题目详情
当前位置:首页 > 职业技能鉴定考试 > 轮机英语
题目详情:
发布时间:2023-10-21 22:47:49

[单项选择]In the two stage flash distilling plant, which of the pumps listed is vented to the shell of the second stage in order to remove vapor from the pump suction?()
A. Condenser circulating water pump
B. Feed-water heater drain pump
C. Distillate pump
D. Air ejector condenser drain pump

更多"In the two stage flash distilling p"的相关试题:

[单项选择]Why will a two stage flash type distilling plant tend to operate more efficiently when operating in cold seawater?()
A. The colder seawater passing through the condenser tube bundles of the various stages increases evaporator vacuum
B. The amount of heated feed water discharged from the feed water heater after cndenser is increased
C. Fewer non-condensable gases are created by the flow of colder seawater
D. More seawater is allowed to pass through the flint stage overflow weir
[多项选择]Which two statements describe characteristics of IPv6 unicast addressing?()
A. Global addresses start with 2000::/3.
B. Link-local addresses start with FE00:/12.
C. Link-local addresses start with FF00::/10.
D. There is only one loopback address and it is ::1.
E. If a global address is assigned to an interface, then that is the only allowable address for the interface.
[多项选择]Which two statements describe the Cisco implementation of VLANs?()
A. VLAN 1 is the default Ethernet VLAN.
B. CDP advertisements are only sent on VLAN 1002.
C. By default, the management VLAN is VLAN 1005.
D. By default, the switch IP address is in VLAN 1005.
E. VLAN 1002 through 1005 are automatically created and cannot be deleted.
[多项选择]Which two statements about Cisco Security Management Suite are correct?()
A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
[多项选择]Which two statements about an interface configured with the asr-group command are correct?()
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
[多项选择]Which two data intergrity algorithms are commonly used in VPN solutions?()
A. HMAC-MD5
B. RSA
C. HMAC-SHA-1
D. DH1
E. DH2
[多项选择]Which two statements about the configuration of the switch interface are correct (Choose two)()。
A. The switchport belongs only to VLAN 2
B. Interface fa0/0 will be in both VLAN 1 (by default) and VLAN 2
C. The exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2
D. A network host can be connected to this interface
[多项选择]Which two statements about the Cisco Aironet Desktop Utility (ADU) are true()
A. The Aironet Desktop Utility (ADU )profile manager feature can create and manage only one profile for the wireless client adapter.
B. The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.
C. The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point , manage authentication to the wireless network , and enable encryption.
D. The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.
[多项选择]Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
A. CHAP uses a two-way handshake
B. CHAP authentication periodically occurs after link establishment
C. CHAP has no protection from playback attacks
D. CHAP authentication is performed only upon link establishment
E. CHAP uses a three-way handshake
F. CHAP authentication passwords are sent in plaintext
[多项选择]Which two wireless encryption methods are based on the RC4 encryption algorithm? ()
A. WEP
B. CCKM
C. AES
D. TKIP
E. CCMP
[多项选择]Which two of these correctly describe asymmetric routing and firewalls?()
A. only operational in routed mode
B. only operational in transparent mode
C. only eight interfaces can belong to an asymmetric routing group
D. operational in both failover and non-failover configurations
E. only operational when the firewall has been configured for failover
[多项选择] Which two code fragments correctly create and initialize a static array of int elements()
A. static final int[]a={100,200};
B. static final int[]a;static{a=new int[2];a[0]=100;a[1]=200;}
C. static final int[]a=new int[2]{100,200};
D. static final int[]a;static void int(){a=new int[3];a[0]=100;a[1]=200;}
[多项选择]Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies (Choose two.)()。
A. copier
B. microwave oven
C. toaster
D. cordless phone
E. IP phone
F. AM radio
[多项选择]Which two of these are recommended practices with trunks? ()
A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码