【多选题】
钻井工程设计应根据钻井地质设计提供的资料,并参考邻井实钻资料,考虑___井控装备配套以及钻进作业方式等因素,综合确定泥浆的密度。
A. 地层压力预测精度
B. 油气水层的埋藏深度
C. 地层油气水中H2S的含量、地应力
D. 地层破裂压力
E. 地层漏失压力
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCDE
解析
暂无解析
相关试题
【多选题】
对于硬脆性地层,岩石的剪切破坏表现为___。
A. 井眼扩大
B. 井壁垮塌
C. 井眼缩径
D. 井眼稳定
E. 不确定
【多选题】
在钻井时,钻井液柱压力的___。
A. 上限要保持与地层压力相平衡
B. 下限则不能超过地层的破裂压力
C. 下限要保持与地层压力相平衡
D. 上限则不能超过地层的破裂压力
E. 上、下限均要与地层压力平衡
【多选题】
钻井液在环空中___等,则环空流动阻力越大。
A. 上返速度越大
B. 井越深
C. 井眼越不规则
D. 环空间隙越小
E. 且钻井液密度、切力越高
【多选题】
循环压力损失的大小取决于___等因素。
A. 钻柱长度
B. 钻井液密度
C. 钻井液粘度、切力
D. 排量
E. 流通面积
【多选题】
波动压力包括___。
A. 静液压力
B. 地层压力
C. 激动压力
D. 抽吸压力
E. 地层破裂压力
【多选题】
起管柱时,井底压力等于___之差。
A. 静液压力
B. 环空压耗
C. 套压
D. 立压
E. 抽汲压力
【多选题】
影响井底压力的因素有___。
A. 静液压力
B. 地面回压
C. 环空压耗
D. 地层压力
E. 地层破裂压力
【多选题】
节流循环时,井底压力等于___。
A. 静液压力
B. 地面回压
C. 环空压耗
D. 地层压力
E. 抽汲压力
【多选题】
正常循环时,井底压力等于___之和。
A. 静液压力
B. 环空压耗
C. 套压
D. 立压
E. 抽汲压力
【多选题】
在钻井泵克服环空压耗推动钻井液向上流动时,___也承受了该流动阻力。
A. 井底
B. 井壁
C. 井口
D. 钻柱内
E. 方钻杆
【多选题】
下管柱时,井底压力等于___之和。
A. 静液压力
B. 环空压耗
C. 抽汲压力
D. 激动压力
E. 抽汲压力
【多选题】
溢流关井时,井底压力约等于___之和。
A. 静液压力
B. 环空压耗
C. 地面回压
D. 立压
E. 抽汲压力
【多选题】
能够产生激动压力的工况是___。
A. 起钻
B. 下钻
C. 空井
D. 下套管
E. 接单根
【多选题】
按照井底压差的大小可将井眼压力状况分为___三种情况。
A. 过平衡
B. 欠平衡
C. 平衡
D. 动平衡
E. 静平衡
【多选题】
激动压力和抽汲压力主要受___等因素影响。
A. 管柱结构、尺寸
B. 井身结构与井眼直径
C. 起下钻速度
D. 钻井液密度、粘度、静切力
E. 管柱在井内的实际长度
【多选题】
___之差称为井底压差。
A. 井口压力
B. 井底压力
C. 地层压力
D. 地层破裂压力
E. 抽汲压力
【多选题】
天然气是可压缩性的流体,其体积大小取决于所施加的___。
A. 压力
B. 摩擦力
C. 湿度
D. 温度
E. 密度
【多选题】
在钻开气层的过程中,随着岩石的破碎,岩石孔隙中的天然气被释放出来而侵入钻井液,侵入的天然气量与___成正比。
A. 岩石的孔隙度
B. 井径
C. 机械钻速
D. 气层的厚度
E. 钻井液密度
【多选题】
天然气侵入井内的方式有___等。
A. 岩屑气侵
B. 置换气侵
C. 扩散气侵
D. 气体溢流
E. 抽汲气侵
【多选题】
天然气具有___物化特性,从溢流到井喷的时间间隔短。
A. 密度低
B. 可膨胀
C. 易滑脱
D. 易燃烧
E. 不易爆
【多选题】
如果发生了井侵,要做到___,才能防止井侵质变成井喷。
A. 尽早发现
B. 尽快关井
C. 循环观察
D. 压井
E. 汇报
【多选题】
天然气侵入钻井液,会使钻井液___。
A. 密度下降
B. 密度升高
C. 粘度下降
D. 粘度升高
E. PH值升高
【多选题】
下列___等是溢流的其他原因。
A. 中途测试后转钻井或试油酸化压裂后转钻井
B. 钻到临井里,压力串通
C. 以过快的速度钻穿含气砂层
