单选题The ARQ mode should be applied().Awhen two stations communicate with each otherBin any radio system and at any timeCwhen one ship sends a message to another stationDfor communication among some stations

单选题
The ARQ mode should be applied().
A

when two stations communicate with each other

B

in any radio system and at any time

C

when one ship sends a message to another station

D

for communication among some stations


参考解析

解析: 暂无解析

相关考题:

Which modifer should be applied to a declaration of a class member variable for the value of variable to remain constant after the creation of the object?() A.staticB.finalC.constD.abstract

(c) Describe the audit procedures you should perform. to determine the validity of the amortisation rate of fiveyears being applied to development costs in relation to Plummet. (5 marks)

If wire rope clips are used to make a joint in a wire lashing,be sure that ______.A.the saddle portion of the clip should be applied to the live load segment and the U-bolt to the dead or shortened end segmentB.the saddle portion and the U-bolt of the clip should be applied to the dead or shortened endC.neither the saddle portion nor the U-bolt of the clip should be applied to the live load segmentD.the U-bolt of the clip should be applied to the live load segment and the saddle portion to the dead or shortened end segment

A GRE tunnel is configured between a local and a remote site. Where should the service policy be applied to classify packets based on the pretunnel header? ()A、in global configuration mode, apply the service policy and use the qos pre-classifyB、in global configuration mode, apply the service policy but do not use the qos pre-classify commandC、apply the service policy on the physical interface but do not use the qos pre-classifyD、apply the service policy on the tunnel interface but do not use the qos pre-classify command E、apply the service policy on the tunnel interface and use the qos pre-classify command

Which two statements describe the behavior of the server's SQL mode?()A、The server's SQL mode determines how the server should behave when performing data validation check and interpreting different forms of syntaxB、The server's SQL mode determines whether the server should be read-only or should accept commands such as INSERT and UPDATEC、The server's SQL mode can be changed at the session level with a SET SESSION sql_mode="new_value" commandD、The server's SQL mode, when globally set on a slave server, applies to events sent from the master

You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ONB、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFFC、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.D、The firewall does not support DTP. You should set the switchport trunk mode to ON

Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()A、The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.B、The ACL is applied to the Telnet port with the ip access-group command.C、The ACL must be applied to each vty line individually.D、The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

Which three statements about IOS Firewall configurations are true?()A、The IP inspection rule can be applied in the inbound direction on the secured interface.B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

Multicast is being deployed in the network, and only ip pim sparse-dense mode has been configured on all interfaces in the network to support a new video streaming application. No other multicast configuration was applied anywhere in the network. Since enabling multicast, the network monitoring tools show periodic spikes in link utilization throughout the network, even in areas where the video application is not being used. What could be a possible cause?()A、PIM sparse mode is being used.B、PIM dense mode is being used.C、The BGP multicast address family has not been configured.D、IGMP version 3 is being used.E、IP PIM neighbor filters have not been applied.

Which statement about PPPoA configuration is correct?()A、The dsl operating-mode auto command is required if the default mode has been changedB、The ip mtu 1496 command must be applied on the dialer interfaceC、The encapsulation ppp command is requiredD、The ip mtu 1492 command must be applied on the dialer interface

When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()A、 A startB、 A ringC、 A target mode fcD、 A target mode scsi

Which of the following procedures should be performed to run diagnostics in single-user mode? ()A、 Run standalone diagnostics from the cd. B、 Run standalone diagnostics from the AIX tape. C、 Run maintenance mode diagnostics from the hard drive. D、 Run maintenance mode diagnostics from the diskette.

