网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Under what condition are you allowed to depart from the rules of the road().
A

To avoid immediate danger

B

When authorized by the rig superintendent

C

To comply with an operator's requirement

D

Under no conditions


参考答案

参考解析
解析: 暂无解析
更多 “单选题Under what condition are you allowed to depart from the rules of the road().A To avoid immediate dangerB When authorized by the rig superintendentC To comply with an operator's requirementD Under no conditions” 相关考题
考题 Your network contains an Active Directory domain. All client computers run Windows XP Service Pack 3 (SP3). The domain contains a member server named Server1 that runs Windows Server 2008 R2. On Server1, you create a connection security rule that requires authentication for inbound and outbound connections. You configure the connection security rule to use Kerberos authentication. You need to ensure that the client computers can connect to Server1. The solution must ensure that all connections to Server1 are encrypted. What should you do?()A. From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.B. From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.C. From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.D. From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.

考题 Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 hosts a custom application named App1. App1 is accessible on TCP port 5000.You need to encrypt App1 data on the network.What should you do?()A. From the Local Security Policy console, configure the Security Options.B. From the Local Security Policy console, configure the Application Control Policies.C. From the Windows Firewall with Advanced Security console, create an inbound rule.D. From the Windows Firewall with Advanced Security console, create a connection security rule.

考题 As Chief Officer of a vessel underway,it comes to your attention that the vessel is,in some manner,unseaworthy. Under such circumstances the Master is required to take action upon receiving ______.A.information of such condition from yourselfB.notification of such condition from yourself and the Second OfficerC.notification of such condition from yourself and any other member of the crewD.notification of such condition from yourself or the Second Officer

考题 A casualty report of an intentional grounding is required under what condition? ______.A.Under any conditionB.If the grounding lasts over 24 hoursC.If it creates a hazard to the environmentD.At the owner's discretion

考题 You are running parallel to the coast and estimate that the current is against you.In plotting a running fix using bearings from the same object on the coast,the greatest safety margin from inshore dangers will result if what speed is used to determine _______.A.Minimum speed estimateB.Maximum speed estimateC.Average speed estimateD.A running fix should not be used under these conditions

考题 You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. You need to prevent all users who are members of a group named Group1 from runningWindows Media Player. All other users must be allowed to run Windows Media Player. You must achievethis goal by using the least amount of administrative effort.  What should you do?()A、From Software Restriction Policies, create a path rule.B、From Software Restriction Policies, create a hash rule.C、From Application Control Policies, create the default rules.D、From Application Control Policies, create an executable rule.

考题 You need to prevent a custom application from connecting to the Internet. What should you do?()A、From Windows Firewall, add a program.B、From Windows Defender, modify the Allowed items list.C、From Windows Firewall with Advanced Security, create an inbound rule.D、From Windows Firewall with Advanced Security, create an outbound rule.

考题 In the SSCT, when you need to see the Channel Prices, what is the right action to take?()A、Download the BP version of SSCT from PartnerWorldB、Enter the IBM authorized password in SSCT under User Access Level menuC、Get the country price list from your country BP organization and import into SSCTD、Apply the country channel discounts under the Quote menu choosing the Discount/Uplift option

考题 You have a computer that runs Windows 7. The network contains a monitoring server named Server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). Youneed to ensure that Service1 can receive requests from Server1. What should you do?()A、From Windows Firewall with Advanced Security, create a predefined rule.B、From Windows Firewall with Advanced Security, create a custom rule.C、From Network and Sharing Center, modify the network location settings.D、From Network and Sharing Center, modify the advanced sharing settings.

考题 You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()A、From Network and Sharing Center, click Connect to a network.B、From Network and Sharing Center, click Set up a new connection or network.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.D、From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.

考题 You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A、 From Windows Firewall, add an exceptionB、 From windows Firewall enable the block all incoming connections optionC、 From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD、 From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

考题 Your network contains an Exchange Server 2010 server.You need to prevent e-mail messages that contain specific words from being sent between users in the organization. What should you do?()A、Create a transport rule.B、Create an Outlook Protection Rule.C、Configure the content filtering feature.D、Configure the sender reputation feature.

考题 You have a server that runs windows server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do?()A、From windows firewall, add an exception.B、From windows firewall enable the block all incoming connections option.C、From the windows firewall with advanced security snap-in, create an inbound rule.D、From the windows firewall with advanced security snap-in, create an outbound rule.

考题 All client computers in your network run Windows 7 Enterprise.    You need to prevent all standard user accounts from running programs that are signed by a specific publisher.   What should you do?()A、Use software restriction policies. Create a path rule.B、Use software restriction policies. Create a hash rule.C、Use AppLocker application control policies. Create an Executable rule.D、Use AppLocker application control policies. Create a Windows Installer rule.

