()are used to secure the two containers, one on top of the other.
第1题:
A "chock" is a ______.
A.deck fitting used to secure mooring lines
B.casting fitted at the side of a weather deck,used as a fairlead
C.sharp block of wood used to support hygroscopic cargo
D.smoke pipe for the galley stove
第2题:
Select the two correctstatements from the list below that describe DES and 3DES: ()
第3题:
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
第4题:
What is the primary use of a remote access VPN?()
第5题:
deck fitting used to secure mooring lines
casting fitted at the side of a weather deck,used as a fairlead
sharp block of wood used to support hygroscopic cargo
smoke pipe for the galley stove
第6题:
Set
Call Subflow
On Exception Goto
Get Reporting Statistic
第7题:
user EXEC mode
global configuration mode
privileged EXEC mode
auxiliary setup mode
第8题:
scissor wire
towing wire
breast wire
cross wire
第9题:
FTP
VLAN
VPN
HTTP
第10题:
bitt
bollard
capstan
cleat
第11题:
Turnbuckles
Lashing bars
Twist locks
Lashing wires
第12题:
VLAN
Peer to Peer
VTP
VPN
第13题:
Which statement about two lines spliced together is TRUE ________.
A.Splicing is used to increase the circumference of each line
B.Splicing two lines together is stronger than knotting two lines together
C.Splicing is used to increase the overall strength of the line
D.Splicing is used to prevent rotting of the lines bitter end
第14题:
Which two statements about the Cisco AutoSecure feature are true?()
第15题:
Which two statements about zoning are correct? ()
第16题:
SSL
SSH
Telnet
HTTP
第17题:
clamps
clasps
dogs
latches
第18题:
symmetric key encryption
asymmetric key encryption
RSA
digital certificates
第19题:
All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
Cisco123 would be a valid password for both the enable password and the enable secret commands.
The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
For an interactive full session of AutoSecure, the auto secure login command should be used.
If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
第20题:
to secure communication between two remote PCs
to secure communication between two remote offices
to secure communication betweenan remote PC and the corporate intranet
to secure communication between a corporate intranet and the public internet
第21题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第22题:
Turnbuckles
Lashing bars
Twist locks
Lashing wires
第23题:
pelican hook
connecting link
shackle
retaining hook
第24题:
Placing it in the /secure directory
Placing it in the /WEB-INF directory
Placing it in the /META-INF/secure directory
Creating a element within the deployment descriptor