题目
A.it
B.that
C.what
第1题
Separate passwords for every account make()difficult for cyber criminals to hack you.
A. it
B. that
C. what
第2题
What represents poor sanitary procedures ________.
A.Keep and use a separate filling hose for potable(drinking)water
B.Locate potable(drinking)water tanks as low as possible in the bilge
C.Eliminate enclosed spaces in which trash,food particles,dirt may gather
D.After washing dishes with soap and warm water,sterilize them in water of at least 170℉(76.7℃)
第3题
A.Allpasswordsautomaticallybecomecase-sensitive.
B.Allpasswordsremainnon-case-sensitivetilltheyarechanged.
C.Allpasswordsremainnon-case-sensitiveandcannotbechanged.
D.Allpasswordsremainnon-case-sensitiveuntiltheirpasswordattributeintheprofileisaltered.
第4题
A.Each router has an identical link state database.
B.External routes are imported into a separate link state database.
C.Syn chronization of link state databases is maintained via floodingo f LSAs.
D.Information in the link state database is used to build a routing table by calculating a shortest-path tree.
E.By default,link state databases are refreshede very 10 minutes in the absence of topology changes.
第5题
A.by encrypting all passwords passing through the router
B.by encrypting passwords in the plain text configuration file
C.by requiring entry of encrypted passwords for access to the device
D.by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E.by automatically suggesting encrypted passwords for use in configuring the router
第6题
A.ConfigureRODCfilteredattributesetontheserver
B.ConfigureRODCfilteredsetontheserverthatholdsSchemaOperationsMasterrole.
C.DelegatelocaladministrativepermissionsforanRODCtoanydomainuserwithoutgrantingthatuseranyuserrightsforthedomain
D.ConfigureforestfunctionallevelserverforWindowsserver2008toconfigurefilteredattributeset.
E.Noneoftheabove
第7题
A.easy to remember
B.hard to figure out
C.random numbers
D.popular names
第8题
A.Man-in-the-middle attack
B.Denial-of-service attack
C.Dictionary attack
D.Illicit server attack
第9题
A. It records the usernames and passwords of users when granted the DBA role.
B. It contains the usernames and passwords of users for whom auditing is enabled.
C. Is used by Oracle to authenticate users for remote database administration.
D. It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.
E. It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.
第10题
A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router
第11题
A.Login names and passwords are not encrypted
B.Damaging programs can be executed on the client
C.Damaging programs can be executed on the server
D.Passwords and Data is transferred in Cleartext
为了保护您的账号安全,请在“赏学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!