等
B. 等高线不相交、不重合、不分岔
C. 等高线与山脊线正交时凸向高处,与山谷线正交时凸向低处
D. 在等高距相同的情况下,等高线平距大的地方坡度缓
【多选题】
井下基本控制导线按测角精度分为___两级。
A. ±7"
B. ±5"
C. ±15"
D. ±10"
【多选题】
测量工作的基本原则是___。
A. 高级到低级
B. 先碎部后控制
C. 由整体到局部
D. 先控制后碎部
【多选题】
井下测角误差主要来源于___。
A. 仪器误差
B. 测角方法
C. 对中误差
D. 允许误差
【多选题】
矿井平面联系测量的主要任务是___。
A. 实现井上下平面坐标系统的统一
B. 实现井上下高程的统一
C. 作为井下基本平面控制
D. 提高井下导线测量的精度
【多选题】
井下碎部测量可采用___进行。
A. 钢丝法
B. 交会法
C. 极坐标法
D. 支距法
【多选题】
重要测量工程包括___。
A. 井田加密控制测量
B. 井田区域地形测量
C. 矿井联系测量
D. 重要贯通测量(指两井间、或导线长度大于3000m、或贯通点在主要运输平巷和主要上下山的贯通测量)
【多选题】
测量观测应选择在___进行。
A. 成像清晰
B. 仪器稳定
C. 环境嘈杂
D. 通视良好、
【多选题】
《防范煤矿采掘接续紧张暂行办法》规定,有下列情况___之一的,不得计算为回采煤量。
A. 所圈定的回采范围内瓦斯抽采不达标
B. 未按照规定进行抽采达标评判的煤量
C. 所圈定的回采范围内水害防治不达标
D. 未按照规定进行水害防治效果验证的煤量
【多选题】
确定地面点的三要素是指___。
A. 水平角
B. 高程
C. 水平距离
D. 点位精度
【多选题】
测量工作的基本内容包括___。
A. 角度测量
B. 方位角确定
C. 距离测量
D. 高差测量
【多选题】
井下基本控制导线的测角中误差一般为___。
A. 5″
B. 7″
C. 10″
D. 15″
【多选题】
经纬仪应满足___哪些主要几何条件。
A. 水准管轴应垂直于垂直轴
B. 视准轴垂直于水平轴
C. 水平轴应垂直于垂直轴
D. 十字丝竖丝应垂直于水平轴
【多选题】
陀螺仪有___部件组成。
A. 摆动系统
B. 光学观测系统
C. 锁紧限幅机构
D. 外壳
【多选题】
等高线有___等几种形式。
A. 首曲线
B. 计曲线
C. 间曲线
D. 助曲线
【多选题】
下列属于等高线的特征___。
A. 同一条等高线上各点的高程相等
B. 是闭合曲线,若不在本幅图闭合,则必然在相邻的其它图幅内闭合,它不能在图中突然断开
C. 等高线不相交,而重合分岔
D. 等高距相同的情况下,平距大的一地方坡度缓,平距小的地方则坡度大,平距相等时坡度相等
【多选题】
测角方法误差包括___。
A. 照准误差
B. 读数误差
C. 对中误差
D. 整平误差
【多选题】
观测站通常分为三种___。
A. 地表观测站
B. 岩层内部观测站
C. 专门观测站
D. 临时观测站
【多选题】
经纬仪的读数方法有___种。
A. 游标读数法
B. 分划尺读数法
C. 指标线平分读数法
D. 分划线符合读数法
【多选题】
偶然误差有以下几个特性:___。
A. 定的观测条件下,偶然误差的绝对值不会超过一定的限值
B. 值较小的误差比绝对值较大的误差出现的机会多
C. 值相等的正误差与负误差出现的机会相等
D. 误差的算术平均值,随着观测次数的无限增加趋向于零
【多选题】
煤炭企业、煤矿应当结合本单位实际情况建立健全___、探放水制度、重大水患停产撤人制度以及应急处置制度等。
A. 水害防治岗位责任制
B. 水害防治技术管理制度
C. 水害预测预报制度
