网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as ( ).

A.E-mail
B.Internet
C.network
D.protocols

参考答案

参考解析
解析:为成功地传输数据,发送设备和接收设备必须遵循一套信息交换的通信规则。这些规则称为协议。
更多 “For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as ( ).A.E-mail B.Internet C.network D.protocols ” 相关考题
考题 When we are in a social gathering, we must be aware of the rules and procedures that govern the way things are going to proceed. These rules and procedures are technically called(). A、anecdotesB、schema (schemas)C、gesturesD、goals

考题 One of the responsibilities of the Coast Guard is to make sure that all ships _______ follow traffic rules in busy harbors.A cautiously B dutifully C faithfully D skillfully

考题 In data communication, data link is those parts of two data terminal equipments that are controlled by a protocol along with the(71) data circuit, which together enable data(72). So-called protocol means, in short, a set of rules that determines the behavior. of functional units in achieving communication.Data circuit, however, consists of a pair of(73) transmission channels that provides a means of two-way data transmission. Between data switching exchanges, the data circuit may or may not include data circuit-terminating equipment (DCE), depending on the type of(74) used at the data switching exchange. Between a data station and a data switching exchange or data concentrator, the data circuit includes the DCE at the data station end, and may include equipment(75) to a DCE at the data switching exchange or dam concentrator location.A.handshakingB.interconnectingC.linkageD.joining

考题 A local-area network(LAN)is a communications network that(125)a variety of devices and provides a(126)for information exchange among those devices. The scope of the LAN is small typically a single building or a cluster(丛)of buildings. The LAN is usually owned by the same organization that owns the(127)devices. The internal data rate of LAN is at least several Mb/s.The basic of LAN communication is broadcasting. At each station, there is a transmitter/receiver that communicates over a(128)shared, By other stations. A transmission from any one station is(129)to and received by all other stations.A.broadcastB.cableC.controlD.interconnectsE.internet

考题 For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as( ).A.E-mail B.Intemet C.network D.protocols

考题 We must abide by the rules.A: stick toB: persist inC: safeguardD: apply

考题 For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information.These rules are known as______.A.E-mail B.Internet C.network D.protocols

考题 Under the terms of the contract,you must give 3 months' notice before you leave.A: subjects B: expressions C: words D: rules

考题 When setting an access point to a non-root role, what two parameters,other than Role in theRadio Network,must be configured on the SSID Manager page?()A、Infrastructure devices to associate only to this SSIDB、Enable IP redirection on this SSIDC、Set Data Beacon RateD、Multiple Basic Service Set Identification (BSSID)E、Set infrastructure SSID

考题 You work as the exchange administrator at Testking.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com. Currently Microsoft Office Outlook is used by all TestKing.com users to connect to their mailboxes. Thecompliance policy of the organization states that a copy of messages sent to the Finance department fromthe Internet is archived. The archived e-mails need to be stored on a third-party archival server. You areinstructed to recommend a solution that will comply with the set criteria. What should you do?()A、You should include Retention Policies.B、You should include Transport Protection Rules.C、You should include Personal archives.D、You should include Journal rules.

考题 A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems. The service has the following requirements: It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding. It must interoperate with systems that use SOAP but are not built on the .NET plafform. You need to configure the service to support these requirements. Which message encoding should you use?()A、Binary message encodingB、MTOM (Message Transmission Optimization Mechanism) message encodingC、Text message encoding with message version set to noneD、Text message encoding with message version set to SOAP 1.2

考题 Windows Communication Foundation (WCF) application uses a data contract that has several data members. You need the application to throw a Serialization Exception if any of the data members are not present when a serialized instance of the data contract is deserialized. What should you do?()A、 Add the Known Type attribute to the data contract.Set a default value in each of the data member declarations.B、 Add the Known Type attribute to the data contract.Set the Order property of each data member to unique integer value.C、 Set the Emit Default Value property of each data member to false.D、 Set the Is Required property of each data member to true.

考题 You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices.  You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month.  What should you do?()A、Create a Data Collector Set.B、Install and run the Exchange Server User Monitor (ExMon).C、Export and review the Internet Information Services (IIS) logs.D、Enable User Agent logging, and then review the agent logs.

考题 You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. What actions must you take to stop a user named Mia Hamm from removing information from her mailbox?()A、You must use log transactions.B、You must use a legal hold.C、You must use Outlook Protection Rules.D、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true.

