网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A password is made up of two letters followed by two single-digit numbers. If a person is assigned a password at random, what is the probability, rounded to the nearest hundredth, that the password uses only even digits for the numbers?
A

0.25

B

0.35

C

0.5

D

0.15

E

0.1


参考答案

参考解析
解析:
There are a total of 26 ×26 ×10 ×10 = 67,600 possible passwords, of which 26 ×26 ×5 ×5 = 16,900 use only even digits. P (even digits)= 16900/67,00==0.25
更多 “单选题A password is made up of two letters followed by two single-digit numbers. If a person is assigned a password at random, what is the probability, rounded to the nearest hundredth, that the password uses only even digits for the numbers?A 0.25B 0.35C 0.5D 0.15E 0.1” 相关考题
考题 Which two statements are true about encrypting RMAN backup?() A. The transparent encryption of backups uses the encryption walletB. The database uses the same encryption key for every encrypted backupC. The password encryption of backups only uses the password while creating and restoring backupD. If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 Which two statements are true about encrypting RMAN backup?() (Choose two.) A. The transparent encryption of backups uses the encryption walletB. The database uses the same encryption key for every encrypted backupC. The password encryption of backups only uses the password while creating and restoring backupD. If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 A technician turns on a PC and before the computer boots up, the technician is prompted for apassword. The technician does not know the password. Which of the following can the techniciando to allow access to the PC?() (Select TWO).A. Set the clear password jumper on the motherboardB. Enter the BIOS setup and select the clear password settingC. Remove the power cord from the power supply and then plug it back inD. Power cycle the PCE. Remove the CMOS battery for 15 minutes

考题 What is the effect of using the service password-encryption comma()。 A.Only the enable password will be encrypted.B.Only the enable secret password will be encrypted.C.Only passwords configured after the command has been entered will be encrypted.D.It will encrypt the secret password and remove the enable secret password fromthe configuration.E.It will encrypt all current and future passwords.

考题 What is the effect of using the service password-encryption command?() A.Only passwords configured after the command has been entered will beencrypted.B.Only the enable password will be encrypted.C.Only the enable secret password will beencryptedD.It will encrypt the secret password and remove the enable secret password from the configuration.E.It will encrypt all current and future passwords.

考题 What is the effect of using the service password-encryption command?()A、Only passwords configured after the command has been entered will beencrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will beencryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.

考题 What is the effect of using the service password-encryption command?()A、nly passwords configured after the command has been entered will be encrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will be encryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.

考题 What is the effect of using the service password-encryption command?()A、only passwords configured after the command has been entered will be encryptedB、Only the enable password will be encryptedC、Only the enable secret password will be encryptedD、It will encrypt the secret password and remove the enable secret password from the configurationE、It will encrypt all current and future passwords.

考题 A technician turns on a PC and before the computer boots up, the technician is prompted for apassword. The technician does not know the password. Which of the following can the techniciando to allow access to the PC?() (Select TWO).A、Set the clear password jumper on the motherboardB、Enter the BIOS setup and select the clear password settingC、Remove the power cord from the power supply and then plug it back inD、Power cycle the PCE、Remove the CMOS battery for 15 minutes

考题 You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()A、 Delegate the password management controls to the help desk staff.B、 Delegate the password management controls to the Domain Users group.C、 Configure the Default Domain Policy to enforce password expiration settings.D、 Configure the Default Domain Controller Policy to enforce password expiration settings.

考题 A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide

考题 What is the effect of using the service password-encryption command?()A、Onl ypasswords configured afte rthe command has been entered will be encrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will be encryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.

考题 What are three benefits of GLBP?()A、GLBP supports up to eight virtual forwarders per GLBP groupB、GLBP supports clear text and MD5 password authentication between GLBP group membersC、GLBP is an open source standardized protocol that can be used with multiple vendorsD、GLBP supports up to 1024 virtual routersE、GLBP can load share traffic across a maximum of four routersF、GLBP elects two AVGs and two standby AVGs for redundancy

考题 Which of the following is the MOST secure method to authenticate users?()A、User ID, a strong password, and a fingerprint scannerB、User ID, a strong password, and a token based deviceC、User ID and two levels of strong password requirementsD、User ID, a strong password, and a smart card

考题 Which two statements regarding external authentication servers for firewall userauthentication are true?()A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be used simultaneously.C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

考题 Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be used simultaneously.C、If the local password database is not configured in the authentication order, and the configured authentication server bypassed.D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

考题 Which two statements are true about encrypting RMAN backup?()A、 The transparent encryption of backups uses the encryption walletB、 The database uses the same encryption key for every encrypted backupC、 The password encryption of backups only uses the password while creating and restoring backupD、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings.   Company security policy requires a complex password for unlocking the Windows Mobilebased devices.   You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy.   Which two actions should you perform?()A、Enter all mobile device users in the Exceptions list.B、Enable the Require both numbers and letters option.C、Enable the Allow access to devices that do not fully support password settings option.D、Enable the Minimum password length (characters) option. Configure a value of 6 or greater.

考题 Which two statements are true about encrypting RMAN backup?() (Choose two.)A、The transparent encryption of backups uses the encryption walletB、The database uses the same encryption key for every encrypted backupC、The password encryption of backups only uses the password while creating and restoring backupD、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 单选题Which of the following is the MOST secure method to authenticate users?()A User ID, a strong password, and a fingerprint scannerB User ID, a strong password, and a token based deviceC User ID and two levels of strong password requirementsD User ID, a strong password, and a smart card

考题 单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A The user has a UID less than 200B The user has been defined as an administrative userC The file /usr/es/sbin/cluster/clpasswd is not executable by the userD The user needs explicit authorization to change their password cluster-wide

考题 多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

考题 单选题You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name/password for first account: pentest/P@ssw0rdUser name/password for second account: hacktest/password You need to provide the information security team with the requested access to SQL1.  Which Transact-SQL script should you use?()A CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'B CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFFC CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]D CREATE LOGIN [CONTOSO/pentest]FROM WINDOWS CREATE LOGIN [CONTOSO/hacktest]FROM WINDOWS 

考题 单选题You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()A  executing the SET PASSWORD command and then the SAVE_CONFIG commandB  executing the CHANGE_PASSWORD command and then the SAVE_CONFIG commandC  executing the CHANGE_PASSWORD command and then the SET PASSWORD commandD  executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command

考题 单选题The validate_password plugin is loaded and displays the following settings in global variables: Mysql> SHOW VARIABLES LIKE ‘validate_password%’; When attempting to set your password, you get the following error: Mysql> SET PASSWORD = PASSWORD (‘Hoverl@%’); ERROR 1819 (HY000): Your password does not satisfy the current policy requirements What is the cause of the error?()A The password is eight characters long, but needs to exceed validate_password_length to be validB All of the MEDIUM password policy requirements have not been honoredC The password matches a substring Hover as a dictionary wordD The password does not match the validate_passoword_number_count requirementE There is no dictionary file defined, so password validation cannot work as expected

考题 单选题What is the effect of using the service password-encryption command?()A only passwords configured after the command has been entered will be encryptedB Only the enable password will be encryptedC Only the enable secret password will be encryptedD It will encrypt the secret password and remove the enable secret password from the configurationE It will encrypt all current and future passwords.

考题 多选题A technician turns on a PC and before the computer boots up, the technician is prompted for apassword. The technician does not know the password. Which of the following can the techniciando to allow access to the PC?() (Select TWO).ASet the clear password jumper on the motherboardBEnter the BIOS setup and select the clear password settingCRemove the power cord from the power supply and then plug it back inDPower cycle the PCERemove the CMOS battery for 15 minutes