网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
()are used to secure the two containers, one on top of the other.
- A、Turnbuckles
- B、Lashing bars
- C、Twist locks
- D、Lashing wires
参考答案
更多 “()are used to secure the two containers, one on top of the other.A、TurnbucklesB、Lashing barsC、Twist locksD、Lashing wires” 相关考题
考题
Which two statements regarding symmetric key encryption are true?() (Choose two.)
A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.
考题
Which of the following describes a secure connection over the Internet between two sites?()
A. FTPB. VLANC. VPND. HTTP
考题
Which two statements about zoning are correct? ()
A. Zoning increases security.B. DNS queries are used for software zoning.C. Software zoning is more secure than hardware zoning.D. When using zones and VSANs together, the zone is created first.E. Zoning requires that VSANs be established before it becomes operational.
考题
A lashing used to secure two barges side by side,lashed in an "X" fashion,is called a ______.A.scissor wireB.towing wireC.breast wireD.cross wire
考题
A "chock" is a ______.A.deck fitting used to secure mooring linesB.casting fitted at the side of a weather deck,used as a fairleadC.sharp block of wood used to support hygroscopic cargoD.smoke pipe for the galley stove
考题
Which statement about two lines spliced together is TRUE ________.A.Splicing is used to increase the circumference of each lineB.Splicing two lines together is stronger than knotting two lines togetherC.Splicing is used to increase the overall strength of the lineD.Splicing is used to prevent rotting of the lines bitter end
考题
Select the two correctstatements from the list below that describe DES and 3DES: ()A、 3DES is muchmore secure than DES.B、 Both DES and 3DES are stream ciphers.C、 DES uses 64 bitkeys, although the effective key lengthis only 56bits.D、 The decryption operation for both DES and 3DES is the same as the encryption operation.E、 DES can only be used for encryption, whereas 3DES can also be used for authentication.
考题
Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
考题
Which three mechanisms are used to secure management traffic from outside IPS sensors?()A、secure tunnelsB、a separate management VLANC、secure VLANs to isolate sensorsD、an out-of-band path around the firewallE、asymmetric traffic flows to isolate sensorsF、private VLANs to put all sensors on isolated ports
考题
Which two statements about zoning are correct? ()A、Zoning increases security.B、DNS queries are used for software zoning.C、Software zoning is more secure than hardware zoning.D、When using zones and VSANs together, the zone is created first.E、Zoning requires that VSANs be established before it becomes operational.
考题
What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet
考题
多选题Which two secure remote access methods are available on the WX platforms?() (Choose two.)ASSLBSSHCTelnetDHTTP
考题
单选题A chock is a().A
deck fitting used to secure mooring linesB
casting fitted at the side of a weather deck,used as a fairleadC
sharp block of wood used to support hygroscopic cargoD
smoke pipe for the galley stove
考题
单选题The fittings used to secure a watertight door are known as().A
clampsB
claspsC
dogsD
latches
考题
单选题Which step can be used to trap runtime script errors and recover gracefully?()A
Set B
Call Subflow C
On Exception Goto D
Get Reporting Statistic
考题
单选题Which encryption type is used to secure user data in an IPsec tunnel?()A
symmetric key encryptionB
asymmetric key encryptionC
RSAD
digital certificates
考题
单选题The enable secret command is used to secure access to which CLI mode?()A
user EXEC modeB
global configuration modeC
privileged EXEC modeD
auxiliary setup mode
考题
多选题Which two statements about the Cisco AutoSecure feature are true?()AAll passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.BCisco123 would be a valid password for both the enable password and the enable secret commands.CThe auto secure command can be used to secure the router login as well as the NTP and SSH protocols.DFor an interactive full session of AutoSecure, the auto secure login command should be used.EIf the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
考题
单选题A lashing used to secure two barges side by side,lashed in an "X" fashion,is called a ().A
scissor wireB
towing wireC
breast wireD
cross wire
考题
单选题What is the primary use of a remote access VPN?()A
to secure communication between two remote PCsB
to secure communication between two remote officesC
to secure communication betweenan remote PC and the corporate intranetD
to secure communication between a corporate intranet and the public internet
考题
单选题Which of the following describes a secure connection over the Internet between two sites?()A
FTPB
VLANC
VPND
HTTP
考题
多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
考题
单选题A deck fitting,used to secure line or wire rope,consisting of a single body with two protruding horns is called a().A
bittB
bollardC
capstanD
cleat
考题
单选题()are used to secure the second and the third tiers of containers.A
TurnbucklesB
Lashing barsC
Twist locksD
Lashing wires
考题
单选题()are used to secure the two containers, one on top of the other.A
TurnbucklesB
Lashing barsC
Twist locksD
Lashing wires
考题
单选题A device commonly used to secure the pendant wire when it is initially passed to an anchor handling vessel is().A
pelican hookB
connecting linkC
shackleD
retaining hook
考题
单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A
VLANB
Peer to PeerC
VTPD
VPN
考题
多选题Which two actions protect a resource file from direct HTTP access within a web application?()APlacing it in the /secure directoryBPlacing it in the /WEB-INF directoryCPlacing it in the /META-INF/secure directoryDCreating a element within the deployment descriptor
热门标签
最新试卷