-
The oil sump, a light welded design, is mounted on the engine block from below and sealed by ()
A . O-ring
B . gasket
C . washer
D . packing
-
Which of the motors for the devices listed below is fitted with an instantaneous overload relay?()
A . Fan
B . Pump
C . Winch
D . Machine tool
-
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()
A . Enable root guard to mitigate ARP address spoofing attacks.
B . Configure DHCP spoofing to mitigate ARP address spoofing attacks.
C . Configure PVLANs to mitigate MAC address flooding attacks.
D . Enable root guard to mitigate DHCP spoofing attacks.
E . Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.
F . Configure port security to mitigate MAC address flooding
G . None of the other alternatives apply
-
While overhauling a jerk-type fuel pump it is necessary to replace the pump plungerWhich of the parts listed below must also be replaced?()
A . Delivery check valve
B . Pump barrel
C . Tubing to the injector
D . Cam follower
-
Using the LIST command in Recovery Manager (RMAN), which two pieces of information from the RMAN repository can be listed?()
A . Stored scripts in the recovery catalog
B . Backups that can be deleted from disk
C . Backup sets and images copies that are obsolete
D . Backups that do not have the AVAILABLE status in the RMAN repository
-
The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:
https://assets.asklib.com/images/image2/2018073010294287195.jpg
How will the above access lists affect traffic?()
A . FTP traffic from 192.169.1.22 will be denied.
B . No traffic, except for FTP traffic will be allowed to exit E0.
C . FTP traffic from 192.169.1.9 to any host will be denied.
D . All traffic exiting E0 will be denied.
E . All FTP traffic to network 192.169.1.9/29 will be denied.
-
Though many options are supported in EIGRPv6, select two options from the below list that are supported.()
A . VRF
B . auto-summary
C . per-interface configuration
D . prefix-list support via route-map
E . prefix-list support via distribute-list
-
()process the distress signal from EPIRB to determine its position and identity.
A . COSPAS-SARSAT
B . ground receiving stations
C . storing distress signal
D . Near polar orbiting satellite
-
Your BladeCenter customer operates multiple geographically dispersed datacenters and needs resilient remote access to servers. What is the most cost-effective solution listed below?()
A . Add redundant management modules
B . Individual 1U and 2U servers equipped with Remote Support Adapters
C . Train and deploy highly skilled system administrators to each site
D . Maintain system administrators centrally and dispatch to remote sites when needed
-
Select the two correctstatements from the list below that describe DES and 3DES: ()
A . 3DES is muchmore secure than DES.
B . Both DES and 3DES are stream ciphers.
C . DES uses 64 bitkeys, although the effective key lengthis only 56bits.
D . The decryption operation for both DES and 3DES is the same as the encryption operation.
E . DES can only be used for encryption, whereas 3DES can also be used for authentication.
-
You are using a dialup connection. You want to ensure that your password is encrypted. What protocols from the list below would you disable? ()
A . PAP
B . SPAP
C . MSCHAP
D . MSCHAP V2
-
You execute the following RMAN command in the order shown below: BACKUP VALIDATE DATABASE; BLOCKRECOVER CORRUPTION LIST; What will these commands do?()
A . Create a backup of the database and recover all corrupted blocks found in the backup.
B . Run a backup validation and list all the logically corrupt blocks as well as physically corrupt blocks in the database.
C . Run a backup validation to populate V$COPY_CORRUPTION view, and then list any corrupt blocks recorded in the view.
D . Run a backup validation to populate V$DATABASE_BLOCK_CORRUPTION view, and then repair any corrupt blocks recorded in the view.
E . Run a backup validation, repair any corrupt blocks found during the validation process, and then update V$DATABASE_BLOCK_CORRUPTION view to indicate which corrupt blocks have been repaired.
-
Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()
A . access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23
B . access-list 115 deny udp any 10.10.1.0 eq telnet
C . access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnet
D . access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23
E . access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23
-
Listend to the conversation. Then choose the best answer to each question below.Where is Henry from?
-
Of the three sound patterns listed below, which is meant to link sound and meaning most closely?
-
Which of the “P’s” listed below relates to a customer’s cost?
-
? Look at the list below. It shows some product sectors of healthcare market.
? For questions 6-10, decide which sector (A-H) of the market each person on the opposite page should consult.
? For each question, mark the correct letter (A-H) on your Answer Sheet.
? Do not use any letter more than once.
PRODUCT SECTORS OF HEALTHCARE MARKET
A Vitamins and Dietary Supplements
B Cough, Cold and Allergy Remedies
C Digestive Remedies
D Eye Care
E Wound Treatments
F Adult Mouth Care
G Calming and Sleeping Products
H Smoking Cessation Aids
Kevin Lee is looking for some products to help him quit smoking.
-
We can infer from the article that author's attitude toward group identity is______.
A.biased
B.fair and just
C.subjective
D.emotional
-
Questions l7-20Using the information in the test ,complete each sentence 17-20 ,with a phrase from the list below (A-G).
For each sentence(17-20) mark one letter (A-G) on your Answer Sheet.
Do not mark any letter twice.
第17题:When we visit your country again next time ,we hope you\'11...
A take this problem into consideration.
B develop and expand the trade and business further.
C make our company the sole agent in China.
D offer to buy equipment for them.
E accept payment for this equipment.
F start cooperation with other branches and factories.
G cooperate with you and realize our common dream.
-
Of all the extingushing agents listed below, which one has the greatest capacity for heat absorption?______.
A.Water fog
B.Carbon dioxide
C.Dry chemical
D.Solid stream of water
-
Read the email below about advertising. Choose the correct word to fill each gap from A, Read the email below about advertising. Choose the correct word to fill each gap from A, B or C on the opposite page. For each question ()
A.By
B.During
C.Within
-
The entrance which they had found could be seen from below.()
-
From the list below choose the most suitable title for the whole of the Reading Passage. Write the appropriate letter A-D in box 27 on your answer sheet. A Pollution control in coal mining B The greenhouse effect C The coal industry and the environment D Sustainable population growth
Section A
此题为多项选择题。
-
If the reaction of 2A+B → C is a elementary reaction, which choice listed below is true()
A.it is a second order reaction
B.it is a slow reaction
C.it is a second order reaction to B
D.it is a second order reaction to A