D. 射孔沟通产层,地层流体进入井内
E. 固井过程中水泥浆失重
【多选题】
决定溢流严重程度的主要因素有___。
A. 地层渗透性
B. 地层孔隙度
C. 压差
D. 防喷器规格
E. 地层的埋藏深度
【多选题】
导致溢流发生最主要的原因是___等。
A. 钻井液密度降低
B. 钻井液漏失
C. 起钻时井内未灌满钻井液
D. 抽汲
E. 钻遇异常高压地层
【多选题】
减小抽汲压力,保证井下安全,应遵循的原则: ___。
A. 尽量维持钻井液静液压力稍微高于地层压力
B. 降低起钻速度
C. 使钻井液粘度、静切力保持在最佳水平
D. 用钻井液补充罐、泵充数计数器、流量计或泥浆罐液面指示器来计量灌液量,及时判断是否出现抽汲溢流
E. 在起钻时加快起钻速度
【多选题】
减少漏失的一般原则:___。
A. 正确确定套管下深
B. 提高地层承压能力
C. 保持好钻井液性能
D. 在下钻时控制下钻速度
E. 在下钻时加快下钻速度
【多选题】
为减小漏失,保证井下安全,应遵循的原则___。
A. 设计好井身结构
B. 提高地层承压能力
C. 控制下钻速度
D. 保持好钻井液性能
E. 增加钻井液密度、粘度
【多选题】
现根据信号对监测溢流的重要性和可靠性,分为___。
A. 时间显示
B. 速度显示
C. 直接显示
D. 间接显示
E. 流量显示
【多选题】
下列___是溢流的直接显示。
A. 泥浆罐液面上升
B. 停泵后泥浆出口钻井液外溢
C. 泵压下降
D. 泵速增加
E. 出口管钻井液流速加快,返出量增加
【多选题】
及时发现溢流的重要性主要是___等。
A. 及时发现溢流并迅速控制井口是防止井喷的关键
B. 防止有毒有害气体的伤害
C. 防止造成更大的污染
D. 使井控工作处于主动
E. 可准确确定地层压力
【多选题】
早发现溢流的好处有___。
A. 关井时进入井筒的地层流体越少
B. 不易在关井和压井过程中发生复杂情况
C. 有利于关井与压井安全
D. 使二次井控处于主动
E. 关井套压和压井最高套压就越低
【多选题】
塔里木油田对于坐岗制度描述___是正确的。
A. 从安装防喷器开钻之日起泥浆工开始坐岗
B. 从安装防喷器开钻之日起录井队联机员开始坐岗
C. 录井队联机员从开始录井之日起坐岗
D. 井架工发现异常必须及时到泥浆罐区核实
【多选题】
___是溢流发现的第一责任人。
A. 录井队联机员
B. 井队司钻
C. 井队井架工
D. 井队泥浆工
E. 值班干部
【多选题】
塔里木油田坐岗制度的要求,起钻时泥浆工要做到___核对一次泥浆灌入或返出量。
A. 每3~5柱钻杆
B. 1柱钻铤
C. 1柱加重钻杆
D. 1柱钻铤和1柱加重钻杆
E. 每3~5柱钻杆和1柱钻铤
【多选题】
对于坐岗制度描述___是正确的。
A. 从安装防喷器开钻之日起泥浆工开始坐岗
B. 从安装防喷器开钻之日起录井队联机员开始坐岗
C. 录井队联机员从开始录井之日起坐岗
D. 联机员发现异常必须及时到泥浆罐区核实
【多选题】
在油气层(目的层)钻井作业过程中,泥浆工坐岗观察记录___,及时发现是否有溢流和井漏发生。
A. 钻井液出口流量变化
B. 井内液面变化
C. 钻井液性能变化
D. 钻井液循环罐液面变化
E. 地层压力的变化
【多选题】
塔里木油田坐岗制度的要求,在___等不循环工况泥浆工应坐岗观察泥浆出口管有无泥浆异常流出情况。
A. 测井
B. 空井
C. 每60分钟监测一次液面
D. 进入目的层或发现异常情况加密监测(间隔不超过25分钟)
E. 进入目的层(间隔不超过30分钟)
【多选题】
坐岗的主要目的是___。
A. 监测钻井液循环罐液面
B. 监测钻井液性能变化
C. 及时发现溢流
D. 及时发现井漏
E. 及时发现井喷
【多选题】
《塔里木油田钻井井控实施细则》规定:下列情况起钻前应进行短程起下钻检测油气上窜速度___。需长时间停止循环进行其他作业(测井、下套管、下油管、中途测试等)起钻前。
A. 钻开油气层后每趟起钻前
B. 井内泥浆密度降低后起钻前
C. 钻进中曾发生严重油气侵起钻前
D. 溢流压井后起钻前
E. 钻开油气层井漏堵漏后起钻前
推荐试题
【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation