【单选题】
群集式千斤液压提升初次起吊,当工件试吊时,需要停置观察___分钟,注意各起吊索具的受力情况以及液压泵的压力表,如果索具受力均匀,压力表读数无大幅度波动,就可以正常起吊。
A. 5~10
B. 10~20
C. 20~30
D. 30~60
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
履带式打挖掘机短距离转移地工地时,每行走___应对行走机构进行检查和润滑。
A. 200~700m
B. 300~900m
C. 500~1000m
D. 700~1300m
【单选题】
挖掘机在拉铲或反铲作业时,履带距工作面边缘距离应大于___。
A. 0.5m
B. 1m
C. 1.5m
D. 2m
【单选题】
静作用压路机在施工过程,要求实际含水量超过最佳含水量的2%,也不低于___,否则应采取措施。
A. 3%
B. 6%
C. 9%
D. 12%
【单选题】
轮胎压路机最适于碾压___。
A. 碎石层
B. 砂土层
C. 黏土层
D. 沥青路面
【单选题】
轮胎式装载机自身运料时的合理运距为___。
A. 30~80m
B. 30~120m
C. 50~100m
D. 70~150m
【单选题】
两台以上推土机在同一地区作业时,前后距离应大于8m,左右距离应大于___。
A. lm
B. 1.5m
C. 2m
D. 2.5m
【单选题】
推土机在深沟、基坑或陡坡地区作业时,其垂直边坡深度一般不超过___,否则应放出安全边坡。
A. 1m
B. 1.5m
C. 2m
D. 3m
【单选题】
推土机推屋墙或围墙时,其高度不宜超过___。
A. 2. 5m
B. 3.5m
C. 4m
D. 4.5m
【单选题】
不得用推土机推___。
A. 树根
B. 碎石块
C. 建筑垃圾
D. 石灰
【单选题】
自行式铲运机的经济运距为___。
A. 500~800m
B. 500~1200m
C. 800~1200m
D. 800~2000m
【单选题】
两台铲运机平行作业时,机间隔不得小于___。
A. 2m
B. 1m
C. 3m
D. 2.5m
【单选题】
拖式铲运机主要特点之一是___。
A. 行驶速度快
B. 适合长距离作业
C. 机动性能强
D. 对地面条件要求低
【单选题】
振动压路机的生产效率相当于静作压路机的___倍。
A. 1~2
B. 3~4
C. 5~6
D. 7~8
【单选题】
应检查工作装置采间板磨损间隙,当间隙超过___时,应予更换。
A. 3mm
B. 10mm
C. 7mm
D. 5mm
【单选题】
作业中,当桩锤冲击能量达到最大能量时,其最后10锤的贯人值不得小于___。
A. 10mm
B. 7mm
C. 5mm
D. 3mm
【单选题】
打桩机的安装场地应平坦坚实,当地基承载力达不到规定压应力时,应在履带下铺设路基箱或30mm厚的钢板其间距不得大于___mm。
A. 500
B. 300
C. 100
D. 700
【单选题】
压桩机工作时,非工作人员应离机___以外,起重机起重臂下,严禁站人。
A. 10m
B. 5m
C. 20m
D. 15m
【单选题】
钻架的吊重中心,钻机的卡孔和护进管中心应在同一垂直线上,钻杆中心允许偏差为___mm。
A. 30
B. 40
C. 50
D. 20
【单选题】
三支点式履带打桩架手杆安装好,履带驱动液压马达应置于___部,安装后的手杆,其下方搁置点应不少于(B)个。
A. 前3
B. 后3
C. 前4
D. 后4
【单选题】
在桩贯入度较大的软土层起动桩锤时,应先关闭油门冷打,待每击贯入度小于___mm时,用开启油门启动桩锤。
A. 50
B. 100
C. 150
D. 200
【单选题】
正前方吊桩时,对混凝土预制柱,立柱中心与桩的水平距离不得大于___m,对钢管桩水平距离不得大于(A)m。
A. 4 7
B. 5 10
C. 3 8
D. 5 5
【单选题】
钻机钻孔时,当钻头磨损量达___m时,应予更换。
A. 10
B. 20
C. 30
D. 40
【单选题】
水磨石机在混凝土强度达到___时进行磨削作业。
A. 50%~60%
B. 60%~70%
C. 70%~80%
D. 80%~90%
【单选题】
钢筋切断机切短料时,手和切刀之间的距离应保持在___以上,如手据握端小于400mm时,应采用套管或夹具。
A. 150mm
B. 200mm
C. 400mm
D. 500mm
【单选题】
焊接机械机体必须使用单独导线接地,接地电阻不得大于___Ω。
A. 4
B. 10
C. 15
D. 20
【单选题】
移动电焊机时,应切断___。
A. 负荷开关
B. 电源
C. 电流
D. 电压
【单选题】
液压式张拉机油箱内要保持___的油位。
A. 80%
B. 75%
C. 85%
D. 90%
【单选题】
塔式起重机的主参数是___。
A. 起重量
B. 公称起重力矩
C. 起升高度
D. 起重力矩
【单选题】
塔式起重机主要由___组成。
A. 基础、塔身和塔臂
B. 基础、架体和提升机构
C. 金属结构、提升机构和安全保护装置
D. 金属结构、工作机构和控制系统
【单选题】
塔式起重机最基本的工作机构包括___。
A. 起升机构,变幅机构、回转机构和行走机构
B. 起升机构,限位机构、回转机构和行走机构
C. 起升机构,变幅机构、回转机构和自升机构
D. 起升机构,变幅机构、回转机构和自升机构
【单选题】
下列对起重力矩限制器主要作用的叙述哪个是正确的?___
A. 限制塔机回转半径
B. 防止塔机超载
C. 限制塔机起升速度
D. 防止塔机出轨
【单选题】
对小车变幅的塔式起重机,起重力矩限制器应分别由___进行控制。
A. 起重量和起升速度
B. 起升速度和幅度
C. 起重量和起升高度
D. 起重量和幅度
【单选题】
对动臂变幅的塔式起重机,当吊钩装置顶部升至起重臂下端的最小距离为800mm处时,___应动作,使起升运动立即停止。
A. 起升高度限位器
B. 起重力矩限制器
C. 起重量限制器
D. 幅度限位器
【单选题】
塔式起重机的拆装作业必须在___进行。
A. 温暖季节
B. 白天
C. 晴天
D. 良好的照明条件的夜间
【单选题】
当起重量大于相应挡位的额定值并小于额定值的110%时,___应当动作,使塔机停止提升方向的运行。
A. 起重力矩限制器
B. 起重量限制器
C. 变幅限制器
D. 行程限制器
【单选题】
当起重量大于相应挡位的额定值并小于额定值的110%时,起重量限制器应当动作,使塔机停止向___方向运行。
A. 上升
B. 下降
C. 左右
D. 上下
【单选题】
___能够防止塔机超载、避免由于严重超载而引起塔机的倾覆或折臂等恶性事故。
A. 力矩限制器
B. 吊钩保险
C. 行程限制器
D. 幅度限制器
【单选题】
塔式起重机工作时,风速应低于___级。
A. 4
B. 5
C. 6
D. 7
【单选题】
下列哪个安全装置是用来防止运行小车超过最大或最小幅度的两个极限位置的安全装置?___
A. 起重量限制器
B. 超高限制器
C. 行程限制器
D. 幅度限制器
【单选题】
___设于小车变幅式起重臂的头部和根部,用来切断小车牵引机构的电路,防止小车越位。
A. 幅度限制器
B. 力矩限制器
C. 大车行程限位器
D. 小车行程限位器
推荐试题
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy