要选择一个隐藏在其他对象后面的对象时,可以按住哪个快捷键后用鼠标单击。()A、ALTB、CTRLC、SHIFTD、ESC

要选择一个隐藏在其他对象后面的对象时,可以按住哪个快捷键后用鼠标单击。()

  • A、ALT
  • B、CTRL
  • C、SHIFT
  • D、ESC

相关考题:

Which two values are used by Spanning Tree Protocol to elect a root bridge?()A、amount of RAMB、bridge priorityC、IOS versionD、IP addressE、MAC addressF、speed of the links

Which routing protocol will continue to receive and process routing updates f rom neighbors after the passive - interface router configuration command is entered?()A、EIGRPB、RIPC、OSPFD、IS - IS

哪个命令加密所有明文密码?()A、 Router(config)#password-encryptionB、 Router(config)#service password-encryptionC、 Router#service password-encryptionD、 Router# password-encryption

What is the main reason for using the "ip ips deny-action ips-interface" IOS command?()A、 To selectively apply drop actions to specific interfacesB、 To enable IOS to droptraffic for signatures configured with the Drop actionC、 To support load-balancing configurations in which traffic can arrive via multipleinterfaces D、 This is nota valid IOS command

Company uses layer 3 switches in the Core of their network. Which method of Layer 3 switching  uses a forwarding information base (FIB)?()A、Topology-based switchingB、Demand-based switchingC、Route cachingD、Flow-based switchingE、None of the other alternatives apply

What is one reason that WPA encryption is preferred over WEP?()A、A WPA key is longer and requires more special characters than the WEP key.B、The access point and the client are manually configured with different WPA key values.C、WPA key values remain the same until the client configuration is changed.D、The values of WPA keys can change dynamically while the system is used.

If voice and data traffic will be sent and received via a WAN links, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic?()A、IPSec VPNB、QoS mechanismC、FirewallD、NATE、EIGRP routing protocolF、Static routing

A customer wants to create a 1:1 protection group with a DS3N-12 card. Which card slots would allow for a 1:1 protection?()A、Slot 2 and Slot 4B、Slot 4 and Slot 6C、Slots 5 or 13 onlyD、Slot 16 and Slot 17

What level of control does a subflow have on the overall contact?()A、The subflow cannot call additional or "nested" subflows. B、The subflow cannot transfer the contact to another resource. C、The subflow has full contact control and can perform any action that the parent flow can perform.

一位系统管理员在安装Windows Server 2003/2008的过程中,在安装向导的网络设置页面中选择了“典型设置”,那么当服务器安装完成后将其连接到公司的网络,它的IP地址会()A、 是192.168.0.1B、 从DHCP服务器自动获得C、 是0.0.0.0D、 是192.168.0.0/16网段的随机IP地址

Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network addres?()A、172.16.16.0B、172.16.24.0C、172.16.0.0D、172.16.28.0