-
The lengthening of a crack formed in the shell plating of a ship may be prevented by ().
A . welding brackets across both ends of the crack
B . chipping out and slot welding the entire crack
C . drilling a hole at each end of the crack
D . cutting a square notch at each end of the crack
-
What are three actions performed by the mysql_secure_installation tool?()
A . It prompts you to set the root user account password
B . It checks whether file permissions are appropriate within datadir
C . It asks to remove the test database, which is generated at installation time
D . It can delete any anonymous accounts
E . It verifies that all users are configuration with the longer password hash
-
The cap and new shell are tightened up and then removed and the thickness of the wire measured by ().
A . a bridge gauge
B . a micrometer
C . a thermometer
D . a indicator
-
The guide shoes are secured to the crosshead by means of()
A . through bolts
B . end chock bolts
C . side chock bolts
D . tap-bolt
-
Which of the following security features are enabled by default after creating an instance?()
A . Password Invalidation
B . Login Timeout
C . Cross Site Scripting Protection
D . Access Logging
-
Frames to which the tank top and bottom shell are fastened are called().
A . floors
B . intercostals
C . stringers
D . tank top support
-
You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested. Which code segment should you use?()
A .https://assets.asklib.com/images/image2/2018072714005024244.jpg
B .https://assets.asklib.com/images/image2/201807271401023676.jpg
C .https://assets.asklib.com/images/image2/2018072714010645375.jpg
D .https://assets.asklib.com/images/image2/2018072714011271828.jpg
-
You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()
A . The — ssl level was not specified
B . The server was not started with the – enable–ssl-plugin option
C . — ssl is not a valid server option
D . The mysqld binary was not compiled with SSL support
E . The server's SSL certificate was invalid
-
You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested. Which code segment should you use? ()
A . In the Web.config file: <authorization> <deny users="?" /></authorization> On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load FormsAuthentication.Initialize() End Sub
B . On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load FormsAuthentication RedirectToLoginPage("login.aspx") End Sub
C . On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load Response.Redirect("login.aspx") End Sub
D . In the Web.config file: <authentication mode="Forms"> <forms name=".ASPXUSERDEMO" loginUrl="login.aspx" protection="All" timeout="60" /></authentication>
-
You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()
A . Require the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSec
B . Require the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0
C . Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSL
D . Require the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
E . Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec
-
The cylinder covers are secured by eight elastic holding down arranged in four pairs()
A . nuts
B . screws
C . studs
D . flange
-
Anchors are prevented from running out when secured by the().
A . brake
B . devil's claw
C . pawls
D . All of the above
-
A main bearing consists of two shells which are secured by means of studs and ().
A . tie rods
B . through bolts
C . lead wires
D . bearing ca
-
The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()
A . security contexts
B . - transparent firewall
C . WebVPN
D . Active/Active failover
E . low latency queuing
F . AIP-SSM intrusion preventio
-
Market makers are also refered to as . It is their responsibility to make a market for specific securities by adjusting their inventory of securities.
A.players
B.dealers
C.brokers
D.securities firms
-
By purchasing government securities commercial banks are______.
A.borrowing from the government
B.acquiring earning assets
C.making a "loan" to the government
D.both B and C
-
After riveting is completed, the joints on the shell of a vessel are generally made watertight by________.
A.faying
B.caulking
C.felt or canvas packing
D.red lead
-
Judging by the $23 billion it earned last year, these should be the best of times for Shell, the Anglo-Dutch energy giant that ranks third among the top five Western oil companies. But Wall Street isn't celebrating. Instead, analysts are worried that buried beneath the record profit figures are worrying signs of a business in decline.
That's because Shell hasn't been able to find nearly as much oil and gas as it's now pumping out of the ground. In fact, it hasn't even come close—replacing only 60% to 70% of what it produced in 2005 and only 19% in 2004. Shell has had reserve problems for years—a controversy over improperly booked assets forced it to reduce estimated reserves by roughly 30% and led to the resignation of its CEO, Phil Watts, in 2004. But what's troubling now is that Shell is falling way behind rivals like Exxon and BP despite spending billions more each year on exploring and drilling new wells. Last year Exxon replaced 112% of production; BP came up with 95%. "I have never seen anything like this," says Fadel Gheit, a veteran energy analyst with Oppenheimer & Co. "Shell used to represent the gold standard in this industry, but lately they can't get their act together."
To be sure, Shell still has huge assets—nearly 12 billion barrels. But in the oil and gas industry, reserve replacement is the best guide to whether a company will be able to maintain-or grow-production in the future. So not replacing what you pump, says longtime industry observer Matthew Simmons, "is like eating your seed corn. If you're not finding new oil, you're just liquidating what you've got." Indeed, Shell's daily production figures have been weak lately, falling 6.7 % in 2005, to 3.52 million barrels a day.
Privately, Shell execs say the company's decision to cut spending for exploration when oil prices bottomed out in the late 1990s is partly to blame for the anemic numbers now. Shell CEO Jeroen Vander Veer insists that projects like those on Sakhalin Island off Siberia and in Nigeria and the Gulf of Mexico will enable the company to start catching up with peers in the years ahead. It won't be easy. "If you're not adding to reserves, you have a problem," says Sanford Bernstein analyst Oswald Clint. "Shell will have to run twice as hard just to stay in place."
According to the passage, the decline of Shell
A.is a hidden process.
B.is caused by the profit last year.
C.is the estimation of Wall Street.
D.is the fault of the CEO.
-
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.You need to collect information about which users are connecting to the Web site by using HTTPS.What should you do?()
A. Check the application log on the Web server.
B. Use Network Monitor to capture network traffic on the Web server.
C. Review the log files created by IIS on the Web server.
D. Configure a performance log to capture all Web service counters. Review the performance log data.
-
You are attempting to secure a MySQL server by using SSL encryption.On starting MySQL, you get this error:130123 10:38:02 [ERROR] mysqld: unknown option ‘—ssl‘What is the cause of the error?()
A.The — ssl level was not specified
B.The server was not started with the – enable–ssl-plugin option
C.— ssl is not a valid server option
D.The mysqld binary was not compiled with SSL support
E.The server‘s SSL certificate was invalid
-
You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested.Which code segment should you use?()
A.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/31ddc27d6b5afe8bae451bdd794657cf.jpg' />
B.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/19ad18c2d6af540e3af3cc6cf5e26d31.jpg' />
C.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/c6671967b4ef53d8df6205db1b9bc9dc.jpg' />
D.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/f2dbfcb0e5210e6a8f01932d905b2566.jpg' />
-
Secure Shell (SSH) is a cryptographic network protocol for () remote login and other secure network services over an(请作答此空)network.The standard()port for SSH is 22. The best known example applicatio
A.secure
B. insecure
C. internet
D. internal
-
Purchases of securities in the open market by the monetary authorities are least likely to increase:
A、Excess reserves.
B、Cash in investor accounts.
C、The interbank lending rate.