【填空题】
当网压达到最大设定值___V时,DCU/M会打开制动电阻,将电机上的制动能量转变成电阻的热能消耗掉。___
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
1850|摘自车辆检修工教材
解析
暂无解析
相关试题
【填空题】
闸瓦检查时,表面裂纹中间75mm部分裂纹宽度施加时大于___,缓解时大于___,立即进行更换;75mm以外部分,裂纹深度超过___,裂纹宽度超过___,裂纹长度贯通整个摩擦接触面,立即进行更换,否则用划线笔将裂纹区域圈注。___
【简答题】
三月检车门检查中,如何检查S1、S3行程开关外观及其紧固状态?(摘自三月检规程)
(1)在开门状态下,外观无损坏;
(2)检查行程开关安装螺栓防松线清晰无错位;
(3)检查行程开关夹紧圈,要求夹紧圈齐全、无损伤;检查摆臂滚轮的状态,要求滚轮齐全无松脱;
(4)在门打开或关闭的过程中,行程开关S1接线与丝杆螺母无干涉;
(5)检查S1、S3安装座无裂纹,铰链臂上的压簧动作灵活,无卡滞、无断裂,推杆螺母防松线清晰无错位。
【简答题】
长沙轨道交通1号线空气制动系统由哪些组成?(摘自车辆检修工教材)
答:主要由供风装置、制动控制设备、基础制动装置、悬挂装置、升弓模块、轮缘润滑供风装置、车钩操作装置等部件组成。
【简答题】
EBCU 是基于微处理器的电子控制单元,EBCU主要有哪些功能?(摘自车辆检修工教材)
答:EBCU 有以下功能:
1)常用摩擦制动控制
2)制动力管理
3)故障诊断
4)网络通讯
5)车辆状态指示与通报
【简答题】
LCD显示屏的播放模式有哪些?(摘自维修手册)
答:(1)全部播放来自于地面编播中心视频(车地无线系统下传的视频);
(2)全部播放地面数字移动电视的视频;
(4)播放车载预录视频;
(5)播放列车紧急预案。
【简答题】
广播主机机柜包括那些模块?(摘自维修手册)
答:(1)广播系统3U机箱
(2)电源模块
(3)MVB模块
(4)录音模块
(5)重联/模拟总线模块
(6)司机室音量调节模块
(7)司机室交换机
(8)PA主控
【简答题】
贯通道的主要功能。(摘自维修手册)
答:(1)、为相邻两节车厢之间的乘客提供站立、通过的空间
(2)、可以降低外部噪声和热量传递
(3)、作为整列车内的可变形区域,为列车通过曲线时提供可恢复的变形能力
【简答题】
客室侧门接入下列5 条列车线,分别是?(摘自维修手册)
答:(1)零速列车线
(2)门允许列车线
(3)开门列车线
(4)关门列车线
(5)网络硬线切换控制列车线,当“网络硬线切换”开关打到“网络位时”EDCU 车门接受列车网络开关门指令。
【简答题】
客室侧门具有的主要功能有哪些?(摘自维修手册)
答:(1)开、关门功能
(2)障碍物探测功能
(3)车门故障切除功能
(4)紧急解锁功能
(5)车门安全回路及旁路功能
(6)外部操作功能 (每车2 套门)
(7)车门故障显示、存储和诊断功能
(8)单门维护按钮开关门功能 (仅用于维修人员本地操作)
(9)零速保护功能
【简答题】
构架主要功能。(摘自维修手册)
答:(1)、安装转向架部件,如轮对、一系悬挂装置、二系悬挂装置、牵引电机、齿轮箱、牵引装置、基础制动单元、减振器等。
(2)、传递牵引力、制动力和承担车体重量,以及传递各部件产生的作用力。
【简答题】
简述车钩连挂过程。(摘自维修手册)
答:当车钩表面接合时,进入凹锥体的钩舌紧靠对应车钩的钩板。钩板在拉伸弹簧力的作用下旋转,直到钩舌啮合到钩板槽中。锁定后,钩锁在拉伸弹簧的作用下进入连挂位置,车钩锁定。
【简答题】
列车在连挂运行中具有哪些功能? (摘自维修手册)
答:(1)在激活司机室能施加/缓解所有车停放制动;
(2)在任一司机室能对其它司机室进行通信;
(3)在激活司机室能对所有客室进行广播;
(4)在任何司机室可通过操作“紧急”蘑菇按钮对全列车紧急制动。
【简答题】
由于城轨列车运营区间短,启动和制动频繁,城轨车辆制动的特点有?(摘自车辆检修工教材)
答:制动响应快及制动功率大;
车辆制动力根据载荷自动调整;
使用独立牵引电机,适于采用电制动;
制动系统安全可靠性要求高;
【简答题】
TCMS具有哪些特点?(摘自维修手册)
答:(1)分布式模块化设计,易于装卸和维修;
(2)采用TCN总线,易于扩展,适应不同形式的列车编组;
(3)通信采用双通道冗余机制,提高系统运行可靠性;
(4)智能人机界面显示,提升系统可用性;
(5)机械连接采用特殊设计,电气接触优良,抗电磁干扰性能高。
【简答题】
TCMS 系统采用模块化设计,分为不同的功能模块,分别是?(摘自维修手册)
答:模拟量输入输出模块(AXMe)、数字量输入模块(DIMe)、数字量输入输出模块(DXMe)、事件记录模块(EDRM)、人机接口元(HMI)、中继模块 (REP)、车辆控制模块(VCMe)、远程通讯模块RCMe
【简答题】
TCMS 主要完成的控制功能有?(摘自维修手册)
答:(1)司机室激活控制;
(2)方向控制;
(3)紧急牵引控制;
(4)空电联合制动控制;
(5)保持制动控制;
(6)安全连锁控制;
(7)空调启动控制;
(8)扩展供电功能控制;
(9)压缩机控制;
(10)限速控制。
【简答题】
HMI 是TCMS 的显示终端设备,是司机和维护人员操作列车的窗口,具备哪些功能?(摘自维修手册)
答:(1)信息显示。向车辆驾驶人员和维护人员提供车辆综合信息,各设备的工作状态,故障信息的综合与处理等功能。
(2)参数设定。对轮径值、列车重量、站点、时间日期等参数进行更改与设定。
(3)数据转储。通过 USB 接口,将故障信息转储地面进行统计、分析。
推荐试题
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance