网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Transverse stability calculations require the use of().
A

hog or sag calculations or tables

B

hydrostatic curves

C

general arrangement plans

D

cross-sectional views of the vessel


参考答案

参考解析
解析: 暂无解析
更多 “单选题Transverse stability calculations require the use of().A hog or sag calculations or tablesB hydrostatic curvesC general arrangement plansD cross-sectional views of the vessel” 相关考题
考题 Which two functions require the use of the CLI?() (Choose two.) A. adding a VLANB. adding a clusterC. running a tcpdumpD. adding a target server

考题 Which of the following networks would MOST likely require EGP routing?() A. Networks that use OSPF in addition to static routesB. Networks with classless Internet domain routingC. Networks with multiple ISPsD. Networks that use encryption

考题 Which of the following DB2 objects are publicly referenced names that require no special authority or privilege to use them?() A.ViewB.AliasC.TableD.Package

考题 What are two characteristics of Frame Relay point-to-point subinterfaces?() A.They create split-horizon issuesB.They require a unique subnet within a routing domainC.They emulate leased linesD.They are ideal for full-mesh topologiesE.They require the use of NBMA options when using OSPF

考题 Free communication will adversely affect transverse stability only when the flooded space is ______.A.off-centerB.on the centerlineC.completely floodedD.open to the sea above and below the waterline

考题 Regulations define the bulkhead deck as ______.(subdivision and stability regulations)A.any deck extending from stem to sternB.the uppermost deck to which transverse watertight bulkheads extendC.the lowermost deck to which transverse watertight bulkheads extendD.the uppermost complete deck

考题 What are two characteristics of Frame Relay point-to-point subinterfaces?()A、They create split-horizon issuesB、They require a unique subnet within a routing domainC、They emulate leased linesD、They are ideal for full-mesh topologiesE、They require the use of NBMA options when using OSPF

考题 Which two Any Transport over MPLS (AToM) traffic encapsulations require the use of a control word?()A、HDLCB、ATM AAL5C、PPPD、Ethernet VLANE、Frame Relay

考题 After DUAL calculations, a router has identified a successor route, but no routes have qualified as a feasible successor. In the event that the current successor goes down, what process will EIGRP use in the selection of a new successor?()A、EIGRP will automatically use the route with the lowest advertised distance (AD) .B、The route will transition to the active state.C、The route will transition to the passive state.D、EIGRP will find the interface with the lowest MAC address.E、EIGRP will automatically use the route with the lowest feasible distance (FD).

考题 You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()A、Require employees to access e-mail only over connections that use SSLB、Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesC、Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailD、Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them

考题 Which of the following ATOM traffic encapsulations require the use of a Control Word?()A、Cell relayB、aal5C、Ethernet VLAND、Frame RelayE、HDLCF、PPP

考题 Which of the following statements regarding documentation would not be considered a helpful stepin the troubleshooting process?()A、Use the Cisco Auto Configuration toolB、Use the Cisco Rollback featureC、Automate documentationD、Schedule documentation checksE、Use the Cisco Configuration Archive toolF、Require documentation prior to a ticket being closed out

考题 Which of the following DB2 objects are publicly referenced names that require no special authority or privilege to use them?()A、ViewB、AliasC、TableD、Package

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to design an access control solution for customer information. Your solution must meet security requirements.What should you do?()A、Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web siteB、Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read  permission to the customer user accounts for the folder that contains the Web site filesC、Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communicationsD、Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption

考题 You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()A、Require the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSecB、Require the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0C、Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSLD、Require the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)E、Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec

考题 You use Microsoft .NET Framework 4 to create an application. The application performs resource-intensive calculations that consist of multiple layers of nested looping. The application will be deployed to servers that contain varying hardware configurations. You need to ensure that the application utilizes CPU resources on the server in the most efficient manner. You want to achieve this goal by using the minimum amount of code. What should you do?()A、Use multiple System.Threading.Thread objects.B、Use the background worker process (BWP).C、Use the Thread.BeginInvoke method.D、Use the Parallel.For method.

考题 单选题You work as an application developer at Certkiller .com. You are currently in the process of developing a business logic component that requires long calculations. You have identified numerous tasks within this application that can be done asynchronously. You notice that these tasks are mutually dependent and require complex synchronization techniques so that it can manage efficiently. You decide to use Microsoft .NET 2.0 to take advantage of its new thread management features. You need to create and start the application threads. What should you do?()A AB BC CD D

考题 单选题Your vessel is damaged with no list,but down by the stern. There is progressive flooding and trim by the stern is increasing. What is the effect on transverse stability after the deck edge at the stern is submerged?()A KB increases,increasing BM and therefore GMB KG increases due to the weight of the added water on deckC BM decreases from loss of water plane and greater volumeD There is no effect on transverse stability

考题 单选题Which statement is true about Kompella-based and Martina-based VPNs?()A Both use LDPB Both use BGPC Both require additional hardware.D Both use a two-label stack for forwarding.

考题 单选题Which of the following networks would MOST likely require EGP routing?()A Networks that use OSPF in addition to static routesB Networks with classless Internet domain routingC Networks with multiple ISPsD Networks that use encryption

考题 单选题Free communication will adversely affect transverse stability only when the flooded space is ().A off-centerB on the centerlineC completely floodedD open to the sea above and below the waterline

考题 多选题You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()ARequire the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSecBRequire the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0CRequire the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSLDRequire the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)ERequire the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec

考题 单选题What is NOT a problem area when loading barges on a LASH type vessel? ()A Frequent stability calculations requiredB Thorough pre-planning requiredC Limiting depths alongside berths restrict barge draftsD Minimum trim and 0°list are required for optimum operations

考题 多选题Which two functions require the use of the CLI?() (Choose two.)Aadding a VLANBadding a clusterCrunning a tcpdumpDadding a target server

考题 多选题What are two characteristics of Frame Relay point-to-point subinterfaces?()AThey create split-horizon issuesBThey require a unique subnet within a routing domainCThey emulate leased linesDThey are ideal for full-mesh topologiesEThey require the use of NBMA options when using OSPF

考题 多选题Which two Any Transport over MPLS (AToM) traffic encapsulations require the use of a control word?()AHDLCBATM AAL5CPPPDEthernet VLANEFrame Relay