网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
The best method to secure a towline to bitts is to().
A
take a round turn on the bitt farthest from the pull and use figure-eights
B
take a round turn on the bitt closest to the pull and use figure-eights
C
use figure-eights and take a round turn at the top of the bitts
D
use only figure-eights
参考答案
参考解析
解析:
暂无解析
更多 “单选题The best method to secure a towline to bitts is to().A take a round turn on the bitt farthest from the pull and use figure-eightsB take a round turn on the bitt closest to the pull and use figure-eightsC use figure-eights and take a round turn at the top of the bittsD use only figure-eights” 相关考题
考题
Which of the following is a secure method of remote access via command line?()
A.RCPB.TelnetC.RSHD.SSH
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
A.SSHB.WEPC.VPND.WPA
考题
In towing,chocks are used to ______.A.protect the towline from chafingB.secure the end of the towline on the tugC.stop off the towline while retrieving itD.absorb shock loading on the towline
考题
A tow astern is veering from side to side on its towline.The best way of controlling the action is to ______.A.Trim the tow by the bowB.Trim the tow by the sternC.List the tow to windwardD.Adjust the length of the towing bridle
考题
An ocean tow is sinking in deep water. Attempts to sever the towing hawser are unsuccessful Which action should now be taken?______.A.Abandon the towing vessel.B.Radio for emergency assistance.C.Slip the towline and allow it to run off the drum.D.Secure all watertight openings on the towing vessel.
考题
Which of these is the best way to provide sender non-repudiation?()A、 pre-sharedkeyB、 secure hashC、 SSLD、 RSA signature
考题
The recommended WAN Access method for a simplified and cost effective Cisco Single-site Secure Network Foundation Deployment provides which type of Service?()A、Low LatencyB、Best-EffortC、Guaranteed QualityD、Guaranteed Bandwidth
考题
Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
考题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses
考题
Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
考题
Which of the following is a secure method of remote access via command line?()A、RCPB、TelnetC、RSHD、SSH
考题
Which of the following protocols would BEST grant the user secure access to a remote location?()A、VPNB、FTPC、POP3D、DNS
考题
You need to recommend a BitLocker recovery method that meets the company’s technical requirements. Which recovery method should you recommend?()A、a data recovery agentB、a recovery keyC、a recovery password printed and stored in a secure locationD、a recovery password stored in Active Directory
考题
单选题The best method to secure a tow line to a cleat is to().A
take a turn around the cleat,then figure-eights,and a half-hitchB
make figure-eights,followed by a half-hitch,then a figure-eight knotC
take a turn,a half turn,and a figure-eightD
take several turns around the cleat only
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题In towing,chocks are used to().A
protect the towline from chafingB
secure the end of the towline on the tugC
stop off the towline while retrieving itD
absorb shock loading on the towline
考题
单选题You need to recommend a BitLocker recovery method that meets the company’s technical requirements. Which recovery method should you recommend?()A
a data recovery agentB
a recovery keyC
a recovery password printed and stored in a secure locationD
a recovery password stored in Active Directory
考题
单选题A towline should be fastened to().A
the chocks at the bow of a towed vesselB
the most forward,centermost point of a towed vessel such asa sturdy bow railC
the mast of a towed sailboatD
a secure fitting near the bow of the towed vessel
考题
单选题A towline should be fastened to().A
the chocks at the bow of a towed vesselB
the most forward,centermost point of a towed vessel such as a sturdy bow railC
the mast of a towed sailboatD
a secure fitting near the bow of the towed vessel
考题
单选题Which method should be used to secure a manila line to bitts().A
A round turn on the bitt farthest from the strain and then figure eightsB
A round turn on the bitt closest to the strain and then figure eightsC
Figure eights and then a round turn at the top of both bittsD
Only figure eights are necessary on both bitts
考题
单选题Which of these is the best way to provide sender non-repudiation?()A
pre-sharedkeyB
secure hashC
SSLD
RSA signature
考题
单选题If two mooring lines are to be placed on the same bollard,which method is BEST?().A
Place the eye from the forward line on the bollard and then place the eye from the second line directly over the firstB
It makes no difference how the lines are placedC
Place the eye from either line on the bollard,and then bring the eye of the other line up through the eye of the first,and place it on the bollardD
Place both eyes on the bollard,in any manner,but lead both lines to the same winch head on the vessel and secure them on the winch
考题
单选题A tow astern is veering from side to side on its towline. The best way of controlling the action is to().A
trim the tow by the bowB
trim the tow by the sternC
list the tow to windwardD
adjust the length of the towing bridle
考题
单选题It is good practice to use long towlines for ocean tows because the().A
wear on the towline is equalizedB
weight of the towline increases the towing forceC
dip in the towline absorbs shock loadsD
danger of overriding is reduced
考题
单选题Tugs sometimes shackle a length of chain in the towline in order to().A
take the wear should the towline drag bottomB
assure that if the towline is overstressed it will part close to the bridleC
prevent the towline from whipping should it partD
put spring in the towline
热门标签
最新试卷