网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
The canal must be wide enough to permit two of the largest boats using it to pass each other easily.It must be deep enough to leave about two feet of water( )the keel of the largest boat using the canal.
A.down
B.below
C.beneath
D.off
B.below
C.beneath
D.off
参考答案
参考解析
解析:beneath“在……以下(表示位置)”。A.down表示方向;B.below用于抽象概念;D.off则表示距离,不明指高低。
更多 “The canal must be wide enough to permit two of the largest boats using it to pass each other easily.It must be deep enough to leave about two feet of water( )the keel of the largest boat using the canal.A.down B.below C.beneath D.off” 相关考题
考题
The door is not ___ for the elephant to pass.30. The door is not ___ for the elephant to pass.A. wide enoughB. widely enoughC. enough wideD. enough widely
考题
In your multitenant container database (CDB) with two pluggable database (PDBs). You want to create a new PDB by using SQL Developer.Which statement is true?()
A. The CDB must be open.B. The CDB must be in the mount stage.C. The CDB must be in the nomount stage.D. Alt existing PDBs must be closed.
考题
Some canals,such as the Suez of the Panama,save ships weeks of time by making their voyage a thousand miles shorter.Other canals permit boats to reach cities that are not( )on the coast,still other canals drain lands where is too much water,help to irrigate fields where there is not enough water,and furnish water power for factories and mills.A.lain
B.stationed
C.set
D.located
考题
In this factory each worker must receive a()training course.A、two-monthB、twomonthsC、two-monthsD、two-months‘
考题
What are two important considerations when using 2- or 4-channel 15216 OADMs?() (Choose two.)A、All "Add" channels require uniform power levels.B、The flexibility of wavelengths per OADM is limited.C、It is easier to balance "Pass-Through" and "Add" channels.D、There is lower pass-through loss using multi-channel OADMs.E、You can extract a single channel without dropping other channels.
考题
he Clinton Howe Weights and Measures Company wants to send CDRs to a syslog server. Which two options are required?()A、The CDR collection must be enabled from the CLI. B、The syslog server IP address must be configured using the logging command. C、The CDRs must be sent to the syslog server using the gw-accounting syslog command. D、The logging file must be initialized using the logging buffered command.
考题
You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()A、The link is using IEEE 802.1Q protocolB、The link is using IEEE 802.1E protocolC、Spanning tree is disabledD、Not enough information to determineE、The native VLAN information is identical at each end of the linkF、The native VLAN information is different at each end of the link
考题
What are two requirements when using Packet Flow Acceleration? ()(Choose two.)A、Traffic needs be compressed.B、Quality of service must be enabled.C、A service tunnel must exist in at least one direction.D、PFA must be enabled on the client-side WX device.
考题
Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.
考题
Which of the following is true about an OSPF area border router (ABR)?()A、The ABR must have multiple interfaces connected to the backbone areAB、An ABR is a router with two interfaces, each connected to a different nonbackbone areAC、The only requirement to be considered an ABR is at least one interface connected to the backbone areAD、An ABR must have at least one interface in the backbone area plus at least one other interface in a nonbackbone areA
考题
While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls. What must be considered about HACMP in a firewall environment?() A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.
考题
You are using the control file to maintain information about the database backups that are being performed by Recovery Manager (RMAN).Identify two scenarios is which you must have a recovery catalog. ()(Choose two.)A、To store the backup information of multiple databaseB、To restrict the amount of space that is used by the backupsC、To maintain a backup for a certain time is set by the CONTROL_FILE_RECORD_KEEP_TIME parameter.D、To list the data files that were in a target database at a given time by using the AT option of REPORT SCHEMA command.
考题
Your network contains two Active Directory sites. The sites connect to each other by using a WAN link. You plan to deploy two Exchange Server 2010 Mailbox servers and two Client Access servers in eachsite. Each site will contain a Client Access array. You need to recommend a solution to deploy Hub Transport servers. The solution must meet the following requirements:.Continue to deliver e-mail messages to users in other sites if a single Hub Transport server fails .Support the planned Client Access array deployment.Minimize the number of Exchange servers What are two possible ways to achieve this goal?()A、Add the Hub Transport server role to each Mailbox server.B、Add the Hub Transport server role to each Client Access server.C、Deploy two Hub Transport servers on two new servers in each site.D、Deploy one Hub Transport server on a new server, and then install the SMTP service on each Client Access server.
