网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An alarm device inserted between the deaerating tank and the expansion tank can notify the on-watching crew that ()
A
the expansion tank is lack of water
B
the expansion tank is over flowing
C
there is something wrong with the cooling system
D
there is something wrong with the engine
参考答案
参考解析
解析:
暂无解析
更多 “单选题An alarm device inserted between the deaerating tank and the expansion tank can notify the on-watching crew that ()A the expansion tank is lack of waterB the expansion tank is over flowingC there is something wrong with the cooling systemD there is something wrong with the engine” 相关考题
考题
An alarm device inserted between the deaerating tank and the expansion tank can notify the on-watching crew that .A.the expansion tank is lack of waterB.the expansion tank is over flowingC.there is something wrong with the cooling systemD.there is something wrong with the engine
考题
In the following statements about the principle of the low level controlling, which is WRONG? 0
A.Low level is monitored on the drain tank and header tank.B.If there is high differential the filters pressure across the circulatingpumps is alarmedC.The lubricating oil purifier cannot take oil from the drain tankD.If the sea water pressure falls, this also operates an alarm
考题
Which device is installed in user devices and makes wireless connections between them and a network?()
A.Access pointB.BridgeC.RouterD.Client adapter
考题
A device which prints out a permanent record of the plant operating conditions is known as the ______.A.ana(名言集) loggerB.bell loggerC.alarm loggerD.data logger
考题
The wooden plug inserted in the vent of a damaged tank should be removed if you are going to ______.A.pump from the damaged tankB.fight a fireC.abandon shipD.use the crossover system
考题
To ensure proper seating when closing a valve on a tank,the valve should be ______.A.Set up as tight as possible by handB.Set up tight using a valve wrenchC.Closed,opened a half turn,and then closedD.Closed against the stop and the locking pin inserted
考题
In which two locations in an enterprise network can an IPS sensor be placed?()A、bridging VLANs on two switchesB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunkingE、between a Layer 2 device and a Layer 3 device withtrunking
考题
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply
考题
完成A接口倒换后,BSC出现2992错误(BTS AND TC UNSYNCHRONIZATION CLEAR CALLS ON A INTERFACE alarm),说明A接口可能存在哪类问题()A、A interface exist crossconnect circuitB、inconsistent CCSPCM between BSC and MSCC、A interface exist loop circuitD、inconsistent circuit number in circuit group between BSC and MSC
考题
NE5000E/NE80E/NE40E收集信息的常用命令()。A、Display versionB、Display alarm a11C、Display currentD、Display device
考题
Which device is installed in user devices and makes wireless connections between them and a network?()A、Access pointB、BridgeC、RouterD、Client adapter
考题
In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking
考题
In Any Transport over MPLS (AtoM) Control word is an optional 4-byte field used in the pseudowire packet.The control word carries generic and Layer 2 payload-specific information to emulate L2 packets correctly.In pseudowire packet, where is this Control Word inserted?()A、Inserted between the MPLS label stack and the Layer 3 payloadB、Inserted between the MPLS label stack and the Layer 3 HeaderC、Inserted between the MPLS label stack and the Layer 2 payloadD、Inserted between the MPLS label stack and the Layer 2 header
考题
Which of the following is a bus mastering method?()A、 A device transfers data directly to the memory.B、 A device handles mediation between the northbridge and the processor.C、 A device connects to another device without involving the processor.D、 A device transfers data to the processor and then on to the memory.E、 A device handles mediation between the southbridge and the processor.
考题
单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G
None of the other alternatives apply
考题
单选题If the overflow tank high-level alarm sounds while the fuel oil tanks are being topped off, the engineer should ().A
close the static leg filling valveB
close the overflow tank falling valveC
reduce the fuel oil pumping rateD
stop the fuel oil pumping operation
考题
单选题The radiotelegraph alarm signal is().A
SOS sent three timesB
ten one-second dashes with a four-second interval between themC
twelve four-second dashes with a one-second interval between themD
twelve one-second dashes with a short interval between them
考题
单选题Shims of different thicknesses are inserted between the shells to enable adjustment of ().A
the bearing clearancesB
the bearing thicknessC
the bearing strengthD
the bridge hardness
考题
单选题The inner bottom is the().A
tank topB
compartment between the tank top and shell of the vesselC
inner side of the vessel's shellD
space between two transverse bottom frames
考题
单选题The amount of LFG that may be loaded into a given tank is determined by().A
checking the loading sheetB
loading to within 1 percent of outageC
loading to within 10 percent of the safety relief valve settingD
filling to the maximum level indicated on the liquid level gaging device
考题
单选题If the low level alarm of the diesel fuel day tank fails to function, you can expect trouble from()A
overheated injection pumpsB
water condensed in the cylindersC
fuel dilution of the lube oilD
air in the fuel system
考题
多选题Which of the following is a bus mastering method?()AA device transfers data directly to the memory.BA device handles mediation between the northbridge and the processor.CA device connects to another device without involving the processor.DA device transfers data to the processor and then on to the memory.EA device handles mediation between the southbridge and the processor
考题
单选题In a diesel engine cooling system, the high temperature alarm contact maker will be activated on excessively high water discharge temperature from the ()A
raw water pump dischargeB
expansion tank outletC
cooling water heat exchangerD
outlet engine jacket water outlet
考题
单选题A crew member reports that the high-pressure alarm light of a low-pressure CO2 fixed fire extinguishing system is illuminated. The most probable cause of this condition would be that().A
an air leak has developed in the tankB
the tank cooling system has malfunctionedC
the pilot cylinder discharge valve is leakingD
an excessive amount of insulation has been installed on the tank and piping
考题
单选题The wooden plug inserted in the vent of a damaged tank should be removed if you are going to ().A
pump from the damaged tankB
fight a fireC
abandon shipD
use the crossover system
考题
单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A
You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B
No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C
You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D
You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.
考题
单选题The wooden plug inserted in the vent of a damaged tank of a ship should be removed in case it is decided to().A
pump from the damaged tankB
fight a fireC
abandon the rigD
use the crossover system
考题
单选题Longitudinal and transverse separtions between the tanks,which are used to prevent liquids from leaking from one double bottom tank into the other ,are called().A
double bottomsB
cofferdamC
navigating bridgeD
superstructure
热门标签
最新试卷