网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
All marine low-speed diesels are of what design ________.
A.Four-stroke
B.Two-stroke
C.Electronic ignition
D.Forced exhaust
参考答案
更多 “ All marine low-speed diesels are of what design ________.A.Four-strokeB.Two-strokeC.Electronic ignitionD.Forced exhaust ” 相关考题
考题
— Alice, your hair design is really nice. —________________.A.No, noB.Yours is niceC.Thank you very muchD.My hair design is not nice at all
考题
Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?()A.The design will function as intendedB.Spanning-tree will need to be used.C.The router will not accept the addressing scheme.D.The connection between switches should be a trunk.E.The router interfaces must be encapsulated with the 802.1Q protocol.
考题
What requires a Report of Marine Accident,Injury or Death?A.Collision with a bridgeB.Injury beyond first aidC.loss of lifeD.All of the above
考题
The damage to a vessel is over $25,000. Who must notify the nearest Coast Guard Marine Safety or Marine Inspection Office as soon as possible?A.The Master of the vesselB.The Radio OfficerC.The Chief OfficerD.All of the above
考题
Weather information is available from ______.A.Commercial radio broadcastsB.The Coast Guard on scheduled marine information broadcastsC.VHF-FM continuous marine weather broadcasts provided by the National Weather ServiceD.All of the above
考题
When a teacher makes a lesson plan, he should do all of the following EXCEPT_____________
A.design techniques that have easy and difficult aspects of items
B.try to design techniques that involve all students
C.take into consideration the different demands and needs of all students
D.cater only to the top range students to make sure the progress of teaching
考题
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons
考题
The partial loss of or damage to the cargo is not recoverable from the insurer resulting from natural calamities under()in PICC Ocean Marine Cargo Clauses.A、All RisksB、FPAC、WAD、All Risks+War Risks
考题
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers
考题
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
考题
You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age
考题
单选题Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?()A
The design will function as intendedB
Spanning-tree will need to be used.C
The router will not accept the addressing scheme.D
The connection between switches should be a trunk.E
The router interfaces must be encapsulated with the 802.1Q protocol.
考题
单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A
Encrypt customer information when it is stored and when it is being transmittedB
Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC
Encrypt all marketing information on file servers and client computersD
Require encrypted connections to all file servers
考题
单选题What is NOT required on an uninspected towing vessel? ()A
Certificate of DocumentationB
Certificate of InspectionC
Operators Merchant Marine licenseD
FCC Station License
考题
单选题What action should you be prepared to take when verifying a security solution?()A
having alternative addressing and VLAN schemesB
having a rollback plan in case of unwanted or unexpected resultsC
running a test script against all possible security threats to insure that the solution will mitigate all potential threatsD
isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system
考题
单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A
On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB
On all client computers, implement logon auditing for all user account logonsC
On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD
On all domain controllers, implement logon auditing for all user account logons
考题
单选题Most marine biological sewage treatment plants consist of all the following statements except ().A
aeration tanksB
settling tanksC
disinfection agentD
anaerobic bacteria
考题
单选题What requires a Report of Marine Accident,Injury or Death?()A
Collision with a bridgeB
Injury beyond first aidC
loss of lifeD
All of the above
考题
多选题What are two benefits of the modular design of the Junos OS?()AEach module uses application-specific integrated circuits (ASICs).BEach module runs in its own protected memory space.CEach module can be individually restarted.DEach module is supported across all Junos platforms.
考题
多选题Consider each of the choices separately and select all that apply. According to the author, what did Giovanni Riccioli do wrong?ANamed moon structures for bodies of waterBMistook lava flows for marine featuresCRenamed objects on Grimaldi’s lunar map
考题
单选题You need to design access to e-mail by Internet users. What should you do?()A
Configure front-end servers to use HTTP to communicate with back-end serversB
Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversC
Require all users to encrypt all outbound e-mail messagesD
Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access
考题
单选题The development of () has kept pace with the increasing demands made by the steady rise in power produced by modem marine diesels.A
waterB
fresh airC
oilsD
gases
考题
单选题Most medium and slow speed diesels are started by what medium?()A
Electric starting motorsB
HydraulicsC
Compressed airD
Ether
考题
单选题Most large, low-speed, main propulsion diesel engines use duplex lube oil strainer to ()A
decrease the time required between cleaningsB
removes all large and small foreign objectsC
ensure a positive flow of oil at all timesD
ensure that all lube oil has been treated twice
热门标签
最新试卷