考题
多选题What are two requirements when using AppFlow?() (Choose two.)AQuality of service must be enabled.BNSC compression must be enabled.CPFA's TCP Acceleration (AFP) must be enabled.DAppFlow must be configured on the client-side device first.
考题
多选题What are two requirements when using AppFlow? ()(Choose two.)AQuality of service must be enabled.BNSC compression must be enabled.CPFA's TCP Acceleration (AFP) must be enabled.DAppFlow must be configured on the client-side device first
考题
单选题During a stability test on a small passenger vessel().A
the vessel must be moored snuglyB
each tank must be partially full to show it does not leakC
all dunnage,tools,and extraneous items are securedD
water under vessel must be deep enough to prevent grounding
考题
多选题Which two about WAR files are true?()AWAR files must be located in the web application library directory.BWAR files must contain the web application deployment descriptor.CWAR files must be created by using archive tools designed specifically for that purpose.DThe web container must serve the content of any META-INF directory located in a WAR file.EThe web container must allow access to resources in JARs in the web application library directory.
考题
多选题Which two statements are true about Block Media Recovery (BMR)?()ABMR increases the Mean Time To Recover (MTTR).BBMR can only be implemented using Recovery Manager (RMAN).CThe blocks that need to be recovered are accessible during BMR.DBMR cannot be performed using cumulative incremental backups.EThe datafile must be restored if most of the blocks in the datafile are corrupt.
考题
多选题Which two statements are true regarding rescue configurations?()AOnce saved, a rescue configuration is loaded using the rollback 0 command.BThe rescue configuration must contain the minimal elements necessary to restore network connectivity.CA minimal rescue configuration is defined by default.DA rescue configuration must include a root password.
考题
多选题An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)AOnly main mode can be used for IKE negotiationBA local-identity must be definedCIt must be the initiator for IKEDA remote-identity must be defined
考题
多选题he Clinton Howe Weights and Measures Company wants to send CDRs to a syslog server. Which two options are required?()AThe CDR collection must be enabled from the CLI.BThe syslog server IP address must be configured using the logging command.CThe CDRs must be sent to the syslog server using the gw-accounting syslog command.DThe logging file must be initialized using the logging buffered command.
考题
单选题Your company has 10 offices. The offices connect to the Internet by using a WAN link. The offices connect to each other by using a VPN connection. An Active Directory site exists for each office. You plan to deploy Exchange Server 2010. Each site will contain two Exchange Server 2010 servers. You need to recommend the placement of domain controllers and global catalog servers to meet thefollowing requirements: .Minimize the number of domain controllers .Must be able to deliver e-mail messages between users of the same office, if a domain controller and a WAN link fail simultaneously What should you recommend?()A
In each site, install two global catalog servers.B
In each site, install two domain controllers. Enable Universal Group Membership caching for each site.C
In each site, install two domain controllers. Create a publishing point for an offline address list on one Exchange server in each site.D
In each site, install one domain controller that is configured as a global catalog server.Enable Universal Group Membership caching for each site.
考题
多选题You are a systems administrator responsible for managing a Windows Server 2008 Web Server Currently,there are no Web sites configured on the server. You need to configure the server to host two Web applications: Engineering App and Sales App. Both Web applications must be accessible by using HTTPport 80 without the use of host headers. Also, you must protect against problems in one Web applicationaffecting the performance or reliability of the other Web application. Which two steps should you take tomeet these requirements?()ACreate a single Web site that contains both Web applications.BCreate two Web sites, one for each Web application.CAssign both Web applications to the same application pool.DAssign each Web application to its own application pool.
考题
多选题What are two requirements when using Packet Flow Acceleration? ()(Choose two.)ATraffic needs be compressed.BQuality of service must be enabled.CA service tunnel must exist in at least one direction.DPFA must be enabled on the client-side WX device.
考题
单选题A fire main system must have enough fire hydrants so that each accessible space may be sprayed with().A
a low velocity spray applicatorB
a water spray or solid streamC
at least two spray patterns of waterD
at least 25 psi delivered pressure
考题
多选题Which two statements about login classes correctly define their usage within the JUNOS software?()AA different login class must be configured for each user.BIndividual commands can be explicitly allowed or denied.CA user must be assigned to one of the default login classes.DEach login class is associated with one or more permissions flags.
考题
多选题You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()AThe link is using IEEE 802.1Q protocolBThe link is using IEEE 802.1E protocolCSpanning tree is disabledDNot enough information to determineEThe native VLAN information is identical at each end of the linkFThe native VLAN information is different at each end of the link
热门标签
最新试卷