更多“判断题The “war on terror” should make it absolutely necessary for global security to rely on nuclear weapons.A 对B 错”相关问题
  • 第1题:

    It is necessary, absolutely, that I ____ it this morning.

    A.am going to return

    B.will return

    C.am to return

    D.should return


    答案:D

  • 第2题:

    Why is it necessary to warn engine room personnel before activating the fixed CO2 system?

    A.To make them aware there is a fire

    B.To let them know they should leave the engine room

    C.To prevent possible injury from frostbite

    D.To make them aware that ventilation will automatically stop


    正确答案:B

  • 第3题:

    It is absolutely vital that food supplies should be maintained.

    A:preserved
    B:kept
    C:supported
    D:upheld

    答案:B
    解析:
    本句意思是:保持食品的供应非常重要。句中maintain意为“保护、保持”,例如:Push yourself to make friends and to maintain the friendships.让自己与人交友并保持友谊。四个选项中:preserve意为“保存”,例如:We will do everything to preserve peace.我们会尽全力维持和平。keep意为“保持”,例如:I kept working on my project.我一直忙于我的项目。 support意为“支持”。uphold意为“拥护、支持”,例如:Our policy has been to uphold the law.拥护法律是我们一贯的方针。只有选项B同句中画线单词含义接近。

  • 第4题:

    In order to understand a text well, it is absolutely necessary to understand every word in the first place.()

    A

    B



  • 第5题:

    What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()

    • A、 Smaller companies are at less risk than larger enterprises, so their security needs are not as great.
    • B、 Business strategy should directly relate to the security policy and budget.
    • C、 The designated security expert should report to the IT department, since that is where thesolution will be implemented.
    • D、 Security should be a continuous process.
    • E、 Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.

    正确答案:B,D

  • 第6题:

    You are the network administrator for your company. The network consists of a single Active   Directory forest. The forest consists of 19 Active Directory domains. Fifteen of the domains contain  Windows Server 2003 domain controllers. The functional level of all the domains is Windows 2000 native.  The network also consists of a single Microsoft Exchange 2000 Server organization. You need to create  groups that can be used only to send e-mail messages to user accounts throughout the company. You  want to achieve this goal by using the minimum amount of replication traffic and minimizing the size of the  Active Directory database. You need to create a plan for creating e-mail groups for your company.  What should you do?()

    • A、 Create global distribution groups in each domain. Make the appropriate users from each domain members of the global distribution group in the same domain. Create universal distribution groups. Make the global distribution groups in each domain members of the universal distribution groups.
    • B、 Create global security groups in each domain. Make the appropriate users from each domain members of the security group in the same domain. Create universal security groups. Make the global security groups in each domain members of the universal security groups.
    • C、 Create universal distribution groups. Make the appropriate users from each domain members of a universal distribution group.
    • D、 Create universal security groups. Make the appropriate users from each domain members of a universal security group.

    正确答案:A

  • 第7题:

    You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()

    • A、Assign the Generate security audits user right to the ITSecurity global group.
    • B、Assign the Manage auditing and security logs user right to the ITSecurity global group.
    • C、Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
    • D、Assign the Act as part of the operating system user right to the ITSecurity global group.

    正确答案:B

  • 第8题:

    单选题
    You are designing a security group strategy to meet the business and technical requirements. What should you do?()
    A

    Create one global group named G_Executives. Make all executives user accounts members of that group.

    B

    Create two global groups named G_Executives and one universal group named U_Executives. Make the two global members of U_Executives. Make the executive user accounts members of the appropriate global group.

    C

    Create three global groups named G_NY_Executives and G_Chi_Executives and G_Executives. Make G_NY_Executives and G_Chi_Executives members of G_Executives. Make the executive user accounts members of the appropriate global group.  

    D

    Create one domain local group named DL_Executives. Make all executive user accounts members of that group.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    判断题
    In order to understand a text well, it is absolutely necessary to understand every word in the first place.()
    A

    B


    正确答案:
    解析: 暂无解析

  • 第10题:

    判断题
    The “war on terror” should make it absolutely necessary for global security to rely on nuclear weapons.
    A

    B


    正确答案:
    解析:
    录音中描述的是“对恐怖主义的战争”应提供动力以努力促进全球安全,从而使“reliance on nuclear weapons obsolete”,其中obsolete指“过时的;废弃的”,也就是说争取使对核武器的依赖得以消除,而非题干描述的“依靠核武器”。
    【录音原文】
    The “war on terror” should provide an impetus to work towards a global security culture that will serve the interests of all countries equally, and will make reliance on nuclear weapons obsolete.

  • 第11题:

    多选题
    What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
    A

    Smaller companies are at less risk than larger enterprises, so their security needs are not as great.

    B

    Business strategy should directly relate to the security policy and budget.

    C

    The designated security expert should report to the IT department, since that is where thesolution will be implemented.

    D

    Security should be a continuous process.

    E

    Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.


    正确答案: A,C
    解析: 暂无解析

  • 第12题:

    单选题
    The mere fact______most people believe a nuclear war would be mad does not mean that it will not occur.
    A

    what

    B

    which

    C

    that

    D

    why


    正确答案: C
    解析:

  • 第13题:

    We must reduce the danger of war by controlling nuclear, chemical and () arms.

    A、accustomed

    B、used

    C、conventional

    D、adjusted


    参考答案:C

  • 第14题:

    is one kind of software absolutely necessary for every computer.

    A.Operating System

    B.Word processing

    C.Keyboard

    D.Center Processing Unit


    正确答案:A
    解析:译文:操作系统是计算机运行不可缺少的一类软件。

  • 第15题:


    What can be inferred from the passage?( )

    A.Security fears and environmental concerns should be priorities.
    B.Supply is a priority over security fears and environmental concerns.
    C.Nuclear is not a secure energy source.
    D.Energy-security concerns are a priority.

    答案:B
    解析:
    推理题。本文的中心思想是能源供应乃能源问题的重中之重,如果没有了可供人们使用的能源,保护环境也就失去了意义。故本题选B。参考译文:安全供应是能源政策的首要议题。世界经济论坛最近对60多位能源行业领袖进行了调查,其中包括大公司首席执行官和政府高级官员。从伊拉克战争到尼日利亚和委内瑞拉的罢工,再到壳牌估计储量的削减,再到人们对新发现石油数量不断减少的担忧,地缘政治动荡已将油价推升至创纪录高点。1973年和1979年的石油危机对石油价格产生了永久的影响,如今同样的事情可能会再次发生——这足以让我们集中精力确保石油供应,并找到切实可行的石油替代品。对安全的担忧迫使他们做出艰难的选择。历史表明,政策制定者在考虑社会环境问题之前会优先考虑价格和供应,这遵循了马斯洛金字塔的基本规则。马斯洛金字塔理论是由美国心理学家亚伯拉罕·马斯洛在20世纪50年代提出的,用来解释正常人类的动机。正如马斯洛所说,一个缺乏食物、爱和尊重的正常人“对食物的渴望可能比对其他任何东西都强烈”。听起来很简单,但这个想法对于解释当前社会和环境争议性能源的复苏,尤其是煤炭、核能和大型水电的复苏,大有裨益。复苏的迹象随处可见。布什政府的能源计划将促进核技术和清洁煤的研究。中国计划到2020年将核电发电量从目前的1.5%提高到4%,法国国有电力公司(法国电力公司)刚刚再次确认其对核能的承诺,并将建造欧洲压水堆的前身。刚果河上新建大型水电站英戈大坝的计划,这些都反映了全球对大型水电项目的兴趣正在复苏的趋势。地缘政治推动了这些趋势。核燃料可以高效地储存,所有大陆都蕴含着丰富的煤炭资源,水电是本地的资源,因此所有这些资源都能以某种方式免受地缘政治动荡的影响。石油以外的多元化需求,也迫使供应商重新考虑天然气。长期以来,天然气一直是能源家族中的“穷亲戚”。卡塔尔第二任副总理兼能源部长阿提亚说,卡塔尔曾经对上世纪80年代发现的是天然气而不是石油感到失望,然后花了20年时间才认识到天然气的价值。如今,液化天然气成本的下降正使其更容易运往日益增长的世界市场,使其成为一种日益全球化和有价值的大宗商品。世界经济论坛最近对能源行业的首席执行官和政府监管机构进行的一项调查显示,47%的受访者认为天然气是最有希望替代石油的能源,另有40%的人认为煤炭是最有希望替代石油的能源。通常,对安全和环境的担忧会将决策者推向相反的方向。核能和天然气受益于对气候变化的讨论,而煤炭和核能则受益于对能源安全的担忧。天然气正在取得进展,部分原因是它燃烧干净,但同时它也面临着与石油类似的地缘政治上的安全担忧:40%以上的资源集中在俄罗斯、卡塔尔和伊朗。只要有关供应安全主导的政策议程,一旦是关于高阶问题的达成,包括《京都议定书》在内的协议,一些国家就会面临困难。那些还没有获得可负担的电力供应的国家将致力于在达成环境议程之前寻找低廉的解决方案。如果建立联盟可能会产生更直接的影响。正如马斯洛所预言的,人们会先担心餐桌上的食物,然后才会担心盘子有多干净,或者谁会和他们一起吃饭。印度的甘地利用这一观点进行阐述,她将贫困称为终极污染物,并将其置于能源领域内:如果所有人都有脏乱的煤炭,那么他们就会烧煤。当简单的解决方案更有前景时,环保主义者往往会推动昂贵的高科技。例如,阿联酋国家石油公司首席执行官、论坛成员之一苏尔坦曾表示,液化天然气尽管位置偏远,但其能够满足快速、廉价和相对清洁的能源需求。因此,供应不仅仅是大型石油公司首席执行官们考虑的首要问题。为了实现目标,环保主义者也应该把供应放在首位,因为当事态严重时,能源安全将成为最大的问题。

  • 第16题:

    In order to understand a text well, it is absolutely necessary to understand every word in the first place.()


    正确答案:错误

  • 第17题:

    You are designing a security group strategy to meet the business and technical requirements. What should you do?()

    • A、Create one global group named G_Executives. Make all executives user accounts members of that group.
    • B、Create two global groups named G_Executives and one universal group named U_Executives. Make the two global members of U_Executives. Make the executive user accounts members of the appropriate global group.
    • C、Create three global groups named G_NY_Executives and G_Chi_Executives and G_Executives. Make G_NY_Executives and G_Chi_Executives members of G_Executives. Make the executive user accounts members of the appropriate global group.  
    • D、Create one domain local group named DL_Executives. Make all executive user accounts members of that group.

    正确答案:B

  • 第18题:

    You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. A user named Mrs. King works in the information technology (IT) security department. Mrs. King is a member of the ITSecurity global group. Mrs. King reports that no one in the ITSecurity global group can access the security log from the console of a computer named Testking1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Testking1. How should you modify the local security policy?()

    • A、Assign the Generate security audits user right to the ITSecurity global group.
    • B、Assign the Manage auditing and security logs user right to the ITSecurity global group.
    • C、Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
    • D、Assign the Act as part of the operating system user right to the ITSecurity global group.

    正确答案:B

  • 第19题:

    You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()

    • A、Assign the Generate security audits user right to the ITSecurity global group.
    • B、Assign the Manage auditing and security logs user right to the ITSecurity global group.
    • C、Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
    • D、Assign the Act as part of the operating system user right to the ITSecurity global group.

    正确答案:B

  • 第20题:

    单选题
    You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()
    A

    Assign the Generate security audits user right to the ITSecurity global group.

    B

    Assign the Manage auditing and security logs user right to the ITSecurity global group.

    C

    Assign the Allow logon through Terminal Services user right to the ITSecurity global group.

    D

    Assign the Act as part of the operating system user right to the ITSecurity global group.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()
    A

    Assign the Generate security audits user right to the ITSecurity global group.

    B

    Assign the Manage auditing and security logs user right to the ITSecurity global group.

    C

    Assign the Allow logon through Terminal Services user right to the ITSecurity global group.

    D

    Assign the Act as part of the operating system user right to the ITSecurity global group.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    The mere fact ______ most people believe a nuclear war would be mad does not mean that it will not occur.
    A

    what

    B

    which

    C

    that

    D

    why


    正确答案: C
    解析:
    句意:大部分人认为核战争是疯狂的,但仅仅这个事实并不代表它不会发生。本题考查同位语从句。同位语从句一般跟在某些抽象名词如idea/thought/news/fact/truth等后面,用来说明这些词所指代的具体内容。因此本题应填入同位语从句的引导词that,that在从句中不充当任何成分,也没有实际意义。故选C。

  • 第23题:

    单选题
    You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. A user named Mrs. King works in the information technology (IT) security department. Mrs. King is a member of the ITSecurity global group. Mrs. King reports that no one in the ITSecurity global group can access the security log from the console of a computer named Testking1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Testking1. How should you modify the local security policy?()
    A

    Assign the Generate security audits user right to the ITSecurity global group.

    B

    Assign the Manage auditing and security logs user right to the ITSecurity global group.

    C

    Assign the Allow logon through Terminal Services user right to the ITSecurity global group.

    D

    Assign the Act as part of the operating system user right to the ITSecurity global group.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    While some military planners claimed that it would be possible to win a war fought with nuclear weapons, many scientists argued that such a war could not truly be won, because the fallout from nuclear warfare would create a nuclear winter and it also would be rendering the earth uninhabitable.
    A

    it also would be rendering the earth uninhabitable

    B

    rendering the earth uninhabitable

    C

    might have uninhabitably rendered the earth

    D

    render the earth uninhabitable

    E

    would also have rendered the earth uninhabitable


    正确答案: B
    解析:
    插入的内容和“create a nuclear winter”构成平行结构,故D项是正确的。