单选题()means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ship’s stores or the ship from the risks of a security incident.AShip security planBCompany security planCPort facility security planDNational security plan
单选题
()means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ship’s stores or the ship from the risks of a security incident.
A
Ship security plan
B
Company security plan
C
Port facility security plan
D
National security plan
参考解析
解析:
暂无解析
相关考题:
Your network contains a server that runs Windows Server 2008 R2.You plan to create a custom script.You need to ensure that each time the script runs, an entry is added to the Application event log.Which tool should you use?()A.EventcreateB.EventvwrC.WecutilD.Wevtutil
Rapid application development(RAD) systems purport to lighten the developer's(46)by making it easy to program an application with simple intuitive steps.RAD tools(47)the developer everything needed to construct a fully functional application quickly and easily. They make short work of modifying the developed product to(48)changes after the program is finished. Applications developed with RAD tools are constructed as they are envisioned. As an application's real usefulness(49), the developer armed with RAD tools should be able to(50)on new features with little fuss.A.burdenB.troubleC.taskD.weight
TCP means it is on the(74)layer and IP means it is on the(75)layer.A.networkB.transportC.data linkD.application
In which phase is a systems acceptance test plan developed and documented? () A.ImplementB.DesignC.PrepareD.Operate
Cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers ( )through a real-time communication network such as the Internet. In science, cloud computing is a ( )for distributed computing over a network, and means the ( )to run a program or application on many connected computers at the same time.The architecture of a cloud is developed at three layers: infrastructure, platform, and application. The infrastucture layer is built with virtualized computestorageand network resources. The platform lay-er is for general-purpose and repeated usage of the collection of software resources. The application layer is formed with a collection of all needed software modules for SaaS applications. The infrastucture layer serves as the (请作答此空)for building the platform layer of the cloud. In turn, the platform layer is foundation for implementing the ( )layer for SaaS application.A.networkB.foundationC.softwareD.hardware
A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier. Which design pattern provides a means to manage the uncertainty in the API?()A、 View HelperB、 Front ControllerC、 Composite ViewD、 Intercepting FilterE、 Business DelegateF、 Chain of Responsibility
You are creating a Windows Forms application by using the .NET Framework 3.5.You plan to deploy the application in multiple countries and languages.You need to ensure that the application meets the globalization requirements. Which two actions should you perform?()A、Handle server names and URLs as ASCII dataB、Use Unicode strings throughout the applicationC、Use the NumberFormatInfo class for numeric formattingD、Handle strings as a series of individual characters instead of entire stringsE、Avoid usage of the SortKey class and the CompareInfo class for sorting purposes
Your network contains a server that runs Windows Server 2008 R2.You plan to create a custom script.You need to ensure that each time the script runs, an entry is added to the Application event log.Which tool should you use?()A、EventcreateB、EventvwrC、WecutilD、Wevtutil
You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A、[Bindable(false)]B、[DesignOnly(false)]C、[EditorBrowsable(EditorBrowsableState.Never)]D、[Browsable(false)]
You use Microsoft .NET Framework 4 to create a Windows application. You plan to deploy the application by using Trusted Application Deployment. The application can only be installed by users who have elevated permissions. You need to ensure that users are not prompted for additional permissions when they install the application. Which two actions should you perform? ()A、Obfuscate the assemblies.B、Configure the application as online only.C、Enable User Account Control (UAC) on all client computers.D、Sign the deployment manifest with the publisher's digital certificate.E、Add the publisher of application to the trusted publisher's store on all client computers.
You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application.You need to ensure that on deployment, the application meets the following requirements: (1)It is executed on the client computer (2)It is removed from the client computer after the application is closed (3)It is not displayed in theAdd/Remove programs panel on the client computer What should you do?()A、Deploy the application to a central network server.Access the application by using the Remote Desktop Connection tool.B、Deploy the application by using the ClickOnce technology.Use the Mage exe tool to set the Online Only option in the deployment manifest.C、Deploy the application by using the ClickOnce technology.Set the Install attribute of the deployment tag to true in the deployment manifest.D、Deploy the application to a CDROM by using the ClickOnce technology.Execute the application from the CDROM
You create Windows Forms application by using the .Net FrameWork 3.5 You plan to deploy a new application to client computers that use the Windows Vista operating system. You need to ensure that the user can install the application without being prompted fore elevated permission.What should you do?()A、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a CD-ROM.Install the application on each client computer from the CD-ROMB、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a server on the network.Install the application on each client computer.C、Add the requestedExecutionLevel="highestAvailable" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.D、Add the requestedExecutionLevel="requiresAdministrator" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.
You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application by using the ClickOnce deployment technology. The application is signed by using a certificate obtained from a trustworthy authority. You need to ensure that the application can be deployed as a trusted application to Windows Vista client computers on a corporate network.What should you do?()A、Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.B、Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.C、Create a new certificatetrust list (CTL).Install the CTL on the server that has the ClickOnce application published.D、Create a new certificate trust list (CTL).Request the network administrator to deploy the CTL by using Group Policy.
You are a desktop administrator for your company. You need to deploy a new application. The application is packaged in an .msi file. The application will be used by only a small number of users. You plan to install the application by using the Msiexec.exe program. You need to ensure that the installation process does not display a user interface. What should you do?()A、Manually perform a passive installation of the application.B、Manually perform a quiet installation of the application.C、Use a logon script to run the Msiexec.exe program.D、Use the Runas utility to run the Msiexec.exe program.
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients. You plan to deploy a new application. You need to ensure that the application deployment meets the following requirements: èUsers must access the application from an icon on the Start menu. èThe application must be available to remote users when they are offline. What should you do?()A、Publish the application to users in the Staff OU.B、Publish the application to users in the Clients OU.C、Assign the application to computers in the Staff OU.D、Assign the application to computers in the Clients OU.
单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You plan to deploy the application to a test server. You need to ensure that during the initial request to the application, the code-behind files for the Web pages are compiled. You also need to optimize the performance of the application. Which code fragment should you add to the Web.config file?()Acompilation debug=true Bcompilation debug=false Ccompilation debug=true batch=true Dcompilation debug=false batch=false
多选题You are creating a Windows Forms application by using the .NET Framework 3.5.You plan to deploy the application in multiple countries and languages.You need to ensure that the application meets the globalization requirements. Which two actions should you perform?()AHandle server names and URLs as ASCII dataBUse Unicode strings throughout the applicationCUse the NumberFormatInfo class for numeric formattingDHandle strings as a series of individual characters instead of entire stringsEAvoid usage of the SortKey class and the CompareInfo class for sorting purposes
单选题()means a plan developed to ensure the application of measures designed to protect the port facility and ships, persons, cargo, cargo transport units and ships stores within the port facility from the risks of a security incident.AShip security planBCompany security planCPort facility security planDNational security plan
单选题By no means _____ to our plan for the trip.Awill she agreeBshe will agreeCagrees sheDwill agree she
单选题() means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.AShip security officerBCompany security officerCPort facility security officerDPSC officer
单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to deploy a new Applciation.You need to ensure that on deployment, the application meets the following requirements; (1)It is executed on the client computer. (2)It is removed from the client computer after the application closed. (3)It is not displayed in the Add/Remove programs panel on the client computer. What sould you do?()ADeploy the application to a central network server.- Access the application by using hte Remote Desktop Connection tool.BDeploy the application by using the ClickOnce technology.- Use the Mage.exe tool to set the Online Only option in the deployment manifest.CDeploy the application by using the ClickOnce technologoy.- Set the Install attiribute of the deployment tag to true in the deployment manifest.DDeploy the application to a CD-ROM by using the ClickOnce technology. - Execute the application from the CD-ROM.
单选题In which phase is a systems acceptance test plan developed and documented?()AImplementBDesignCPrepareDOperate
单选题You administer a SQL Server 2008 instance. You plan to deploy a third-party database application to the instance. The application uses stored procedures that are developed by using SQL CLR integration. The application must be configured to enable the EXTERNAL_ACCESS code access security setting. You need to ensure that the application is deployed to the instance without loss of functionality. What should you do first?()AReplace read write non-static fields in the code with static fields.BReplace read-only static fields in the code with read write static fields. CUse the peverify.exe PEVerify tool to verify whether the code meets the type-safety requirements.DUse the regasm.exe assembly registration tool to register the assembly on the server before deployment.
单选题A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier. Which design pattern provides a means to manage the uncertainty in the API?()A View HelperB Front ControllerC Composite ViewD Intercepting FilterE Business DelegateF Chain of Responsibility
单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application. The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()ACreate a custom action and set the NoImpersonate property to trueBCreate a custom action and set the NoImpersonate property to falseCCreate a manifest and set the RequestedExecutionLevel level attribute to AsInvokerDCreate a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator
单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application.The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()ACreate a custom action and set the NoImpersonate property to trueBCreate a custom action and set the NoImpersonate property to falseCCreate a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.DCreate a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.
单选题You are creating a Windows Forms application by using the .NET Framework 3.5.You plan to develop a new control for the application. You need to ensure that the control extends the DataGridView control by allowing the cells to contain multicolored text. What should you do?()AOverride the OnPaint method.BWrite a code segment to handle the CellPainting event.CWrite a code segment to handle the CellParsing event.DWrite a code segment to handle the RowPostPaint event.