take a round turn on the bitt farthest from the pull and use figure-eights
take a round turn on the bitt closest to the pull and use figure-eights
use figure-eights and take a round turn at the top of the bitts
use only figure-eights
第1题:
A.SSH
B.WEP
C.VPN
D.WPA
第2题:
A tow astern is veering from side to side on its towline.The best way of controlling the action is to ______.
A.Trim the tow by the bow
B.Trim the tow by the stern
C.List the tow to windward
D.Adjust the length of the towing bridle
第3题:
A.RCP
B.Telnet
C.RSH
D.SSH
第4题:
Which two statements about the open and shared key wireless-authentication methods are true? ()
第5题:
Which of these is the best way to provide sender non-repudiation?()
第6题:
In towing,chocks are used to ______.
A.protect the towline from chafing
B.secure the end of the towline on the tug
C.stop off the towline while retrieving it
D.absorb shock loading on the towline
第7题:
An ocean tow is sinking in deep water. Attempts to sever the towing hawser are unsuccessful Which action should now be taken?______.
A.Abandon the towing vessel.
B.Radio for emergency assistance.
C.Slip the towline and allow it to run off the drum.
D.Secure all watertight openings on the towing vessel.
第8题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
A. WEP encryption
B. Channel rotation
C. Disable SSID
D. WPA encryption
第9题:
The recommended WAN Access method for a simplified and cost effective Cisco Single-site Secure Network Foundation Deployment provides which type of Service?()
第10题:
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()