【填空题】
4、气旋出海后常常加深,寒潮冷高压在南下过程中逐渐减弱。这些现象都与非绝热的影响有关。非绝热增温或冷却包括乱流、辐射和___三种热力交换过程。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
蒸发和凝结[或潜热吸收和释放]
解析
暂无解析
相关试题
【填空题】
5、降水的形成一般有三个过程:水汽由源地输送到降水地区,即水汽条件;水汽在降水地区辐合上升,在上升过程中___,即垂直运动条件;云滴增长变为雨滴而下降,即___条件。
【填空题】
6、东北冷涡天气具有不稳定的特点。因为冷涡在发展阶段,其温压场结构并不完全对称,所以它的___常有冷空气不断补充南下,在地面图上则常常表现为一条副冷锋南移,有利于冷涡的西、西南、南到东南部位发生___天气。
【填空题】
7、一般认为,暴雨降在低空急流中心的___,主要是由于急流所在层次的水汽在那里强烈___造成的。
【填空题】
8、常见的对流性天气的触发机制有:天气系统造成的系统性上升运动、___和___。
【填空题】
9、形成对流性天气的基本条件有三个,即:___、___、___。
【填空题】
10、强雷暴发生、发展的有利条件有___、___、___、高、低空急流、中小系统。
【填空题】
11、台风的结构在水平方向分为___区、旋涡区、___区等三圈,在垂直方向分为流入层、___层、流出层等三层。
【填空题】
12、西太平洋副高和南亚高压虽然都是副热带地区的高压,但在形成过程中,前者是___因子起主要作用,后者则是___因子占主要地位。
【填空题】
13、西太平洋副热带高压的不同部位,因结构不同,天气也不相同。在脊线附近多___天气,在脊的北侧多___天气。
【填空题】
15、锋面气旋是影响山东的重要天气系统,可分为两大类:一是发生在___ )上的北方气旋;另一类是发生在___ )上的南方气旋。
【填空题】
16、根据地面形势不同,蒙古气旋发生过程可分为以下三种类型___、___、蒙古副气旋。
【填空题】
17、台风降水与台风移动路径有关,造成山东降水的台风,主要有___和___两类。
【填空题】
18、根据冷锋的移动路径,通常把冷锋分为西北冷锋、河西冷锋和北方冷锋三类。其中,西北冷锋的移动路径为___。
【填空题】
19、切变线是夏季影响山东的一种降水天气系统,其降水的特点是___、___,有时可在同一地区造成连续暴雨。
【填空题】
20、华北冷涡结构的显著特征是它的非对称性,就整体而言是冷性涡旋,但各部位的温湿分布都有明显差异。冷涡的___较为暖湿,而其___干冷。
【填空题】
22、强对流天气和暴雨天气的比较。大气层结。暴雨发生在深厚的暖湿气团中,而强对流发生在强的___中,其潜在不稳定能量区要比暴雨___。风的垂直结构。暴雨过程的低层多为东北或偏东风,高层为___;强对流天气低层为___,中高层为西北风。
【填空题】
23、对流云系在卫星云图上的特征。结构型式。对流云呈___状结构,飑线云系则呈云线或___的分布型式;云区范围。对流云的尺度不大,常为___的云团或云带;色调。对流云亮度大,呈___而光亮;云系边缘特征。未成熟的对流云边界清晰,但不___;发展成熟的对流云,其上风方边界很清楚,多呈___状,而云的下风方边界则较模糊,多呈纤维状沿___分布。
【填空题】
24、多普勒天气雷达主要由___、___和主用户终端PUP三大部分构成。
【填空题】
25、我国多普勒天气雷达的观测方式主要采用___方式,目前的体扫方式有三种,分别是___、VCP21和VCP31。
【填空题】
26、最大不模糊的径向速度与雷达的___成正比。当脉冲对相移大于___时,得到的速度是模糊的。
【填空题】
27、在雷达硬件定标正确的情况下,影响多普勒天气雷达数据质量的三个主要因素是___、___和___。
【填空题】
28、当45-55dBZ的回波强度达到___度层的高度时,最有可能产生冰雹。
【填空题】
29、根据雷达回波形态,可以将对流风暴分为___、___、超级单体风暴和___。超级单体风暴带有一个___的弱回波区。
【填空题】
1、如果用涡度强度表征系统的强度,那么在脊线上涡度局地变化为负时,___。
【填空题】
2、地面冷高压的___可以指示冷空气向南爆发的势力。
【填空题】
3、在高空图上,寒潮冷空气常表现为___或___。
【填空题】
4、产生冰雹的区域之一:中低层的低槽、切变线、低压中心等辐合系统与高空___相迭置地区。
【填空题】
5、太平洋副带高压区的低层往往有___存在,这是由下沉运动造成的。
【填空题】
6、层结稳定度是讨论与大气的温湿水平分布状态联系的___的发展问题。
【填空题】
7、大气中的水平辐散辐合都是___引起的。
【填空题】
8、槽线上和槽后有冷平流的槽,预报为___。
【填空题】
9、锋面附近所以产生大规模的垂直运运动,由于___和___而引起的。
【填空题】
10、我们把水平气压梯度力和地转偏向力平衡时的大气流场称为___。
【填空题】
11、短波多半出现在比较平直的西风上,波的振幅比较小,移动的速度___。
【填空题】
12、作用于实际大气真实的力,一般称之为基本力或牛顿力,包括___等。
【填空题】
13、重力在赤道上最___,随纬度增加而___ 。
【填空题】
14、牛顿第二运动定律可导出大气的___方程,质量守恒可导出___方程,而能量守恒则可导出___方程。
【填空题】
15、大气的热量主要是来源于___。
【填空题】
16、如果其他条件不变,锋面坡度是随纬度增加而___,而锋面两侧温差越大则坡度___。
【填空题】
17、锋按伸展高度的不同,将锋分为:___。
推荐试题
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning