function CheckIt(action){var i=ans[count];if(!action){if(FORM1.Q1[i].checked){alert("Correct!");}else{alert("Incorrect.");answrong++;}}else{FORM1.Q1[i].checked ? ansright++ : answrong++;}}function CheckScore(){alert("CORRECT: " + ansright + "\nINCORRECT: " + answrong);}function GoBack(){var myEl = document.getElementsByTagName("p");var mySpans = document.getElementsByTagName("span");var qnum = 0;tmpstr="";count--;qnum = count + 1;if(count < 0){count=0;alert("This is the first question!");return;}tmpstr = " " + qnum + ". " + q[count];myEl[1].innerHTML=tmpstr;mySpans[0].innerHTML=a[count];mySpans[1].innerHTML=b[count];mySpans[2].innerHTML=c[count];mySpans[3].innerHTML=d[count];}function GoNext(){var myEl = document.getElementsByTagName("p");var mySpans = document.getElementsByTagName("span");var qnum=0;tmpstr="";CheckIt(1);count++;qnum=count+1;if(count > 99){TestOver();return;}tmpstr=" " + qnum + ". " + q[count];myEl[1].innerHTML=tmpstr;mySpans[0].innerHTML=a[count];mySpans[1].innerHTML=b[count];mySpans[2].innerHTML=c[count];mySpans[3].innerHTML=d[count];ClrRadios();}function TestOver(){var myEl = document.getElementsByTagName("div");var myP = document.getElementsByTagName("p");var endscores = 'Correct: ' + ansright + "
";endscores += "Incorrect: " + answrong + "
";endscores += "Percentage: " + Math.floor((ansright/(ansright + answrong))*100);endscores += "%
";myP[1].innerHTML="TEST OVER!";myEl[0].innerHTML=endscores;FORM1.B0.disabled=1;FORM1.B1.disabled=1;FORM1.B2.disabled=1;}function Choose(){navigate("main00.pl?Z=./test/index.html");}function GoStart(){history.go(0);ClrRadios();}function ClrRadios(){FORM1.Q1[0].checked=false;FORM1.Q1[1].checked=false;FORM1.Q1[2].checked=false;FORM1.Q1[3].checked=false;}FORM1.B0.onclick=GoBack;FORM1.B1.onclick=CheckIt;FORM1.B2.onclick=GoNext;FORM1.B4.onclick=GoStart;FORM1.B5.onclick=CheckScore;FORM1.B6.onclick=Choose;var count=0;var ansright=0;var answrong=0;var q=new Array();var ans=new Array();var a=new Array();var b=new Array();var c=new Array();var d=new Array();q[0]="The definition of the server is:";a[0]="A. Provides services to clients";b[0]="B. Provides access to shared resources to clients";c[0]="C. Provides access to shared resources but not services to clients";d[0]="D. None of the above";ans[0]="3";q[1]="Which of the following is not a basic server role category?";a[1]="A. Local Hardware Share";b[1]="B. Local Software Share";c[1]="C. Communications Share";d[1]="D. Local Service Share";ans[1]="3";q[2]="A file and print server is providing what basic server role category?";a[2]="A. Local Hardware Share";b[2]="B. Storage Share";c[2]="C. Communications Share";d[2]="D. Network Service Provider";ans[2]="0";q[3]="The Microsoft Terminal Server is a modern example of what network paradigm?";a[3]="A. Peer-to-Peer";b[3]="B. Client/Server";c[3]="C. Centralized Processing";d[3]="D. None of the above";ans[3]="2";q[4]="Two systems running as a Cluster Server are an example of what network paradigm?";a[4]="A. Client/Server";b[4]="B. Centralized Processing";c[4]="C. Distributed Centralized Processing";d[4]="D. None of the above";ans[4]="2";q[5]="A server role is:";a[5]="A. One share or service that the server provides to the network";b[5]="B. One specific server performance capability";c[5]="C. One specific server function";d[5]="D. One specific server behavior";ans[5]="0";q[6]="The server's mission is best described as:";a[6]="A. The server's basic role";b[6]="B. The server's basic set of roles and its performance";c[6]="C. The server's entire set of roles and its importance";d[6]="D. None of the above";ans[6]="2";q[7]="An application server is providing what basic server role category?";a[7]="A. Local Hardware Share";b[7]="B. Local Software Share";c[7]="C. Communications Share";d[7]="D. Network Service Provider";ans[7]="1";q[8]="An authentication server is providing what basic category of role?";a[8]="A. Communications services";b[8]="B. Management Services";c[8]="C. Applications Services";d[8]="D. Storage Services";ans[8]="1";q[9]="A backup primary standalone server could fulfill what role?";a[9]="A. Management server";b[9]="B. Applications server";c[9]="C. Fail-over server";d[9]="D. Network service provider";ans[9]="2";q[10]="A server providing one necessary service to the network is a:";a[10]="A. primary standalone";b[10]="B. backup primary standalone";c[10]="C. primary member";d[10]="D. auxiliary services standalone";ans[10]="2";q[11]="A server that provides all services and coordinates this behavior with the first server that does the same is a:";a[11]="A. primary standalone";b[11]="B. backup primary standalone";c[11]="C. primary member";d[11]="D. auxiliary services standalone";ans[11]="1";q[12]="Another term for an auxiliary services server is:";a[12]="A. backup primary member server";b[12]="B. special role server";c[12]="C. active primary backup server";d[12]="D. passive primary backup server";ans[12]="1";q[13]="Another term for a load balancing primary server is:";a[13]="A. backup primary member server";b[13]="B. special role server";c[13]="C. active primary backup server";d[13]="D. passive primary backup server";ans[13]="2";q[14]="Which of the following is not considered a true availability level?";a[14]="A. Priority";b[14]="B. Available";c[14]="C. High Availability";d[14]="D. Mission Critical";ans[14]="0";q[15]="Mission critical servers are said to be ____ percent available.";a[15]="A. 99";b[15]="B. 99.9";c[15]="C. 99.99";d[15]="D. 100";ans[15]="2";q[16]="The scope of a network is measured by:";a[16]="A. The physical dimensions";b[16]="B. The total population of nodes";c[16]="C. The logical populations and segmentation";d[16]="D. All of the above";ans[16]="3";q[17]="Network scalability is:";a[17]="A. The current capacity to grow in size";b[17]="B. The future capacity to grow in population";c[17]="C. The current capacity to increase in scope without major changes";d[17]="D. None of the above";ans[17]="2";q[18]="Which role involves allowing the public to use the organizations workstations hands-on?";a[18]="A. Special Role Services";b[18]="B. Remote Access Portal Services";c[18]="C. Public Access Segment Services";d[18]="D. Public Access Domain Services";ans[18]="2";q[19]="Which role involves allowing the public to access the organizations information from anywhere?";a[19]="A. Special Role Services";b[19]="B. Remote Access Portal Services";c[19]="C. Public Access Segment Services";d[19]="D. Public Access Domain Services";ans[19]="3";q[20]="Which role involves allowing only employees to access the organizations information from anywhere?";a[20]="A. Special Role Services";b[20]="B. Remote Access Portal Services";c[20]="C. Public Access Segment Services";d[20]="D. Public Access Domain Services";ans[20]="1";q[21]="What server design factors may be influenced by a limited budget?";a[21]="A. Hardware vs. Software Solutions";b[21]="B. Availability vs. Recoverability Solutions";c[21]="C. Combining too many roles per server";d[21]="D. All of the above";ans[21]="3";q[22]="The server framework is:";a[22]="A. The logical hierarchy of the servers";b[22]="B. The physical interconnectivity of the servers";c[22]="C. The telecommunications rack to which they are mounted";d[22]="D. Both A and B";ans[22]="3";q[23]="What phase of the IT project involves gathering information about what the project should do?";a[23]="A. Prototype phase";b[23]="B. Pilot phase";c[23]="C. Proposal phase";d[23]="D. Evaluation phase";ans[23]="2";q[24]="What phase of the IT project constructs the first working version?";a[24]="A. Prototype phase";b[24]="B. Pilot phase";c[24]="C. Proposal phase";d[24]="D. Evaluation phase";ans[24]="0";q[25]="During what phase of a server project is the selection of a suitable location considered?";a[25]="A. Prototype phase";b[25]="B. Planning phase";c[25]="C. Proposal phase";d[25]="D. Evaluation phase";ans[25]="1";q[26]="Which of the following is not a factor in server environment planning?";a[26]="A. Physical security";b[26]="B. Logical security";c[26]="C. Environmental conditions";d[26]="D. Site ergonomics and functionality";ans[26]="1";q[27]="Which of the following is not a factor in server operating system planning?";a[27]="A. Supports all intended server roles";b[27]="B. Support staff are certified in it";c[27]="C. Meets or exceeds expected mission requirements";d[27]="D. Supports all intended hardware and software";ans[27]="2";q[28]="Which of the following hardware components will have the most influence on the servers performance?";a[28]="A. hard drive(s)";b[28]="B. storage controllers";c[28]="C. RAM";d[28]="D. motherboard";ans[28]="3";q[29]="Which of the following has the most influence on the motherboards performance limits?";a[29]="A. Type of RAM supported";b[29]="B. Integrated peripherals";c[29]="C. Type of CPU supported";d[29]="D. Chipset";ans[29]="3";q[30]="Which of the following components does not directly offer high availability solutions?";a[30]="A. storage controllers";b[30]="B. expansion bus type";c[30]="C. RAM";d[30]="D. CPU";ans[30]="3";q[31]="Which of the following technologies is a RAM high availability solution?";a[31]="A. dual channel";b[31]="B. DDR2";c[31]="C. ECC";d[31]="D. fully buffered";ans[31]="2";q[32]="Which of the following is a storage controller high availability solution?";a[32]="A. SATA";b[32]="B. SCSI";c[32]="C. RAID";d[32]="D. All of the above";ans[32]="2";q[33]="Which of the following is a high availability expansion bus?";a[33]="A. PCI-X";b[33]="B. PCI-Express";c[33]="C. PCI Hotplug";d[33]="D. All of the above";ans[33]="2";q[34]="Which of the following is a high availability external peripheral?";a[34]="A. Line conditioner";b[34]="B. KVM switch";c[34]="C. External storage";d[34]="D. Dual displays";ans[34]="0";q[35]="Which of the following components has high availability versions?";a[35]="A. chassis";b[35]="B. power supply";c[35]="C. motherboard";d[35]="D. tape backup drive";ans[35]="1";q[36]="Which device presents a security liability if installed on a server?";a[36]="A. Diabled USB port";b[36]="B. Used NIC port";c[36]="C. Optical drive";d[36]="D. All of the above";ans[36]="2";q[37]="Which of the following CPU features has the most influence on its performance?";a[37]="A. FSB throughput";b[37]="B. Amount of cache";c[37]="C. Number of levels of cache";d[37]="D. Cache speed";ans[37]="0";q[38]="Which of the following RAM module technologies allows the motherboard to support more RAM?";a[38]="A. Dual channel";b[38]="B. Registered";c[38]="C. DDR2";d[38]="D. ECC";ans[38]="1";q[39]="Which of the following has more influence on the performance of a server?";a[39]="A. The total amount of installed RAM";b[39]="B. The usage of ECC vs. non-ECC";c[39]="C. The usage of dual channel";d[39]="D. The usage of fully buffered RAM";ans[39]="0";q[40]="Which of the following has little or no influence in the performance of a hard drive?";a[40]="A. Platter utilitization";b[40]="B. Platter speed";c[40]="C. Platter size";d[40]="D. Interface bandwidth";ans[40]="2";q[41]="Which of the following components is likely to be inferior on a server vs. a home PC?";a[41]="A. Storage controller";b[41]="B. Hard drive";c[41]="C. Video card";d[41]="D. RAM";ans[41]="2";q[42]="Which of the following is likely to be superior on a server vs. a home PC?";a[42]="A. Powerline appliances";b[42]="B. Display";c[42]="C. Video card";d[42]="D. Sound card";ans[42]="0";q[43]="Which external powerline appliance is considered a high availability solution?";a[43]="A. Redundant power supplies";b[43]="B. Surge Protector";c[43]="C. Line Conditioner";d[43]="D. UPS";ans[43]="3";q[44]="Which of the following classes of general purpose computer is not installation level?";a[44]="A. Supercomputer";b[44]="B. Mainframe";c[44]="C. Minicomputer";d[44]="D. They are all installation level";ans[44]="2";q[45]="Which of the following classes of general purpose computer must be custom ordered to be built from the manufacturer?";a[45]="A. Supercomputer";b[45]="B. Mainframe";c[45]="C. Minicomputer";d[45]="D. They are all custom built";ans[45]="0";q[46]="Which of the following components is superior in the PC-based microcomputer than even what is found in the mainframe?";a[46]="A. Motherboard";b[46]="B. Expansion bus";c[46]="C. Storage Controller";d[46]="D. CPU";ans[46]="3";q[47]="Which of the following chassis is not specifically made for a server class PC?";a[47]="A. Full tower case";b[47]="B. Rackmount chassis";c[47]="C. Cabinet chassis";d[47]="D. Blade chassis";ans[47]="0";q[48]="Member servers participate with each other on the:";a[48]="A. Physical network segment";b[48]="B. Physical network collision domain";c[48]="C. Logical server framework";d[48]="D. Logical network segment";ans[48]="2";q[49]="Which class of PC-based server will likely require special physical framework hardware?";a[49]="A. Cabinet chassis primary member server";b[49]="B. Blade chassis primary standalone server";c[49]="C. Standard PC tower cluster server node";d[49]="D. Both B and C";ans[49]="3";q[50]="Which of the following is not a direct server capacity planning factor?";a[50]="A. OS requirements";b[50]="B. Number of clients";c[50]="C. Storage capacity";d[50]="D. Public access special role";ans[50]="3";q[51]="Which of the following directly affect server capacity planning at the hardware level?";a[51]="A. Processing power";b[51]="B. RAM amount";c[51]="C. Availability requirements";d[51]="D. All of the above";ans[51]="3";q[52]="Which of the following is not an example of a local software share type of server?";a[52]="A. Chat Server";b[52]="B. Terminal Server";c[52]="C. DHCP Server";d[52]="D. SQL Server";ans[52]="2";q[53]="Which of the following would be a factor in combining server roles?";a[53]="A. Economics";b[53]="B. Combining similar/related roles";c[53]="C. Putting high availability systems to work";d[53]="D. All of the above";ans[53]="3";q[54]="Which of the following is not a communications share type server role?";a[54]="A. Telnet server";b[54]="B. Mail server";c[54]="C. Fax server";d[54]="D. RADIUS Server";ans[54]="1";q[55]="Which of the following is not a local hardware share type of server role?";a[55]="A. Name server";b[55]="B. File server";c[55]="C. Print server";d[55]="D. FTP server";ans[55]="0";q[56]="Which of the following servers never participates in Internet services?";a[56]="A. FTP server";b[56]="B. Mail server";c[56]="C. Remote Access server";d[56]="D. Proxy server";ans[56]="2";q[57]="Which of the following is not considered a network service provider?";a[57]="A. Authentication server";b[57]="B. DHCP server";c[57]="C. DNS server";d[57]="D. File and Print Server";ans[57]="3";q[58]="Which of the following is a server physical architectural design parameter?";a[58]="A. Network connectivity";b[58]="B. Chassis form factor";c[58]="C. Number of Roles";d[58]="D. Types of Roles";ans[58]="0";q[59]="The two main reasons a computer system will suffer data loss are:";a[59]="A. Malicious Code and Malicious Users";b[59]="B. Viruses and Spyware";c[59]="C. Accident and Malicious Intent";d[59]="D. Destruction and Theft";ans[59]="2";q[60]="The two main ways that data is lost are:";a[60]="A. Malicious Code and Malicious Users";b[60]="B. Viruses and Spyware";c[60]="C. Accident and Malicious Intent";d[60]="D. Destruction and Theft";ans[60]="3";q[61]="A virus is by definition:";a[61]="A. code that copies itself without user knowledge or intervention";b[61]="B. code that copies itself with user knowledge and intervention";c[61]="C. code that cannot copy itself regardless of user knowledge or intervention";d[61]="D. None of the above";ans[61]="0";q[62]="A warhead is generally classified as:";a[62]="A. Destructive vs. Data Theft";b[62]="B. Resident vs. Non-resident";c[62]="C. Prolific vs. Non-prolific";d[62]="D. Immediate vs. Event triggered";ans[62]="3";q[63]="Which of the following is often grouped with viruses but is not one by definition:";a[63]="A. Encrypted virus";b[63]="B. Worm";c[63]="C. Mutating virus";d[63]="D. Trojan Horse";ans[63]="3";q[64]="What makes metamorphic viruses so difficult to scan for?";a[64]="A. They always change so there is no fixed signature to match them to";b[64]="B. They undertake active countermeasures against anti-virus software";c[64]="C. They are non-resident forms of virus";d[64]="D. They are not particularly difficult to scan for";ans[64]="0";q[65]="The most common cause of data loss throughout the PC era has always been:";a[65]="A. Malicious code";b[65]="B. Malicious users";c[65]="C. Software bugs";d[65]="D. Human error";ans[65]="3";q[66]="Non-resident viruses:";a[66]="A. Execute for a short time then erase themselves from RAM";b[66]="B. Execute for a short time then erase themselves from the vector";c[66]="C. Execute for the duration of the computing session in RAM";d[66]="D. Execute for the duration of the computing session in the vector";ans[66]="0";q[67]="A prime example of a prolific virus is a:";a[67]="A. Trojan horse";b[67]="B. Worm";c[67]="C. Stealth virus";d[67]="D. Encrypted virus";ans[67]="1";q[68]="The only way to ensure