PUT
GET
INFO
POST
HEAD
TRACE
第1题:
The symbol which appears beside a light on a chart reads Gp Fl R (2) 10 sec 160 ft 19M. Which characteristic describes the light?
A.It is visible 10 miles
B.Its distinguishing number is 19M
C.It has a radar reflector
D.None of the above
第2题:
Which of the following is NOT a characteristic of British government?()
第3题:
Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)
A. After a collision, the station that detected the collision has first priority to resend the lost data.
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
C. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
D. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
第4题:
Which two classes or interfaces provide a getSession method?()
第5题:
A cluster administrator decides ti implement application monitoring in order to monitor both a web application and its supporting database. The plan is to use a single resource group prod_rg and to configure one monitor method for the web app and one monitor method for the database. Which of the following statements best describes the need for custom resource monitor?()
第6题:
Which of the following is NOT a characteristic of British government?()
AIt offers the Queen high political status and supreme power.
BIt is both a parliamentary democracy and a constitutional monarchy.
CIt is the oldest representative democracy in the world.
DIt has no written form of Constitution.
第7题:
What is meant by the term "firewall sandwich"?()
第8题:
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
A. IPsec enforcement
B. 802.1X enforcement
C. Source IP enforcement
D. Odyssey Access Client
第9题:
Which two statements are true about the hashCode method?()
第10题:
Which HTTP method has the characteristic that multiple indential requests may produce side effect beyond those of a single request()?