D. 水害隐患排查治理制度
【多选题】
下列选项中___属于矿井应当建立的防治水基础台账。
A. 矿井涌水量观测成果台账
B. 矿井突水点台账
C. 封孔不良钻孔资料台账
D. 矿井和周边煤矿采空区相关资料台账
【多选题】
建设矿井应当编制下列主要成果及图件:___。
A. 水文地质观测台账和成果
B. 突水点台账,防治水的技术总结,注浆堵水记录和有关资料
C. 井筒及主要巷道水文地质实测剖面
D. 建井地质报告,应当包含防治水的相关内容
【多选题】
矿井涌水量观测可以采用___等测量方法,测量工具和仪表应当定期校验。
A. 容积法
B. 堰测法
C. 浮标法
D. 流速仪法
【多选题】
井下水文地质补充勘探应当采用井下___、测试等综合勘探方法,针对井下特殊作业环境,采取可靠的安全技术措施。
A. 钻探
B. 物探
C. 化探
D. 监测
【多选题】
井下物探采用电法实施掘进工作面超前探测的,探测环境应当符合下列要求:___。
A. 巷道断面、长度满足探测所需要的空间
B. 距探测点20m范围内不得有积水
C. 不得存放掘进机、铁轨、皮带机架、锚网、锚杆等金属物体
D. 巷道内动力电缆、大型机电设备必须停电
【多选题】
煤层内,原则上禁止探放水压高于1MPa的___等。如确实需要的,可以先构筑防水闸墙,并在闸墙外向内探放水。
A. 充水断层水
B. 含水层水
C. 陷落柱水
D. 老空水
【多选题】
钻孔放水前,应当估计积水量,并根据排水能力和水仓容量,控制放水流量,防止淹井淹面 放水时,应当设有专人监测钻孔出水情况,测定___,做好记录。如果水量突然变化,应当分析原因,及时处理,并立即报告矿井调度室。
A. 水温
B. 水量
C. 水压
D. 水头高度
【多选题】
煤矿必须落实防治水的主体责任,推进防治水工作由过程治理向源头预防___。
A. 局部治理向区域治理
B. 井下治理向井上下结合治理
C. 措施防范向工程治理
D. 治水为主向治保结合的转变
【多选题】
煤矿主要负责人必须赋予___等相关人员紧急撤人的权力,发现突水(透水、溃水,下同)征兆、极端天气可能导致淹井等重大险情,立即撤出所有受水患威胁地点的人员。
A. 调度员
B. 安检员
C. 井下带班人员
D. 职工
【多选题】
 矿井应当建立水文地质信息管理系统,实现矿井水文地质文字资料收集、___、水害预测预报一体化。
A. 数据采集
B. 台账编制
C. 图件绘制
D. 计算评价
【多选题】
矿井水文地质补充勘探应当针对具体问题合理选择勘查技术、方法,井田外区域以遥感水文地质测绘等为主,井田内以___、试验、实验及长期动态观(监)测等为主,进行综合勘查。
A. 水文地质物探
B. 钻探
C. 化探
D. 超前探
【多选题】
矿井应当建立水文地质信息管理系统,实现矿井水文地质___、计算评价和水害预测预报一体化。
A. 文字资料收集
B. 数据采集
C. 台账编制
D. 图件绘制
【多选题】
煤矿应当建立暴雨洪水可能引发淹井等事故灾害紧急情况下及时撤出井下人员的制度,明确启动标准及___等。
A. 指挥部门
B. 联络人员
C. 撤人程序
D. 撤退路线
【多选题】
底板水防治应当根据矿井实际,采取___等防治水措施,消除水害威胁。
A. 地面区域治理
B. 井下注浆加固底板或者改造含水层
C. 疏水降压
D. 充填开采
【多选题】
煤矿应当根据老空水查明程度和防治措施落实到位程度,对受老空水影响的煤层按威胁程度分为___
A. 可采区
B. 缓采区
C. 禁采区
D. 威胁区
推荐试题
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall