更多“()are used to secure the two con”相关问题
  • 第1题:

    A "chock" is a ______.

    A.deck fitting used to secure mooring lines

    B.casting fitted at the side of a weather deck,used as a fairlead

    C.sharp block of wood used to support hygroscopic cargo

    D.smoke pipe for the galley stove


    正确答案:B

  • 第2题:

    Select the two correctstatements from the list below that describe DES and 3DES: ()

    • A、 3DES is muchmore secure than DES.
    • B、 Both DES and 3DES are stream ciphers.
    • C、 DES uses 64 bitkeys, although the effective key lengthis only 56bits.
    • D、 The decryption operation for both DES and 3DES is the same as the encryption operation.
    • E、 DES can only be used for encryption, whereas 3DES can also be used for authentication.

    正确答案:C,D

  • 第3题:

    Which three mechanisms are used to secure management traffic from outside IPS sensors?()

    • A、secure tunnels
    • B、a separate management VLAN
    • C、secure VLANs to isolate sensors
    • D、an out-of-band path around the firewall
    • E、asymmetric traffic flows to isolate sensors
    • F、private VLANs to put all sensors on isolated ports

    正确答案:A,B,F

  • 第4题:

    What is the primary use of a remote access VPN?()

    • A、to secure communication between two remote PCs
    • B、to secure communication between two remote offices
    • C、to secure communication betweenan remote PC and the corporate intranet
    • D、to secure communication between a corporate intranet and the public internet

    正确答案:C

  • 第5题:

    单选题
    A chock is a().
    A

    deck fitting used to secure mooring lines

    B

    casting fitted at the side of a weather deck,used as a fairlead

    C

    sharp block of wood used to support hygroscopic cargo

    D

    smoke pipe for the galley stove


    正确答案: A
    解析: 暂无解析

  • 第6题:

    单选题
    Which step can be used to trap runtime script errors and recover gracefully?()
    A

    Set  

    B

    Call Subflow  

    C

    On Exception Goto  

    D

    Get Reporting Statistic 


    正确答案: D
    解析: 暂无解析

  • 第7题:

    单选题
    The enable secret command is used to secure access to which CLI mode?()
    A

    user EXEC mode

    B

    global configuration mode

    C

    privileged EXEC mode

    D

    auxiliary setup mode


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    A lashing used to secure two barges side by side,lashed in an "X" fashion,is called a ().
    A

    scissor wire

    B

    towing wire

    C

    breast wire

    D

    cross wire


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following describes a secure connection over the Internet between two sites?()
    A

    FTP

    B

    VLAN

    C

    VPN

    D

    HTTP


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A deck fitting,used to secure line or wire rope,consisting of a single body with two protruding horns is called a().
    A

    bitt

    B

    bollard

    C

    capstan

    D

    cleat


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    ()are used to secure the two containers, one on top of the other.
    A

    Turnbuckles

    B

    Lashing bars

    C

    Twist locks

    D

    Lashing wires


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
    A

    VLAN

    B

    Peer to Peer

    C

    VTP

    D

    VPN


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which statement about two lines spliced together is TRUE ________.

    A.Splicing is used to increase the circumference of each line

    B.Splicing two lines together is stronger than knotting two lines together

    C.Splicing is used to increase the overall strength of the line

    D.Splicing is used to prevent rotting of the lines bitter end


    正确答案:B

  • 第14题:

    Which two statements about the Cisco AutoSecure feature are true?()

    • A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
    • B、Cisco123 would be a valid password for both the enable password and the enable secret commands.
    • C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
    • D、For an interactive full session of AutoSecure, the auto secure login command should be used.
    • E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

    正确答案:C,E

  • 第15题:

    Which two statements about zoning are correct? ()

    • A、Zoning increases security.
    • B、DNS queries are used for software zoning.
    • C、Software zoning is more secure than hardware zoning.
    • D、When using zones and VSANs together, the zone is created first.
    • E、Zoning requires that VSANs be established before it becomes operational.

    正确答案:A,B

  • 第16题:

    多选题
    Which two secure remote access methods are available on the WX platforms?() (Choose two.)
    A

    SSL

    B

    SSH

    C

    Telnet

    D

    HTTP


    正确答案: C,D
    解析: 暂无解析

  • 第17题:

    单选题
    The fittings used to secure a watertight door are known as().
    A

    clamps

    B

    clasps

    C

    dogs

    D

    latches


    正确答案: A
    解析: 暂无解析

  • 第18题:

    单选题
    Which encryption type is used to secure user data in an IPsec tunnel?()
    A

    symmetric key encryption

    B

    asymmetric key encryption

    C

    RSA

    D

    digital certificates


    正确答案: B
    解析: 暂无解析

  • 第19题:

    多选题
    Which two statements about the Cisco AutoSecure feature are true?()
    A

    All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.

    B

    Cisco123 would be a valid password for both the enable password and the enable secret commands.

    C

    The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.

    D

    For an interactive full session of AutoSecure, the auto secure login command should be used.

    E

    If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.


    正确答案: A,C
    解析: 暂无解析

  • 第20题:

    单选题
    What is the primary use of a remote access VPN?()
    A

    to secure communication between two remote PCs

    B

    to secure communication between two remote offices

    C

    to secure communication betweenan remote PC and the corporate intranet

    D

    to secure communication between a corporate intranet and the public internet


    正确答案: C
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析

  • 第22题:

    单选题
    ()are used to secure the second and the third tiers of containers.
    A

    Turnbuckles

    B

    Lashing bars

    C

    Twist locks

    D

    Lashing wires


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    A device commonly used to secure the pendant wire when it is initially passed to an anchor handling vessel is().
    A

    pelican hook

    B

    connecting link

    C

    shackle

    D

    retaining hook


    正确答案: C
    解析: 暂无解析

  • 第24题:

    多选题
    Which two actions protect a resource file from direct HTTP access within a web application?()
    A

    Placing it in the /secure directory

    B

    Placing it in the /WEB-INF directory

    C

    Placing it in the /META-INF/secure directory

    D

    Creating a  element within the deployment descriptor


    正确答案: C,B
    解析: 暂无解析