183 The actual configuration of a PERT/CPM network _____ the amount of resources that can be devoted to the project.
A. Increases.
B. Is not affected by
C. Does not require
D. Is heavily dependent upon
E. Is the only means of determining
第1题:
● The critical path is calculated by
A subtracting the end date of task one from the start date of task two.
B determining which tasks have the least amount of total slack.
C totaling the time for all activities.
D determining the shortest path through the network.
E Determining which tasks have the most slack
第2题:
● The first step in building a PERT/CPM network is to:
A Create a flow chart
B Determine the critical path
C Show task relationships
D Create a work breakdown structure
E None of the above.
第3题:
PERT和CPM的最根本区别是( )。
A.CPM的工作逻辑关系肯定,PERT的工作逻辑关系不确定
B.CPM使用最大可能工作时间估计,PERT使用加权平均时间估计
C.CPM的工作必须进行,PERT的某些工作可以不进行
D.CPM不允许存在回路,PERT中可以存在回路
第4题:
A. Provides users access to network resources.
B. Performs router commands after user authentication.
C. Provides users with remote access only capabilities.
D. Does not require an authentication server
第5题:
A. NAC can authenticate using 802.1X and IBNS cannot
B. NAC can ensure only compliant machines connect and IBNS cannot
C. NAC can ensure access to the correct network resources and IBNS cannot
D. NAC can manage user mobility and reduce overhead costs and IBNS cannot
第6题:
第7题:
Which two statements are true about using IPv4 and IPv6 simultaneously on a network segment? ()
第8题:
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
第9题:
Which three statements are true about Cisco IOS Firewall?()
第10题:
A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?()
第11题:
It can be configured to block Java traffic.
It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
It can only examine network layer and transport layer information.
It can only examine transport layer and application layer information.
The inspection rules can be used to set timeout values for specified protocols.
The ip inspect cbac-name command must be configured in global configuration mode.
第12题:
The verify command will validate commands entered for syntax errors.
The save command will save the commands entered to the startup configuration.
The network administrator can perform a dry-run ACL configuration by verifying the configuration against the hardware and software resources available before applying it.
Configuration sessions can be saved and resumed at any time, even after upgrading NX-OS Software on the switch with ISSU.
Configuration sessions are global for all VDCs on the Nexus 7000.
第13题:
● The actual configuration of a PERT/CPM network _____ the amount of resources that can be devoted to the project.
A Increases.
B Is not affected by
C Does not require
D Is heavily dependent upon
E Is the only means of determining
第14题:
短文理解
听力原文: Spot transaction means the actual and variable amount of the currency of one country which at any given time, can be bought for a fixed sum in the currency of another country. It is a term meaning that these transactions are settled on the second working day from the date of the deal. For example, you buy $ 5,000.00 US dollars on October 10th( say Wednesday) , the purchased US dollars will value on October 12th.
21. What does spot transaction mean?
22.When are the spot transaction settled?
23.What's the value date for purchase of $ 5,000.00 US dollars in the passage?
(21)
A.It means that at any time you can buy currency of one country for another currency.
B.It means that the actual and variable amount of one currency can be bought for a fixed sum in another currency at any given time.
C.It means that any kind of currency can be bought at any time for another currency.
D.It means that the actual and fixed amount of the currency of one country at any time can be bought for a variable sum in the currency of another currency.
第15题:
A. A WX60 cluster can handle 155 Mbps.
B. WX devices can handle only up to 45 Mbps.
C. Only a WXC500 or WXC590 can handle this requirement.
D. A WXC or WX stack configuration deployment is required.
第16题:
A customer needs to create a number of LPARs on a new POWER6 server with some LPARs requiring a dedicated network and other LPARs utilizing Virtual Ethernet via a VIO server.Which limitation must be considered when planning the system configuration?()
A.A VIO server requires a dedicated LHEA port.
B.There is a limit of 32 LPARs per virtual LAN.
C.Two VIO servers will be required. A single VIO server can only provide virtual storage or virtual Ethernet.
D.Two VIO servers will be required. One to provide virtual networking and another to provide dedicated networking.
第17题:
第18题:
Which statement best describes ACL configuration using configuration session mode on Cisco Nexus switches?()
第19题:
A customer needs the ability to recover their data if a total system failure occurs. Which two of the following are the most important considerations in determining the solution?()
第20题:
Which two statements are true about network voice traffic? (Choose two.)()
第21题:
Kerberos is a form of user authentication that:()
第22题:
A customer needs to create a number of LPARs on a new POWER6 server with some LPARs requiring a dedicated network and other LPARs utilizing Virtual Ethernet via a VIO server. Which limitation must be considered when planning the system configuration?()
第23题:
A WX60 cluster can handle 155 Mbps.
WX devices can handle only up to 45 Mbps.
Only a WXC500 or WXC590 can handle this requirement.
A WXC or WX stack configuration deployment is required.