【判断题】
在CTC区段,由车站交付的调度命令,车站值班员可使用调度命令无线传送系统或使用列车无线调度通信设备向司机转达。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
在高速铁路运行区段,机车综合无线通信设备故障时,司机应报告列车调度员(车站值班员)。
A. 对
B. 错
【判断题】
使用机车救援动车组时,允许动车组升弓供电。
A. 对
B. 错
【判断题】
在高速铁路运行区段,使用机车救援动车组时,连挂前,司机须与列车调度员联系,在得到列车调度员已发布邻线限速160 km/h及以下的调度命令(妨碍邻线及组织旅客疏散时为已扣停邻线列车)的口头指示后,方可开始作业。
A. 对
B. 错
【填空题】
1.机车上应备有___和铁鞋【止轮器】。
【填空题】
2.铁路线路分为正线、___、段管线、岔线、安全线及避难线。
【填空题】
3.站线是指___、调车线、牵出线、货物线及站内指定用途的其他线路。
【填空题】
4.信号装置一般分为信号机和___两类。
【填空题】
5.信号机按类型分为色灯信号机、臂板信号机和___信号机。
【填空题】
6.信号表示器分为道岔、脱轨、___、发车、发车线路、调车及车挡表示器。
【填空题】
7.信号机设在列车运行方向的___或其所属线路的中心线上空。
【填空题】
8.双线自动闭塞区间反方向进站信号机前方应设置___。
【填空题】
9.双线自动闭塞区间___进站信号机前方应设置预告标。
【填空题】
10.出站信号机有两个及以上的运行方向,而信号显示不能分别表示进路方向时,应在信号机上装设___。
【填空题】
11.进站及接车进路色灯信号机,均应设___信号。
【填空题】
12.驼峰色灯辅助信号机,可兼作___或发车进路信号机,并根据需要装设进路表示器。
【填空题】
13.___信号机及线路所通过信号机,因受地形、地物影响,达不到规定的显示距离时,应设复示信号机。
【填空题】
14.列车调度指挥系统TDCS和调度集中系统CTC区段,车站应采用___。
【填空题】
15.闭塞设备分为自动闭塞、___闭塞和半自动闭塞。
【填空题】
16.机车信号的显示,应与线路上列车接近的地面信号机的显示___。
【填空题】
17.装备在机车上的LKJ设备应按高于线路允许速度___km/h紧急制动设置模式曲线。
【填空题】
18.装备在机车上的LKJ设备应按高于线路允许速度___km/h常用制动设置模式曲线。
【填空题】
19.机车按牵引动力方式分为电力机车、内燃机车,传动方式主要有交流传动和___传动。
【填空题】
20.机车应有识别的标记:路徽、配属局段简称、车型、车号、___运行速度、制造厂名及日期。
【填空题】
21.具有双管供风装置的机车应向___等其他用风装置提供风源。
【填空题】
22.电气化区段运行的机车应有“电化区段___”的标识。
【填空题】
23.直流传动机车定期检修的修程分为大修、中修、小修和___。
【填空题】
24.车钩中心水平线距钢轨顶面高度为815~___mm。
【填空题】
25.当一个牵引变电所停电时,相邻的牵引变电所能___供电。
【填空题】
26.行车工作必须坚持集中领导、___、逐级负责的原则。
【填空题】
27.途中乘务人员换班时,应将调度命令内容___。
【填空题】
28.实习和学习驾驶机车、动车组的人员,必须在正式值乘、值班人员的___指导和负责下,方准操作。
【填空题】
29.___闭塞区段货物列车尾部须挂列尾装置,其他区段货物列车尾部宜挂列尾装置。
【填空题】
30.双机或多机牵引时,本务机车的职务由___机车担当。
【填空题】
31.回送机车,应挂于本务机车___。
【填空题】
32.单机挂车在区间被迫停车后,开车前应确认___和制动主管贯通状态是否良好。
【填空题】
33.货物列车中因装载的货物规定需停止制动作用的车辆,自动制动机临时发生故障的车辆,准许关闭___。
【填空题】
34.机车改变司机室操纵时,应按规定对列车自动制动机进行___试验。
【填空题】
35.无列检作业的始发列车发车前,应按规定对列车自动制动机进行___试验。
【填空题】
36.调车工作要固定作业区域、线路使用、调车机车、人员、班次、交接班___、交接班地点、工具数量及其存放地点。
【填空题】
37.调车工作要固定___、线路使用、调车机车、人员、班次、交接班时间、交接班地点、工具数量及其存放地点。
推荐试题
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface