【多选题】
三乙基铝泄漏后可以采用的灭火方式是___。
A. 用干粉灭火器
B. 用干沙覆盖
C. 用喷淋水
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AB
解析
暂无解析
相关试题
【多选题】
P201的作用___。
A. 保证压力稳定
B. 保证温度稳定
C. 保证产品均化
D. 给环管增压
【多选题】
关于夹套水加热器E205___。
A. 保证停催化剂期间大环管温度
B. 保证开车前期大环管温度
C. 是管壳式换热器
D. 水走壳层,蒸汽走管层
【多选题】
导致P200功率上升的原因有___。
A. 叶轮挂有粘料
B. 叶轮入口堵塞
C. 叶轮出口堵
D. 轴承故障
E. 输送介质密度增大
【多选题】
关于D203作用___。
A. 排出夹套水中的气体
B. 控制补水
C. 稳定夹套水压力
D. 该罐带有电伴热
【多选题】
大环管R201接受的进料___。
A. 液相丙烯
B. 气体氢气
C. 催化剂浆料
D. TEAL、DONOR
【多选题】
关于催化剂预接触罐D201的温度控制___。
A. 冷媒为冷冻水
B. 由阀TV20101控制
C. 正常操作温度为10℃
D. TV20101为气关阀
【多选题】
HIC20402的作用___。
A. 在排放物料去低压排放时打开
B. 正常情况下该阀处于开位
C. 环管进液相丙烯时做排气用
D. 该阀为气关阀
【多选题】
属于300单元的排放阀有___。
A. HV30001
B. PV30101
C. HV30101
D. HV30007
E. HV30401
【多选题】
下列选项中能够引起闪蒸罐液位波动的原因是___。
A. 闪蒸罐液位指示有偏差
B. 闪蒸罐出料阀故障
C. 环管反应器出料不稳定
D. 闪蒸罐中罐壁粘有粘料
【多选题】
影响循环丙烯洗涤塔液位的因素包括___。
A. FC30203流量
B. LV30201开度
C. FI30204流量
D. FC30208流量
【多选题】
FIC30206的流量低与___有关。
A. 小闪线堵
B. PIC30201设定低或阀门故障
C. 小闪线伴热蒸汽疏水器堵
D. C301底部堵
【多选题】
循环丙烯洗涤塔丙烯进料包括___。
A. D301→C301
B. P302→C301
C. PA301→C301
D. P501→C301
【多选题】
以下属于板式塔的有___。
A. C301
B. C302
C. C501
D. C502
【多选题】
关于M301描述正确的是___。
A. M301起搅拌作用
B. M301是鼠笼式分离器
C. M301可以分离气相丙烯
D. M301可以过滤丙烯中的细粉
【多选题】
直接影响E301液位的因素包括___。
A. PV30203开度或返回丙烯量
B. FV30201开度
C. E301换热效果
D. 系统惰性气体和轻组分含量及排放量(通过FV30203排放)
E. C402底部出料量
【多选题】
SR301压力高与___有关。
A. LV30001开度大
B. FV30206或HV40003开度大
C. SR302堵或SR301滤袋堵
D. PV30401控制故障或PA301故障
E. SR301反吹气故障
【多选题】
当出现___情况时,D301料位高。
A. LV30001堵
B. R401或SR301压力高
C. D301料位计显示故障或LV30001故障
D. 反应产生的细粉粘料多,造成显示高
E. R401或SR301料位超高
【多选题】
下列那些选项是I402动作后的正确结果___。
A. 关闭FV40004(R401的丙烯进料)
B. 关闭FV40002(R401的氢气进料)
C. 关闭FV40003(R401的乙烯进料)
D. 打开HV40003(CY401底部出料)
E. 打开PV40002(R401的排放到火炬)
【多选题】
动作结果为关闭阀门LV40001的联锁位号___。
A. I401
B. I402
C. I303
D. I313
【多选题】
R401温度高的处理措施包括___。
A. 清理E411循环水滤网
B. 降低R401料位、降低压力
C. 检查循环水进水温度,若高则通知总调
D. 仍高则降低负荷、乙烯加入量,增加163量
E. 若R401飞温则注CO,将400单元切出
【多选题】
汽蒸罐外部蒸汽夹套的作用是___。
A. 加热
B. 杀死残存三乙基铝
C. 使催化剂失活
D. 防止蒸汽在罐壁上凝结
【多选题】
造成M501停的原因有___。
A. D501料位高
B. FALL50001报警
C. 电流高高报警
D. M501机械故障
【多选题】
I508控制的阀门有___。
A. HV50300A
B. HV50300B
C. HV50300C
D. HV50300D
【多选题】
聚丙烯车间生产正常运行状态下排放废水的主要设备有___。
A. C501
B. C502
C. D806
D. D606
E. D501
【多选题】
600单元主要向装置提供___。
A. 冷冻水
B. 高压氮
C. 蒸汽冷凝液
D. 循环水
【多选题】
冷冻水都用在下列哪些设备中___。
A. D106夹套
B. D201夹套
C. E201
D.
E. 301
【多选题】
高压排放罐接收来自反应区的所有事故排放物,只能接收来自___安全阀起跳的紧急排放物。
A. 预聚反应器
B. 高压闪蒸罐
C. 环管反应器
D. 三通阀HV30001
【多选题】
液罐的现场液位计一般采用___。
A. 玻璃板液位计
B. 磁浮子翻板液位计
C. 双色玻璃板液位计
D. 浮球液位计
【多选题】
聚丙烯污水检测的指标为___。
A. COD
B. BOD
C. PH值
D. 悬浮物
E. 油
【多选题】
装置中可以用到蒸汽凝液的单元有___。
A. 尾气回收压缩机
B. 注入汽蒸器的蒸汽管线
C. E303底部再沸器
D. 汽蒸器洗涤塔
【多选题】
P202停后,会引发___动作。
A. I204
B. I220
C. I221
D. I206
【多选题】
装置使用公用工程包括___。
A. 蒸汽系统
B. 仪表风、工业风系统
C. 氮气系统、电力系统
D. 冷却水系统、脱盐水系统、冷冻水系统、高温水系统
【多选题】
切粒机在下面___情况下应磨刀
A. 原始开车时
B. 长时间停车后的开车
C. 切刀、切刀转动体、模板等切粒系统中元件更换后
D. 切刀机系统找正之后
【多选题】
机泵运转正常的标准有___
A. 运转平稳无杂音
B. 压力、流量平稳,满足所需值
C. 轴承震动、窜轴、密封泄露不超标
D. 电机电流正常
【多选题】
挤压机日常现场巡检项目有___
A. 齿轮箱油位
B. 主电机前后轴承油温
C. 筒体温度
D. 齿轮箱油泵运转情况
【多选题】
下列选项中,可能引起切粒机进刀油压波动的是___
A. 生产负荷高
B. 油路内有气
C. 气路发生泄露
D. 油路发生泄露
【多选题】
聚丙烯中添加的光稳定剂应具备的条件是___。
A. 热稳定性好、挥发性低
B. 耐抽提、耐水解性好
C. 无毒或低毒
D. 与其他助剂的相容性不好
【多选题】
颗粒风送系统由___三方面的操作。
A. 料仓进料操作
B. 料仓掺混操作
C. 料仓送料操作
D. 同一料仓边进料边出料的操作
【多选题】
在控制室的DCS操作台上,一般的控制回路有___。
A. 串级控制
B. 分程控制
C. 比值控制
D. 分级控制
【多选题】
在下列情况下,需要更换挤压机筛网的是___。
A. 更换产品牌号
B. 网前、网后压差异常高
C. 网前、网后压差异常低
D. 产品中出现焦料、糊料
推荐试题
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow