题目详情
当前位置:首页 > 职业技能鉴定考试 > 轮机英语
题目详情:
发布时间:2023-10-21 14:07:22

[单项选择]Which of the two events listed occurs simultaneously in a two-stroke/cycle diesel engine?()
A. Exhaust and scavenging
B. Scavenging and compression
C. Ignition and expansion
D. Exhaust and compression

更多"Which of the two events listed occu"的相关试题:

[多项选择]Which two statements describe characteristics of IPv6 unicast addressing?()
A. Global addresses start with 2000::/3.
B. Link-local addresses start with FE00:/12.
C. Link-local addresses start with FF00::/10.
D. There is only one loopback address and it is ::1.
E. If a global address is assigned to an interface, then that is the only allowable address for the interface.
[多项选择]Which two statements describe the Cisco implementation of VLANs?()
A. VLAN 1 is the default Ethernet VLAN.
B. CDP advertisements are only sent on VLAN 1002.
C. By default, the management VLAN is VLAN 1005.
D. By default, the switch IP address is in VLAN 1005.
E. VLAN 1002 through 1005 are automatically created and cannot be deleted.
[多项选择]Which two statements about Cisco Security Management Suite are correct?()
A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
[多项选择]Which two statements about an interface configured with the asr-group command are correct?()
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
[多项选择]Which two data intergrity algorithms are commonly used in VPN solutions?()
A. HMAC-MD5
B. RSA
C. HMAC-SHA-1
D. DH1
E. DH2
[多项选择]Which two statements about the Cisco Aironet Desktop Utility (ADU) are true()
A. The Aironet Desktop Utility (ADU )profile manager feature can create and manage only one profile for the wireless client adapter.
B. The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.
C. The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point , manage authentication to the wireless network , and enable encryption.
D. The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.
[多项选择]Which two wireless encryption methods are based on the RC4 encryption algorithm? ()
A. WEP
B. CCKM
C. AES
D. TKIP
E. CCMP
[多项选择]Which two of these correctly describe asymmetric routing and firewalls?()
A. only operational in routed mode
B. only operational in transparent mode
C. only eight interfaces can belong to an asymmetric routing group
D. operational in both failover and non-failover configurations
E. only operational when the firewall has been configured for failover
[多项选择] Which two code fragments correctly create and initialize a static array of int elements()
A. static final int[]a={100,200};
B. static final int[]a;static{a=new int[2];a[0]=100;a[1]=200;}
C. static final int[]a=new int[2]{100,200};
D. static final int[]a;static void int(){a=new int[3];a[0]=100;a[1]=200;}
[多项选择]Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies (Choose two.)()。
A. copier
B. microwave oven
C. toaster
D. cordless phone
E. IP phone
F. AM radio
[多项选择]Which two of these are recommended practices with trunks? ()
A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
[多项选择]Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
A. It specifies use of a static encryption key that must be changed frequently to enhance security
B. It requires use of an open authentication method
C. It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D. It requires that all access points and wireless devices use the same encryption key
E. It includes authentication by PSK
[多项选择]Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
A. CHAP uses a two-way handshake
B. CHAP authentication periodically occurs after link establishment
C. CHAP has no protection from playback attacks
D. CHAP authentication is performed only upon link establishment
E. CHAP uses a three-way handshake
F. CHAP authentication passwords are sent in plaintext
[多项选择]Which two tasks does the Dynamic Host Configuration Protocol perform?()
A. Set the IP gateway to be used by the network.
B. Perform host discovery used DHCPDISCOVER message.
C. Configure IP address parameters from DHCP server to a host.
D. Provide an easy management of layer 3 devices.
E. Monitor IP performance using the DHCP server.
F. Assign and renew IP address from the default pool.
[多项选择]Which two statements are characteristics of a distance vector routing protocol?()
A. RIP is an example of distance vector routing protocols
B. Updates are periodic and include the entire routing table
C. Routing updates are sent only after topology changes
D. The protocol can be useful in hub-and-spoke and hierarchical networks
E. Convergence is usually faster than with link state protocols
F. Each router has its own view of the topology

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码