【判断题】
轨道交通的车站给水排水系统是由给水系统和排水系统两部分组成的。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
轨道交通排水系统的功能保证车站和车辆段排水通畅,为轨道交通安全运营提供服务。
A. 对
B. 错
【判断题】
车站照明系统大致包括车站、隧道和电缆层的一般照明、事故照明和广告照明。
A. 对
B. 错
【判断题】
车站照明通常在车站站台、站厅的两端各设置一个照明配电室。
A. 对
B. 错
【判断题】
FAS是消防报警系统的英文简称,由中央级、车站级和就地级组成。
A. 对
B. 错
【判断题】
FAS主机能够综合处理各种数据信息,作出火警判断,发出声光报警,启动相关消防设备动作并监视其状态。
A. 对
B. 错
【判断题】
车站气体灭火系统设在重要的设备用房,如变电站,通信设备室、环控电控室、客运休息室等,实现对此类房间24h的火灾监视及自动灭火的功能。
A. 对
B. 错
【判断题】
车站内发生火灾事故时,由火灾报警系统处理火灾,环控系统无需进行相应的动作。
A. 对
B. 错
【判断题】
站台至站厅间根据车站远期客流设置上、下行自动扶梯是轨道交通设置自动扶梯的基本原则之一。
A. 对
B. 错
【判断题】
自动售检票系统,简称AFC。
A. 对
B. 错
【判断题】
自动售检票系统包括人工售票机、车站计算机、自动售票机、自动加值机、闸机。
A. 对
B. 错
【判断题】
人工售票机与人工补票机设置在客服中心。
A. 对
B. 错
【判断题】
接地线拆除后,任何人不得再在设备上工作。
A. 对
B. 错
【判断题】
400V抽屉可直接抽出做维护保养。
A. 对
B. 错
【判断题】
对用户的停电和送电、运行方式的改变和调整、设备改检修和投入运行等是通过倒闸过程进行的。
A. 对
B. 错
【判断题】
屏蔽门系统中的应急门一般被当做固定门使用。
A. 对
B. 错
【判断题】
大系统二点报警时,联动垂直电梯平层。
A. 对
B. 错
【判断题】
BAS运行方式为24h无间断自动运行。
A. 对
B. 错
【判断题】
电梯的额定速度是指设计规定的电梯运行速度。
A. 对
B. 错
【判断题】
屏蔽门系统运行管理的任务是保证设备处于安全受控状态,实现系统的各项功能,为车站正常运营提供基础条件。
A. 对
B. 错
【判断题】
BAS按控制功能和权限的可以分为中央级、车站级和就地级三个等级。
A. 对
B. 错
【单选题】
使电气设备从一种状态转换到另一种状态的过程叫___。
A. 操作
B. 倒闸
C. 投用或退出
D. 前面三项都可
【单选题】
供电系统中,下列的___不需要采用接地保护。
A. 变压器的金属外壳
B. 电压互感器的二次绕组
C. 交流电力电缆的金属外皮
D. 架空导线
【单选题】
不属于电力系统的状态是___。
A. 运行状态
B. 热备用状态
C. 停运状态
D. 检修状态
【单选题】
蓄电池均充的作用是___。
A. 使蓄电池电压趋向一致
B. 补充蓄电池的自放电损耗
C. 增加蓄电池的容量
D. 提升蓄电池组的电压
【单选题】
当系统发生故障时,要求继电保护动作,将靠近故障设备的断路器断开,用以缩小停电范围,这就是继电保护的___。
A. 选择性
B. 可靠性
C. 灵敏性
D. 迅速性
【单选题】
发生___,要立即报告,组织抢救伤员和控制事故扩大,保护事故现场。
A. 设备报警事故
B. 误操作事故
C. 因工伤亡事故
D. 消防报警事故
【单选题】
长期停运的断路器在正式执行操作前,应___。
A. 检查断路器是否完好
B. 检查断路器分合闸位置
C. 向调度申请通过远方控制方式进行试操作2~3次,无异常后,方能拟定操作票
D. 检查保护装置是否已投入
【单选题】
区间、电缆层电力电缆及电缆桥架巡视检查工作开始前进行准备工作,准备好反光背心、___、手电筒、通讯工具、填写的表格。
A. 电笔
B. 安全帽
C. 手机
D. 万用表
【单选题】
UPS切换自动旁路条件___。
A. 市电故障和逆变故障
B. 逆变故障和整流故障
C. 电池电压上升或电池电压下降
D. 电池电压下降和整流故障
【单选题】
电力系统在运行中发生短路故障时,通常伴随着电压___。
A. 大幅度上升
B. 急剧下降
C. 越来越稳定
D. 不受影响
【单选题】
计轴复位预复位,计轴复位按钮按下后会显示___秒。
A. 30
B. 40
C. 40
D. 60
【单选题】
重启联锁机需要关闭___电源。
A. 5V ,10/20V
B. 5V,12/24V
C. B 5V,12/30V
D. B 5V,10/24V
【单选题】
通信系统允许___或其他系统设备通过传输诸如语音、数据、图像等电信号在一定的距离内进行通信。
A. 运营人员
B. 管理人员
C. 维修人员
D. 运营、管理及维修人员
【单选题】
提供外线联系语音业务的设备是___。
A. 专用电话
B. 公务电话
C. 专用无线
D. 消防无线
【单选题】
列车行驶过程中,司机与调度员进行通话所使用的通信系统是___。
A. 传输系统
B. 广播系统
C. 专用无线系统
D. 交换系统
【单选题】
在地铁的工作范围内随时提供方便的无线语音及数据通信手段,使这些工作人员能及时地与相关的___取得联系,以适应地铁运营的快节奏需要。
A. 指挥调度部门
B. 内部人员
C. 管理人员
D. 车站管理人员
【单选题】
___是一种具有最高优先级的呼叫。当系统忙时,它能强拆正在进行中的最低优先级呼叫,所需资源被立即分配给呼叫者。
A. 单呼
B. 全呼
C. 组呼
D. 紧急呼叫
【单选题】
重启车站LED屏的正确方式为___。
A. 遥控器
B. 开关LED屏上电源开关
C. 开关PIS机柜内的LED电源空开
D. 开关交流配电柜内的LED电源空开
【单选题】
闭路电视监控系统作用描述不正确的是___。
A. 安全防范的实时监控
B. 车站客流的监控
C. 列车出、入站及旅客上、下车状态的监控
D. 提供列车到站及发车的信息
【单选题】
电视监控系统终端设备有监视器、控制器、___。
A. 云台
B. 镜头
C. 解码器
D. 录像机
推荐试题
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering