考题
Which statement is True?A.The Port State Control Officer has no right to check a SSPB.The Master has the right to refuse the request from a Port State Control Officer to check the confidential part of the SSP on boardC.The Confidential part of a SSP can never be subject to non-flag StateD.Even the flag State has no right to check the SSP thoroughly
考题
Acustomer’sSANenvironmenthasundergonesignificantgrowthoverthepasttwoyears.Theyhavealsosufferedahighturnoverratewithadministrativepersonnel.ThecustomerhasaskedastoragespecialistforhelpindocumentingandunderstandingtheirchangingSANenvironment.Theabilitytomakeconfigurationchangestodeviceswouldbeaplus.Whichtoolshouldthestoragespecialistsuggest()A.TivoliStorageProductivityCenterFabricManagerB.TivoliStorageProductivityCenterBasicEditionC.IBMTivoliNetViewD.DiskMagic
考题
Acustomer’snewIBMSystemStorageDS8000mustberaisedbytwofloorsinthebuildingtoplaceitinthecomputerroom.Inordertosimplifythephysicaldelivery,thestoragespecialistasksfor()
A.aquotationforextradeliveryservicesB.theadditiontotheconfigurationofthefeatureShippingweightreductionatnochargeC.anorderoftheDS8000withtheminimumnumberofdrivesetsallowedandanMESorderfortheremainingdrivesetsneededD.anRPQordertoreceiveframesanddrivesetsseparately
考题
Acustomer’ssmallheterogeneousenterprisehasgrownovertimetomorethan500clientsystems,andtheadministratorcannotaddnewserverstothemanagementdatabase.Whichofthefollowingisthemostlikelysourceoftheproblem?()
A.Themanagementserverhasreacheditssizelimitation.B.Additionalagentlicensesmustbepurchased.C.TheCPUandMemoryrequirementsneedtobeupgraded.D.ThedefaultJETdatabasehasreacheditssizelimitation.
考题
My vessel is healthy and I request free pratique.What does the sentence My vessel is healthy mean?It means: ______.A.My ship has been maintainedB.My ship has been paintedC.All my crew members have been vaccinatedD.All my crew members have no quarantinable diseases
考题
At ______ an occasional survey has been carried out.A.the remind of the masterB.the refer of the masterC.the render of the masterD.the request of the master
考题
What is the purpose of the e-mail? ( )A.To explain that an investigation takes five days to complete
B.To acknowledge that the claim has been received
C.To inform Ms. Waring that her claim will likely be approved
D.To request more information about the claim
考题
Why did Mr. Brown write the letter?A.To request an overdue payment
B.To ask for an extension on payment due
C.To notify the client that the account has been settled
D.To offer a special type of a service
考题
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller
考题
Which HTTP method has the characteristic that multiple indential requests may produce side effect beyond those of a single request()?A、 PUTB、 GETC、 INFOD、 POSTE、 HEADF、 TRACE
考题
A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()A、 probe request/response, authentication request/response, association request/responseB、 association request/response, authentication request/response, probe request/responseC、 probe request/response, association request/response, authentication request/responseD、 association request/response, probe request/response, authentication request/response
考题
A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A、FacadeB、View HelperC、Transfer ObjectD、Intercepting FilterE、Composite Facade
考题
Your company’s organization is authoritative for the contoso.com domai.Your network contains a Windows Server 2008 R2 certification authority (CA).You have an Exchange Server 2010 server named Server1.Server1 has the Client Access, Hub Transport, and Mailbox server roles installed. You plan to create a Federated Sharing relationship between your company and another company named Northwind Traders.Northwind Traders has an internal root CA.You need to install a certificate that can be used to create the federated trust.The solution must minimize costs. What should you do from Server1?()A、Generate a self-signed certificate.B、Request a Computer certificate from the contoso.com CAC、Create a computer certificate request and submit the request to a third-party trusted CAD、Create a computer certificate request and submit the request to the Northwind Traders CA
考题
单选题My vessel is healthy and I request free pratique.What does the sentence My vessel is healthy mean?It means;().A
My ship has been maintainedB
My ship has been paintedC
All my crew members have been vaccinatedD
All my crew members have no quarantinable diseases
考题
单选题For debugging purposes, you need to record how many times a given JSP is invoked before the user’ssession has been created. The JSP’s destroy method stores this information to a database. Which JSPcode snippet keeps track of this count for the lifetime of the JSP page?()A
