网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An alarm device inserted between the deaerating tank and the expansion tank can notify the on-watching crew that ()
A

the expansion tank is lack of water

B

the expansion tank is over flowing

C

there is something wrong with the cooling system

D

there is something wrong with the engine


参考答案

参考解析
解析: 暂无解析
更多 “单选题An alarm device inserted between the deaerating tank and the expansion tank can notify the on-watching crew that ()A the expansion tank is lack of waterB the expansion tank is over flowingC there is something wrong with the cooling systemD there is something wrong with the engine” 相关考题
考题 An alarm device inserted between the deaerating tank and the expansion tank can notify the on-watching crew that .A.the expansion tank is lack of waterB.the expansion tank is over flowingC.there is something wrong with the cooling systemD.there is something wrong with the engine

考题 In the following statements about the principle of the low level controlling, which is WRONG? 0 A.Low level is monitored on the drain tank and header tank.B.If there is high differential the filters pressure across the circulatingpumps is alarmedC.The lubricating oil purifier cannot take oil from the drain tankD.If the sea water pressure falls, this also operates an alarm

考题 Which device is installed in user devices and makes wireless connections between them and a network?() A.Access pointB.BridgeC.RouterD.Client adapter

考题 A device which prints out a permanent record of the plant operating conditions is known as the ______.A.ana(名言集) loggerB.bell loggerC.alarm loggerD.data logger

考题 The wooden plug inserted in the vent of a damaged tank should be removed if you are going to ______.A.pump from the damaged tankB.fight a fireC.abandon shipD.use the crossover system

考题 To ensure proper seating when closing a valve on a tank,the valve should be ______.A.Set up as tight as possible by handB.Set up tight using a valve wrenchC.Closed,opened a half turn,and then closedD.Closed against the stop and the locking pin inserted

考题 In which two locations in an enterprise network can an IPS sensor be placed?()A、bridging VLANs on two switchesB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunkingE、between a Layer 2 device and a Layer 3 device withtrunking

考题 You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

考题 完成A接口倒换后,BSC出现2992错误(BTS AND TC UNSYNCHRONIZATION CLEAR CALLS ON A INTERFACE alarm),说明A接口可能存在哪类问题()A、A interface exist crossconnect circuitB、inconsistent CCSPCM between BSC and MSCC、A interface exist loop circuitD、inconsistent circuit number in circuit group between BSC and MSC

考题 NE5000E/NE80E/NE40E收集信息的常用命令()。A、Display versionB、Display alarm a11C、Display currentD、Display device

考题 Which device is installed in user devices and makes wireless connections between them and a network?()A、Access pointB、BridgeC、RouterD、Client adapter

考题 In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking

考题 In Any Transport over MPLS (AtoM) Control word is an optional 4-byte field used in the pseudowire packet.The control word carries generic and Layer 2 payload-specific information to emulate L2 packets correctly.In pseudowire packet, where is this Control Word inserted?()A、Inserted between the MPLS label stack and the Layer 3 payloadB、Inserted between the MPLS label stack and the Layer 3 HeaderC、Inserted between the MPLS label stack and the Layer 2 payloadD、Inserted between the MPLS label stack and the Layer 2 header

考题 Which of the following is a bus mastering method?()A、 A device transfers data directly to the memory.B、 A device handles mediation between the northbridge and the processor.C、 A device connects to another device without involving the processor.D、 A device transfers data to the processor and then on to the memory.E、 A device handles mediation between the southbridge and the processor.

考题 单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G None of the other alternatives apply

考题 单选题If the overflow tank high-level alarm sounds while the fuel oil tanks are being topped off, the engineer should ().A close the static leg filling valveB close the overflow tank falling valveC reduce the fuel oil pumping rateD stop the fuel oil pumping operation

考题 单选题The radiotelegraph alarm signal is().A SOS sent three timesB ten one-second dashes with a four-second interval between themC twelve four-second dashes with a one-second interval between themD twelve one-second dashes with a short interval between them

考题 单选题Shims of different thicknesses are inserted between the shells to enable adjustment of ().A the bearing clearancesB the bearing thicknessC the bearing strengthD the bridge hardness

考题 单选题The inner bottom is the().A tank topB compartment between the tank top and shell of the vesselC inner side of the vessel's shellD space between two transverse bottom frames

考题 单选题The amount of LFG that may be loaded into a given tank is determined by().A checking the loading sheetB loading to within 1 percent of outageC loading to within 10 percent of the safety relief valve settingD filling to the maximum level indicated on the liquid level gaging device

考题 单选题If the low level alarm of the diesel fuel day tank fails to function, you can expect trouble from()A overheated injection pumpsB water condensed in the cylindersC fuel dilution of the lube oilD air in the fuel system

考题 多选题Which of the following is a bus mastering method?()AA device transfers data directly to the memory.BA device handles mediation between the northbridge and the processor.CA device connects to another device without involving the processor.DA device transfers data to the processor and then on to the memory.EA device handles mediation between the southbridge and the processor

考题 单选题In a diesel engine cooling system, the high temperature alarm contact maker will be activated on excessively high water discharge temperature from the ()A raw water pump dischargeB expansion tank outletC cooling water heat exchangerD outlet engine jacket water outlet

考题 单选题A crew member reports that the high-pressure alarm light of a low-pressure CO2 fixed fire extinguishing system is illuminated. The most probable cause of this condition would be that().A an air leak has developed in the tankB the tank cooling system has malfunctionedC the pilot cylinder discharge valve is leakingD an excessive amount of insulation has been installed on the tank and piping

考题 单选题The wooden plug inserted in the vent of a damaged tank should be removed if you are going to ().A pump from the damaged tankB fight a fireC abandon shipD use the crossover system

考题 单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

考题 单选题The wooden plug inserted in the vent of a damaged tank of a ship should be removed in case it is decided to().A pump from the damaged tankB fight a fireC abandon the rigD use the crossover system

考题 单选题Longitudinal and transverse separtions between the tanks,which are used to prevent liquids from leaking from one double bottom tank into the other ,are called().A double bottomsB cofferdamC navigating bridgeD superstructure