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  You need to ensure that the application is able to load staff information from an XML file into aDataSet instance. The XML file contains an inline schema. You have to call a method of theDataSet class in order to load the information.  Identify how you can accomplish this?()A、You should call the ReadXml method with the ReadSchema XML read mode.B、You should call the ReadXml method with the InferTypedSchema XML read mode.C、You should call the ReadXmlSchema method.D、You should call the ReadXml method with the InferSchema XML read mode.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. Windows Server 2008 isrun by two servers named S01 and S02. The Terminal Services server role is installed on S01. TheTerminal Services Licensing role service is installed on S02. Only 10 Terminal Services Client AccessLicenses are available. Now you receive an order from the company management. According to the company requirement, you have to limit the number of concurrent users connected to the Terminal Serverto 10. So what action should you perform?()A、A Group Policy object (GPO) should be created. Enable the Set the Terminal Services licensing modepolicy setting should be enabled and the Per Device option chosen. The GPO should be applied to S01.B、A Group Policy object (GPO) should be created. Enable the Set the Terminal Services licensing modepolicy setting should be enabled and the Per Device option chosen. The GPO should be applied to S02.C、A Group Policy object (GPO) should be created. The Set the Terminal Services licensing mode policysetting should be enabled and the Per User option should be chosen. The GPO should be applied to S01.D、A Group Policy object (GPO) should be created. The Set the Terminal Services licensing mode policysetting should be enabled and the Per User option should be chosen. The GPO should be applied to S02.

When configuring dual VIO servers to connect to SAN based disk in failover mode, what setting must be applied? ()A、 algorithm = failoverB、 algorithm = round_robinC、 reserve_policy = no_reserveD、 reserve_policy = single_path

多选题Which two statements describe the behavior of the server's SQL mode?()AThe server's SQL mode determines how the server should behave when performing data validation check and interpreting different forms of syntaxBThe server's SQL mode determines whether the server should be read-only or should accept commands such as INSERT and UPDATECThe server's SQL mode can be changed at the session level with a SET SESSION sql_mode=new_value commandDThe server's SQL mode, when globally set on a slave server, applies to events sent from the master

单选题Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()AThe ACL applied to the vty lines has no in or out option like ACL being applied to an interface.BThe ACL is applied to the Telnet port with the ip access-group command.CThe ACL must be applied to each vty line individually.DThe ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

多选题Which three statements about IOS Firewall configurations are true?()AThe IP inspection rule can be applied in the inbound direction on the secured interface.BThe IP inspection rule can be applied in the outbound direction on the unsecured interface.CThe ACL applied in the outbound direction on the unsecured interface should be an extended ACL.DThe ACL applied in the inbound direction on the unsecured interface should be an extended ACL.EFor temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.FFor temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. You have the head office printer configured as the default printer on the TerminalServer. According to the requirements of the company policy, all remote client computers must meet thefollowing requirements: Users must be able to access their local printers during a terminal session. The head office printer must bethe default printer of the client computers. A Group Policy object (GPO) needs to be created by using theTerminal Services Printer Redirection template to meet the company policy. What action should you perform?()AThe Do not set default client printer should be set to be default printer in a session option to Enabled.The GPO should be applied to all the client computers.BThe Easy Print driver first option should be set to Disabled. The GPO should be applied to the Terminal Server.CThe Use Terminal Services Easy Print driver first option should be set to Disabled. The GPO should be applied to all the client computers.DThe Do not set default client printer should be set to be default printer in a session option to Enabled.The GPO should be applied to the Terminal Server.

单选题To dynamically assign host routes on an LNS,where should the ip access-routes command be applied?()AprofileBremote hostCaaadomain-mapDl2tp destination profile

单选题When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()A A startB A ringC A target mode fcD A target mode scsi

单选题The oil quantity for bearing lubrication should be applied in such an amount as to be sufficient to carry away the () caused by the friction at the bearings.AacidsBadditivesCheatDgear

单选题Which of the following procedures should be performed to run diagnostics in single-user mode? ()A Run standalone diagnostics from the cd. B Run standalone diagnostics from the AIX tape. C Run maintenance mode diagnostics from the hard drive. D Run maintenance mode diagnostics from the diskette.

单选题Which VTP mode should a Cisco switch be set to if this switch is to add or delete VLANs to a management domain?()ATransparentBServerCAutoDClientEUser

单选题Which statement about PPPoA configuration is correct?()AThe dsl operating-mode auto command is required if the default mode has been changedBThe ip mtu 1496 command must be applied on the dialer interfaceCThe encapsulation ppp command is requiredDThe ip mtu 1492 command must be applied on the dialer interface

多选题Which three statements accurately describe IOS Firewall configurations?()AThe IP inspection rule can be applied in the inbound direction on the secured interfaceBThe IP inspection rule can be applied in the outbound direction on the unsecured interfaceCThe ACL applied in the inbound direction on the unsecured interface should be an extendedACL.DFor temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL