参考答案和解析
正确答案:A,B,D
更多“Which three are considered match”相关问题
  • 第1题:

    Which factors must be most considered when developing acceptance criteria(72)

    A.Match with requirements

    B.User availability

    C.Ability to benchmark system

    D.Schedule of system delivery


    正确答案:A
    本题考查验收的标准。满足用户需求,基准系统的能力,用户可用性,预计交付时间。满足用户需求,是最重要的因素。所以答案选A。

  • 第2题:

    Which two statements about the open and shared key wireless-authentication methods are true? ()

    • A、 Shared key authentication is considered more secure than open authentication.
    • B、 Shared key authentication is considered less secure than open authentication.
    • C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
    • D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
    • E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

    正确答案:B,D

  • 第3题:

    Which three statements are true about terms in a policy?()

    • A、The order of the terms in a policy is irrelevant
    • B、The action is specified in a then statement
    • C、Ters are optional in a policy
    • D、The match condition can be identified with a from statement
    • E、Every policy must contain at least one term

    正确答案:B,D,E

  • 第4题:

    Which three statements are true about terms in a policy?()

    • A、The order of the terms in a policy is irrelevant.
    • B、The action is specified in a then statement.
    • C、Terms are optional in a policy.
    • D、The match condition can be identified with a from statement.
    • E、A from statement is mandatory in a term.

    正确答案:B,C,D

  • 第5题:

    Which of the following describes the roles of devices in a WAN (Choose three.)()。

    • A、A CSU/DSU terminates a digital local loop.
    • B、A modem terminates a digital local loop.
    • C、A CSU/DSU terminates an analog local loop.
    • D、A modem terminates an analog local loop.
    • E、A router is commonly considered a DTE device.
    • F、A router is commonly considered a DCE device.

    正确答案:A,D,E

  • 第6题:

    Which two statements about the open and shared key wireless-authentication methods are true?()

    • A、shared key authentication is considered more secure than open authentication
    • B、shared key authentication is considered less secure than open authentication
    • C、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
    • D、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
    • E、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

    正确答案:B,D

  • 第7题:

    Which three steps are considered part of the initial configuration?()

    • A、SNMP
    • B、hostname
    • C、root password
    • D、user password
    • E、management access interface

    正确答案:B,C,E

  • 第8题:

    多选题
    Which three statements about firewall modes are correct? ()
    A

    A firewall in routed mode has one IP address

    B

    A firewall in transparent mode has one IP address

    C

    In routed mode, the firewall is considered to be a Layer 2 dew

    D

    In routed mode, the firewall is considered to be a Layer 3 device

    E

    In transparent mode, the firewall is considered to be a Layer 2 device

    F

    In transparent mode, the firewall is considered to be a Layer 3 device


    正确答案: C,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which three options represent IDP policy match conditions?()
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which three statements are true about terms in a policy?()
    A

    The order of the terms in a policy is irrelevant

    B

    The action is specified in a then statement

    C

    Ters are optional in a policy

    D

    The match condition can be identified with a from statement

    E

    Every policy must contain at least one term


    正确答案: E,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements about the open and shared key wireless-authentication methods are true? ()
    A

    Shared key authentication is considered more secure than open authentication.

    B

    Shared key authentication is considered less secure than open authentication.

    C

    If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.

    D

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.

    E

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.


    正确答案: C,B
    解析: 暂无解析

  • 第12题:

    多选题
    Which three represent IDP policy match conditions? ()(Choose three.)
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    Given two different character sets (A and B), which of the following must be true for A to be considered a strict superset of B?()

    • A、 A must contain all of the characters defined in B
    • B、 A must be Unicode
    • C、 The encoded values in A must match the encoded values in B for all characters defined in B 
    • D、 A must be a multibyte character set
    • E、 The encoded values in A must match the encoded values in B for all numeric and alphabetic character

    正确答案:A,C

  • 第14题:

    Which three statements about firewall modes are correct? ()

    • A、 A firewall in routed mode has one IP address
    • B、 A firewall in transparent mode has one IP address
    • C、 In routed mode, the firewall is considered to be a Layer 2 dew
    • D、 In routed mode, the firewall is considered to be a Layer 3 device
    • E、 In transparent mode, the firewall is considered to be a Layer 2 device
    • F、 In transparent mode, the firewall is considered to be a Layer 3 device

    正确答案:A,D,E

  • 第15题:

    Which three options represent IDP policy match conditions?()

    • A、protocol
    • B、source-address
    • C、port
    • D、application
    • E、attacks

    正确答案:B,D,E

  • 第16题:

    Which three options represent IDP policy match conditions? ()(Choose three.)

    • A、service
    • B、to-zone
    • C、attacks
    • D、port
    • E、destination-address

    正确答案:B,C,E

  • 第17题:

    Which three options are considered in the spanning-tree decision process?()

    • A、lowest root bridge ID
    • B、lowest path cost to root bridge
    • C、lowest sender bridge ID
    • D、highest port ID
    • E、highest root bridge ID
    • F、highest path cost to root bridge

    正确答案:A,B,C

  • 第18题:

    Given the community: community my-company members "^[1-3]*7:666$"; Which three communitiesdoes this expression match?()

    • A、17:666
    • B、17:667
    • C、27:666
    • D、37:666
    • E、47:666

    正确答案:A,C,D

  • 第19题:

    多选题
    Which three pieces of information are considered while deciding the size of the undo tablespace in your database?()
    A

    the size of an undo block

    B

    the size of the redo log files

    C

    undo blocks generated per second

    D

    the size of the database buffer cache

    E

    the value of the UNDO_RETENTION parameter


    正确答案: C,D
    解析: 暂无解析

  • 第20题:

    多选题
    Which three options are considered in the spanning-tree decision process?()
    A

    lowest root bridge ID

    B

    lowest path cost to root bridge

    C

    lowest sender bridge ID

    D

    highest port ID

    E

    highest root bridge ID

    F

    highest path cost to root bridge


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    多选题
    Given two different character sets (A and B), which of the following must be true for A to be considered a strict superset of B?()
    A

    A must contain all of the characters defined in B

    B

    A must be Unicode

    C

    The encoded values in A must match the encoded values in B for all characters defined in B

    D

    A must be a multibyte character set

    E

    The encoded values in A must match the encoded values in B for all numeric and alphabetic characters in B


    正确答案: E,C
    解析: 暂无解析

  • 第22题:

    多选题
    Which three options represent IDP policy match conditions? ()(Choose three.)
    A

    service

    B

    to-zone

    C

    attacks

    D

    port

    E

    destination-address


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three steps are considered part of the initial configuration?()
    A

    SNMP

    B

    hostname

    C

    root password

    D

    user password

    E

    management access interface


    正确答案: B,A
    解析: 暂无解析

  • 第24题:

    多选题
    Which three are considered match criteria in a policy?()
    A

    prefix-list

    B

    protocol ospf

    C

    next-term

    D

    AS path

    E

    prefix-term


    正确答案: E,B
    解析: 暂无解析