单选题If you log a distress message,it must include the().Asea stateBnames of witnessesCtime of its occurrenceDwind direction and velocity

单选题
If you log a distress message,it must include the().
A

sea state

B

names of witnesses

C

time of its occurrence

D

wind direction and velocity


参考解析

解析: 暂无解析

相关考题:

Which statement is true regarding syslog on Junos devices?() A. No logging is enabled by default.B. By default, the information is stored in a file named events.C. Only the message severity level must be configured.D. You can configure the router to send log messages to the console.

You install Microsoft Windows Vista on a new computer that is not connected to the Internet. After you log on, you receive a warning message about an unknown device.You need to prevent the display of the warning message until you download an available hardware driver.What are the two possible ways to achieve this goal? ()A.AB.BC.CD.D

While proceeding to a distress site,you hear the words “Seelonce mayday” on the radiotelephone.Which action should you take ________.A.Resume base course and speed as your assistance is no longer requiredB.Acknowledge receipt and advise your course,speed,and ETAC.Relay the original distress message as no other vessel has acknowledged itD.Monitor the radiotelephone but do not transmit

Acknowledgement by you of receipt of a distress message from a vessel which,beyond any possible doubt,is not in your vicinity and is a long distance away must be made when ______.A.vessels nearer the distress vessel acknowledge receiptB.vessels nearer the distress vessel fail to acknowledge receiptC.even you have not received the distressD.even the vessel in distress expressly prohibit you from providing any salvage service

Which statement is true regarding syslog on Junos devices?()A、No logging is enabled by default.B、By default, the information is stored in a file named events.C、Only the message severity level must be configured.D、You can configure the router to send log messages to the console.

What keywords do you need to the access-list to provide to the logging message like source address and source mac address?()A、LogB、Log-inputC、Log-outputD、Logging

Which statement is true regarding syslog on Junos devices?()A、No logging is enabled by defaultB、By default the information is stored in all file named eventsC、Only the message severity level must be configuredD、You can configure the router to send log messages to the console

Which information would you find using the CLI help function?()A、message of the dayB、tip of the dayC、explanation for specific system log error messagesD、explanation for specific traceoptions log messages

Which initialization parameter must you set to enable automatic archiving? ()A、LOG_ARCHIVE_DESTB、LOG_ARCHIVE_STARTC、LOG_ARCHIVE_FORMATD、LOG_ARCHIVE_MAX_PROCESSES

Which statement about recovering from the loss of a redo log group is true?()A、If the lost redo log group is ACTIVE, you should first attempt to clear the log file.B、If the lost redo log group is CURRENT, you must clear the log file.C、If the lost redo log group is ACTIVE, you must restore, perform cancel-based incomplete recovery, and open the database using the RESETLOGS option.D、If the lost redo log group is CURRENT, you must restore, perform cancel-based incomplete recovery, and open the database using the RESETLOGS option.

A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems. The service has the following requirements: It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding. It must interoperate with systems that use SOAP but are not built on the .NET plafform. You need to configure the service to support these requirements. Which message encoding should you use?()A、Binary message encodingB、MTOM (Message Transmission Optimization Mechanism) message encodingC、Text message encoding with message version set to noneD、Text message encoding with message version set to SOAP 1.2

You have an Exchange Server 2010 organization.  You need to plan a message hygiene solution that meets the following requirements:.Spoofing must be minimized .Open SMTP relays must be added to IP block lists automatically  What should you include in the plan?()A、Sender ID filtering and recipient filteringB、Sender ID filtering and sender reputationC、sender filtering and recipient filteringD、sender reputation and recipient filtering

You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to allow a user named Mia Hamm to access the resource mailbox?()A、You must change the resource mailbox’s propertiesB、You must use log transactionsC、You must use Outlook Protection RulesD、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true

You are creating a Windows Communication Foundation (WCF) service. You have the following requirements: Messages must be sent over TCP The service must support transactions. Messages must be encoded using a binary encoding Messages must be secured using Windows stream-based security.You need to implement a custom binding for the service. In which order should the binding stack be configured?()A、tcp Transport, windows Stream Security, transaction Flow, binary Message EncodingB、transaction Flow, binary Message Encoding, windows Stream Security, tcp TransportC、windows Stream Security, tcp Transport, binary Message Encoding, transaction FlowD、binary Message Encoding, transaction Flow, tcp Transport, windows Stream Security

You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()A、You must implement log transactionsB、You must set up new management roleC、You must implement Mailbox journalingD、You must set up a Role Based Access Control (RBAC) role

You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to allow a room mailbox to automatically take requests for meetings?()A、You must use log transactions.B、You must use Calendar Repair Assistant (CRA).C、You must select the resource booking attendant.D、You must set up Task Scheduler.

单选题The distress message of a ship should include considerable information which might facilitate the rescue. This information should().AALWAYS be included in the initial distress messageBbe sent to a Coast Guard station FIRSTCbe transmitted as a series of short messages,if time allowsDinclude the vessel's draft

单选题If you are transmitting a distress message by radiotelephone you should().Ause English languageBalways use the International CodeCpreface it by the word SOSDfollow the transmission with the radio alarm signal

单选题An airplane wants a vessel to change course and proceed towards a vessel in distress. The actions of the aircraft to convey this message will NOT include().Acircling the vessel at least onceBheading in the direction of the distress locationCflashing the navigation lights on and offDcrossing ahead and rocking the wings

单选题While proceeding to a distress site,you hear the words “Seelonce mayday” on the radiotelephone.Which action should you take().AResume base course and speed as your assistance is no longer requiredBAcknowledge receipt and advise your course,speed,and ETACRelay the original distress message as no other vessel has acknowledged itDMonitor the radiotelephone but do not transmit

单选题You hear on the radiotelephone the word “Securite” spoken three times. This indicates that().Aa message about the safety of navigation will followBa message of an urgent nature about the safety of a ship will followCthe sender is in distress and requests immediate assistanceDyou should secure your radiotelephone

单选题The control of distress traffic is the responsibility of().Athe ownersBthe charterersCthe shipperDthe vessel in distress or of the station that relays the distress message

单选题The distress message of a ship should include considerable information which might facilitate the rescue. This information should().AALWAYS be included in the initial distress messageBbe sent to a MSA station FIRSTCbe transmitted as a series of short messages,if time allowsDinclude the vessel's draft

单选题You are designing a Windows Azure application.   The application will use a Windows Azure AppFabric Service Bus message buffer.  You need to recommend an approach for ensuring that only authorized users can discover and use the message buffer.  What should you recommend?()A Make the message buffer discoverable to listeners and require authorization.B Make the message buffer discoverable to managers and do not require authorization.C Make the message buffer publicly discoverable.  Include a Simple Web Token (SWT) in each message.D Make the message buffer discoverable to managers.  Include a Simple Web Token (SWT) in each message.

单选题Which command do you use to identify the meaning of a syslog message?()Ahelp log messagesBman log messagesCman syslogDhelp syslog

单选题Which statement about recovering from the loss of a redo log group is true?()A If the lost redo log group is ACTIVE, you should first attempt to clear the log file.B If the lost redo log group is CURRENT, you must clear the log file.C If the lost redo log group is ACTIVE, you must restore,perform cancel-based incomplete recovery,and open the database using the RESETLOGS option.D If the lost redo log group is CURRENT, you must restore,perform cancel-based incomplete recovery,and open the database using the RESETLOGS option.

单选题Acknowledgement by you of receipt of a distress message from a vessel which,beyond any possible doubt,is not in your vicinity and is a long distance away must be made when().AVessels nearer the distress vessel acknowledge receiptBVessels nearer the distress vessel fail to acknowledge receiptCEven you have not reveived the distressDEven the vessel in distress expressly prohibit you from providing any salvage service