%! int count = 0; %% if ( request.getSession(false) == null ) count++; %B
%@ int count = 0; %. % if ( request.getSession(false) == null ) count++; %C
% int count = 0;. if ( request.getSession(false) == null ) count++; %D
%@ int count = 0;. if ( request.getSession(false) == null ) count++; %E
%! int count = 0;. if ( request.getSession(false) == null ) count++; %
考题
单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A
Transfer ObjectB
Session FacadeC
Intercepting FilterD
Template MethodE
Model-View-Controller
考题
单选题On the wireless LAN, A client is searching for an access point (AP). What is the correct processorder that this client and access point goes through in order to create a connection?()A
association request/response, probe request/response, authentication request/responseB
association request/response, authentication request/response, probe request/responseC
probe request/response, authentication request/response, association request/responseD
probe request/response, association request/response, authentication request/responseE
None of the other alternatives apply
考题
单选题A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A
FacadeB
View HelperC
Transfer ObjectD
Intercepting FilterE
Composite Facade
考题
单选题The sales team has just sold the first pSeries solution to a Windows NT customer. The team has identified concerns with a non-existent backup strategy and some workable environmental issues. In addition to these concerns,what other major concern should be considered?()A
Customer skill levelB
Hardware availabilityC
Lack of executive sponsorshipD
Hardware and software compatibility
考题
单选题A client is searching for an access point (AP). What is the correct process order that the client and access point go through to create a connection?()A
probe request/response, authentication request/response, association request/responseB
association request/response, authentication request/response, probe request/responseC
probe request/response, association request/response, authentication request/responseD
association request/response, probe request/response, authentication request/response
考题
单选题Which HTTP method has the characteristic that multiple indential requests may produce side effect beyond those of a single request()?A
PUTB
GETC
INFOD
POSTE
HEADF
TRACE
考题
多选题现代营销管理追求的4C是指()。ACustomer’swantsandneedsBCosttosatisfywantsandneedsCConveniencetobuyDConnection
考题
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost. What should you do?()A
You need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted caB
You need to use -sr15 and generate a self-signed certificateC
You need to use request a computer certificate from the Company.com.com ca from -sr15D
You need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca
考题
单选题Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated by the servlet to the JSP;furthermore, that JSP uses a custom tag and must also process this information. This information mustNOT be accessible to any other servlet, JSP or session in the webapp. How can you accomplish this goal?()A
Store the data in a public instance variable in the servlet.B
Add an attribute to the request object before using the request dispatcher.C
Add an attribute to the context object before using the request dispatcher.D
This CANNOT be done as the tag handler has no means to extract this data.
考题
单选题At()an occasional survey has been carried out.A
the remind of the masterB
the refer of the masterC
the render of the masterD
the request of the master
考题
单选题It may be inferred from the passage that _____.A
customer service in Israel is now improvingB
wealthy Israeli customers are hard to pleaseC
the tourist industry has brought chain stores to IsraelD
Israeli customers prefer foreign products to domestic ones
考题
单选题Your company’s organization is authoritative for the contoso.com domai.Your network contains a Windows Server 2008 R2 certification authority (CA).You have an Exchange Server 2010 server named Server1.Server1 has the Client Access, Hub Transport, and Mailbox server roles installed. You plan to create a Federated Sharing relationship between your company and another company named Northwind Traders.Northwind Traders has an internal root CA.You need to install a certificate that can be used to create the federated trust.The solution must minimize costs. What should you do from Server1?()A
Generate a self-signed certificate.B
Request a Computer certificate from the contoso.com CAC
Create a computer certificate request and submit the request to a third-party trusted CAD
Create a computer certificate request and submit the request to the Northwind Traders CA