网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which statement describes the shore between Watch Hill Point and Point Judith?
A.Low,rocky cliffs with heavily wooded hills inland
B.Sandy beaches broken by rocky points
C.Sand dunes and beaches with a mud and sand bottom
D.Wooded,barren hills with isolated prominent buildings
参考答案
更多 “ Which statement describes the shore between Watch Hill Point and Point Judith?A.Low,rocky cliffs with heavily wooded hills inlandB.Sandy beaches broken by rocky pointsC.Sand dunes and beaches with a mud and sand bottomD.Wooded,barren hills with isolated prominent buildings ” 相关考题
考题
While you are on watch entering port, the Master gives the helmsman a rudder command which conflicts with a rudder command from the Pilot. You should make sure the helmsman ______.A.obeys the PilotB.obeys the MasterC.asks you for instructionsD.brings the rudder to a point midway between the two conflicting positions
考题
A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()
A. MeshB. Point to pointC. Point to multipointD. Ring
考题
Which of the following network topologies BEST describes a VPN? ()(Select TWO)
A. Point to PointB. Point to MultipointC. VLAND. RingE. Bus
考题
The coastline between Point Judith and Watch Hill is ______.A.steep with rocky bluffsB.sandy and broken by rocky pointsC.low and marshyD.heavily forested
考题
At 0900,you take the following radar ranges: Watch Hill Point 5.4 miles; Block Island Grace Point 8.3 miles. Which statement is TRUE?A.You are within 3 nautical miles of the coastB.The bottom in the area is sand and gravelC.The fix is indeterminateD.You are governed by the Inland Rules
考题
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above
考题
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()A、 Real-time frame exchange is accomplished within the access point.B、 The control traffic between the client and the access point is encapsulated with the LWAPP. C、 Authentication, security, and mobility are handled by the access point.D、 Data traffic between the client and the access point is encapsulated with LWAPP.E、 None of the other alternatives apply
考题
Which statement describes the FIP function of the FCoE Initiation Protocol? ()A、 It is required to establish the point-to-point FCoE links with the first switch in the path.B、 It is required to establish the point-to-point FCoE links with any switch across multiple Ethernet segments.C、 It is not used to build the FCoE links.D、 It is used to ensure lossless transport.
考题
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()A、 Control traffic between an access point and a controller is encrypted within LWAPP.B、 Data traffic between an access point and a controller is encrypted within LWAPP.C、 Layer 3 mode packets are transmitted in TCP frames.D、 Data traffic between an access point and a controller is encapsulated within LWAPP.E、 VLAN tagging and QoS markings are applied at the access point.
考题
Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.C、 LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.D、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN
考题
Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.
考题
Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus
考题
A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()A、MeshB、Point to pointC、Point to multipointD、Ring
考题
多选题The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()AControl traffic between an access point and a controller is encrypted within LWAPP.BData traffic between an access point and a controller is encrypted within LWAPP.CLayer 3 mode packets are transmitted in TCP frames.DData traffic between an access point and a controller is encapsulated within LWAPP.EVLAN tagging and QoS markings are applied at the access point.
考题
单选题Which statement describes the shore between Watch Hill Point and Point Judith? ()A
Low,rocky cliffs with heavily wooded hills inlandB
Sandy beaches broken by rocky pointsC
Sand dunes and beaches with a mud and sand bottomD
Wooded,barren hills with isolated prominent buildings
考题
单选题Which of the following definitions can be used to define the term ‘offset ’ as a characteristic of controller action?()A
The period of time in which the set point and the control point coincideB
The periodic change between the set point and the control pointC
The variable difference between the set point and the control pointD
The constant difference between the set point and the control point
考题
单选题The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()A
Real-time frame exchange is accomplished within the access point.B
The control traffic between the client and the access point is encapsulated with the LWAPP. C
Authentication, security, and mobility are handled by the access point.D
Data traffic between the client and the access point is encapsulated with LWAPP.E
None of the other alternatives apply
考题
单选题The shoreline along Rocky Point should give a good radar return because().A
the shore is bluff and rockyB
of offshore exposed rocksC
submerged reefs cause prominent breakersD
the lookout tower is marked with radar reflectors
考题
单选题A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()A
MeshB
Point to pointC
Point to multipointD
Ring
考题
多选题Which two statements about a wireless repeater topology are true?()AA wireless repeater is an access point that is not connected to the wired LAN.BThe repeater feature is only available in lightweight access point topologies.CThe SSID of the root access point must be configured on the repeater access point.DThis topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.EThis topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.FTo avoid interference, the repeater access point must use a different channel from what the root access point uses.
考题
单选题While you are on watch entering port,the Master gives the helmsman a rudder command which conflicts with a rudder command from the Pilot.You should make sure the helmsman().A
Obeys the PilotB
Obeys the MasterC
Asks you for instructionsD
Brings the rudder to a point midway between the two conflicting positions
考题
单选题What is the significance of the broken magenta lines which roughly parallel the shore between Roanoke Point and Orient Point on Long Island().A
They mark the limits of breakers in that areaB
These lines warn the mariner of submerged rocksC
They mark the boundary lines of fish trap areasD
These lines warn the mariner of submerged pipelines
考题
单选题The coastline between Point Judith and Watch Hill is().A
steep with rocky bluffsB
sandy and broken by rocky pointsC
low and marshyD
heavily forested
考题
单选题Which of the following statements describes the relationship between flash point and ignition temperature?()A
Both are higher than normal burning temperaturesB
The flash point is always higherC
The ignition temperature is always higherD
They are not necessarily related
考题
单选题At 0900,you take the following radar ranges: Watch Hill Point 5.4 miles; Block Island Grace Point 8.3 miles. Which statement is TRUE? ()A
You are within 3 nautical miles of the coastB
The bottom in the area is sand and gravelC
The fix is indeterminateD
You are governed by the Inland Rules
考题
单选题Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A
The data traffic between the access point and controller is not encrypted.B
The data traffic is encapsulated with LWAPP.C
The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D
The data traffic is encrypted with AES.E
All of the above
考题
单选题Which statement describes the FIP function of the FCoE Initiation Protocol? ()A
It is required to establish the point-to-point FCoE links with the first switch in the path.B
It is required to establish the point-to-point FCoE links with any switch across multiple Ethernet segments.C
It is not used to build the FCoE links.D
It is used to ensure lossless transport.
热门标签
最新试卷