考题 You have an Exchange Server 2010 organization.  You need to recommend a solution that prevents the permanent deletion of e-mail messages from themailboxes of employee who have been dismissed from the company.  What should you recommend?()A、Implement managed folders.B、Implement a legal hold for each mailbox.C、Implement a Retention Policy for each mailbox.D、Implement an Outlook Protection Rule for each mailbox.

考题 You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 canconnect to File Transfer Protocol (FTP) servers only while it is connected to a private network.  What should you do?()A、From Windows Firewall with Advanced Security, create a new rule.B、From the local Group Policy, modify the application control policies.C、From Windows Firewall, modify the Allowed Programs and Features list.D、From Network and Sharing Center, modify the Advanced Sharing settings.

考题 You have a computer that runs Windows 7. You have a third-party application. You need to ensure that onlya specific version of the application runs on the computer. The solution must ensure that all applicationrestrictions are based on the application vendor s digital signature.  What should you do?()A、From Application Control Policies, configure a path rule.B、From Application Control Policies, configure a publisher rule.C、From Software Restriction Policies, configure a path rule.D、From Software Restriction Policies, configure a certificate rule.

考题 You have an Exchange Server 2010 organization that contains a Hub Transport server and an Edge Transport server.The Edge Transport server sends all SMTP mail to the Internet.You need to add a disclaimer to all internal and external e-mail messages sent by users of your company. What should you do?()A、From the Hub Transport server, create a transport rule.B、From the Edge Transport server, create a transport rule.C、From the Hub Transport server, modify the properties of a Send connector.D、From the Edge Transport server, modify the properties of a Send connector.

考题 You have an Exchange Server 2010 organization named contoso.com.You need to add a disclaimer to all e-mail messages sent by members of a mail-enabled group named Group1. What should you do?()A、From the Exchange Control Panel (ECP), configure a MailTip.B、From the Exchange Management Console (EMC), create a transport rule.C、From the Exchange Management Shell, run the Set-TransportConfig cmdlet.D、From the Exchange Management Shell, run the New-SystemMessage cmdlet.

考题 单选题You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. You need to prevent all users who are members of a group named Group1 from runningWindows Media Player. All other users must be allowed to run Windows Media Player. You must achievethis goal by using the least amount of administrative effort.  What should you do?()A From Software Restriction Policies, create a path rule.B From Software Restriction Policies, create a hash rule.C From Application Control Policies, create the default rules.D From Application Control Policies, create an executable rule.

考题 单选题As Chief Officer of a vessel underway,it comes to your attention that the vessel is,in some manner,unseaworthy. Under such circumstances the Master is required to take action upon receiving().A information of such condition from yourselfB notification of such condition from yourself and the Second OfficerC notification of such condition from yourself and any other member of the crewD notification of such condition from yourself or the Second Officer

考题 单选题You need to specify the changes to the existing firewall configuration settings that are required by the HTTP endpoint that will be used by the proseware_projects database. What should you do?()A Create a Web publishing rule on ISA2 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.B Create a Web publishing rule on ISA1 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.C Create a Web publishing rule on ISA2 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.D Create a Web publishing rule on ISA1 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.

考题 单选题What are the conditions,under GMDSS,whereby a ship is NOT allowed to depart from any port? ()A The vessel is not capable of performing all required distress and safety functionsB The vessel is carrying more than the required number of qualified GMDSS radio operatorsC The vessel has a temporary waiver of its radio license and Safety CertificateD The vessel is not carrying a GMDSS radio maintainer,but has provided for shoreside maintenance plus duplication of equipment if required

考题 单选题You are running parallel to the coast and estimate that the current is against you.In plotting a running fix using bearings from the same object on the coast,the greatest safety margin from inshore dangers will result if what speed is used to determine().A Minimum speed estimateB Maximum speed estimateC Average speed estimateD A running fix should not be used under these conditions

考题 问答题Topic 5:Should government relief recipients be kept from owning “luxuries”?  Questions for Reference:  1. What kind of products will you define as “luxuries”?  2. Should people who receive subsistence allowance from the government be allowed to own luxuries? Why or why not?  3. What do you suggest will be the more “humane” restrictions on those who apply for subsistence allowance?

考题 单选题You need to prevent a custom application from connecting to the Internet. What should you do?()A From Windows Firewall, add a program.B From Windows Defender, modify the Allowed items list.C From Windows Firewall with Advanced Security, create an inbound rule.D From Windows Firewall with Advanced Security, create an outbound rule.

考题 单选题You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A  From Windows Firewall, add an exceptionB  From windows Firewall enable the block all incoming connections optionC  From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD  From the Windows Firewall with Advanced Security snap-in, create an outbound rule.