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network has a DNS server named XXX-SR04.What actions must you take to have the Hub Transport servers do not use XXX-SR04 to resolve names on the Internet?()A、You must change the DNS forwarding.B、You must change the Hub Transport server object properties.C、You must change the Transport Protection Rules.D、You must set the Net.TCP Port Sharing service to Automatic.

考题 单选题If a GMDSS radio operator initiates a DSC distress transmission but does not insert a message,what happens? ()A The transmission is aborted and an alarm sounds to indicate this data must be provided by the operatorB The transmission is not initiated and ERROR is indicated on the display readoutC The transmission will be made with default information provided automaticallyD The receiving station will poll the DSC unit of the vessel in distress to download the necessary information

考题 单选题Your company has a single Active Directory domain. All servers run Windows Server 2008. You install an iSCSI storage area network (SAN) for a group of file servers.  Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible.  You need to implement the highest security available for communications to and from the iSCSI SAN. What should you do?()A Create a Group Policy object (GPO) to enable the System objects: Strengthen default permission ofinternal systems objects setting.B Create a Group Policy object (GPO) to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting.C Implement IPsec security in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.D Implement mutual Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.

考题 单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to allow your environment to utilize the wildcard certificate so that it can be utilized for Outlook Anywhere?()A You must change recipient filtering.B You must change the DNS forwarding.C You must change the Outlook Protection Rules.D You must change the EXPR Outlook Provider’s properties.

考题 单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a Mailbox server named XXX-EX10.What action must you take to have mailboxes retained for 8 weeks after deletion?()A You must create a legal hold.B You must change the mailbox database properties.C You must create Transport Protection Rules.D You must create Personal archives.

考题 单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of forest with a site. The Xxx network has two Exchange Server 2010 Client Access servers named XXX-EX14 and XXX-EX15 that has IMAP4 installed.Remote users from the internet currently make use of IMAP4 to connect to XXX-EX14 and XXX-EX15.What actions must you take to block IMAP4 access to the mailboxes on XXX-EX15?()A You must implement Outlook Protection Rules.B You must implement Transport Protection Rules.C You must set up a Public Folder Management Console.D You must deselect the IMAP4 mailbox feature in XXX-EX15.

考题 多选题Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)AAddresses used for NAT pools should never overlap.BIf more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.CIf traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.DDynamic source NAT rules take precedence over static source NAT rules.

考题 单选题Your company hosts web services in the company intranet.  The intranet is secured by a firewall.   Devices outside the firewall must be able to access the web services.  Company policies prohibit changes to firewall rules.  You need to recommend an approach for enabling inbound communication.  What should you recommend?()A  Use Windows Server AppFabric.B  Use the Windows Azure AppFabric Service Bus.C  Use the Windows Azure AppFabric Access Control Service.D  Use a Windows Communication Foundation (WCF) service in a Windows Azure role that relays to the internal web service

考题 单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.It has come to the attention of Xxx management that a network user named Rory Allen is using Exchange ActiveSync to abuse the company’s e-mail policy by downloading huge attachments that does not pertain to his work detail.Consequently you receive instruction from Xxx to restrict the attachments size for Rory Allen’s to 100 KB. How can you achieve the goal by ensure that only Rory Allen is restricted?()A You must set up a new ActiveSync Device Access rule.B You must set up a managed folder mailbox policy.C You must set up a new role assignment policy.D You must set up Outlook Protection Rules.

考题 单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to disable notifications by text messages to mobile devices?()A You must set up a Group Policy Object.B You must set up an Outlook Web App Mailbox policy.C You must change the properties of the public folder database.D You must set up recipient filtering.

考题 单选题Windows Communication Foundation (WCF) application uses a data contract that has several data members. You need the application to throw a Serialization Exception if any of the data members are not present when a serialized instance of the data contract is deserialized. What should you do?()A  Add the Known Type attribute to the data contract.Set a default value in each of the data member declarations.B  Add the Known Type attribute to the data contract.Set the Order property of each data member to unique integer value.C  Set the Emit Default Value property of each data member to false.D  Set the Is Required property of each data member to true.

考题 单选题What is special about fox hunting in Britain?A It involves the use of a deadly poison.B It is a costly event which rarely occurs.C The hunters have set rules to follow.D The hunters have to go through strict training.

考题 问答题Practice 2  (1) In order to communicate thoughts and feelings, there must be a conventional system of signs or symbols which mean the same to the sender and the receiver. The means of sending communications are too numerous and varied for systematic classification. Therefore, the analysis must begin with the means of receiving communication. (2) Reception of communication is achieved by our senses.