that a virus infected system has been cleaned is:";a[68]="A. Scan it with a write-protected KGCC boot disk";b[68]="B. Format the hard drive and reinstall everything from backups";c[68]="C. Wipe the hard drive with zeros then reinstall everything";d[68]="D. There is no known way to ensure that the system has been cleaned";ans[68]="0";q[69]="Which of the following is not a physical virus vector?";a[69]="A. Network Interface Card";b[69]="B. USB flash drive";c[69]="C. CD-R";d[69]="D. Operating system script";ans[69]="3";q[70]="Which of the following is the vector used by a Microsoft Word macro virus?";a[70]="A. Binary executable file";b[70]="B. Binary object data file";c[70]="C. Volume Boot Record";d[70]="D. All of the above ";ans[70]="1";q[71]="The anti-virus will quarantine a binary vector when:";a[71]="A. It cannot be deleted";b[71]="B. It cannot be found";c[71]="C. It cannot be deactivated due to the virus inside it";d[71]="D. The system cannot be inoculated otherwise";ans[71]="0";q[72]="The anti-virus resident shield:";a[72]="A. Actively scans for viruses in real-time";b[72]="B. Actively scans for viruses only when requested";c[72]="C. Monitors for and identifies virus-like behavior";d[72]="D. Only protects local physical vectors from virus attack";ans[72]="0";q[73]="Spyware by definition:";a[73]="A. Destroys data by accident";b[73]="B. Destroys data by malicious intent";c[73]="C. Steals data by accident";d[73]="D. Steals data by malicious intent";ans[73]="3";q[74]="Which of the following is not directly a form of spyware?";a[74]="A. Worm";b[74]="B. Phishing";c[74]="C. Rootkit";d[74]="D. Exploit";ans[74]="0";q[75]="Which of the following is particularly dangerous because it is very difficult to detect and gives the malicious user remote control of the system?";a[75]="A. Worm";b[75]="B. Phishing";c[75]="C. Rootkit";d[75]="D. Exploit";ans[75]="2";q[76]="Which of the following has introduced spyware code that anti-spyware is not legally allowed to report or disable?";a[76]="A. Trojan Horse";b[76]="B. Corporate Spyware";c[76]="C. Stealware";d[76]="D. Anti-spyware will always report and disable what it finds";ans[76]="1";q[77]="Which of the following develops methods of decrypting intercepted encrypted data?";a[77]="A. Hackers";b[77]="B. Crackers";c[77]="C. Pirates";d[77]="D. Social Engineers";ans[77]="1";q[78]="Which of the following in modern times is defined as a person who gains unauthorized access to restricted resources via the Internet?";a[78]="A. Hackers";b[78]="B. Crackers";c[78]="C. Pirates";d[78]="D. Social Engineers";ans[78]="0";q[79]="The only difference between a Blue Hat and a White Hat is:";a[79]="A. Blue hats are less experienced";b[79]="B. Blue hats have ambiguous moral positions";c[79]="C. Blue hats are not given detailed internal information";d[79]="D. The two are unrelated";ans[79]="2";q[80]="By far the most dangerous malicious user of any organization is:";a[80]="A. Black hats";b[80]="B. Disgruntled employees";c[80]="C. Hactivists";d[80]="D. Script Kiddies";ans[80]="1";q[81]="The tool that can be used on an encrypted file that was saved and moved offsite is:";a[81]="A. Key generator";b[81]="B. Keylogger";c[81]="C. Brute force cracker";d[81]="D. Security Audit";ans[81]="2";q[82]="Which of the following is not directly used to thwart malicious user activity?";a[82]="A. Honey pot";b[82]="B. Firewall";c[82]="C. Encryption";d[82]="D. Anti-spyware";ans[82]="3";q[83]="Which of the following is a form or cause of hardware failure?";a[83]="A. ESD";b[83]="B. Excessive heat";c[83]="C. Excessive dust";d[83]="D. All of the above";ans[83]="3";q[84]="Which of the following is a technology that can thwart hard drive failure?";a[84]="A. S.M.A.R.T.";b[84]="B. SATA";c[84]="C. SCSI";d[84]="D. RAID";ans[84]="3";q[85]="Which of the following is a technology that can thwart electrical supply problems?";a[85]="A. Surge protector";b[85]="B. Line Conditioner";c[85]="C. Battery backup UPS";d[85]="D. All of the above";ans[85]="3";q[86]="What can be done to prevent a non-computer related data loss incident?";a[86]="A. Additional security";b[86]="B. Additional insurance";c[86]="C. Additional backups";d[86]="D. Nothing can be done";ans[86]="3";q[87]="The two basic forms of data security are:";a[87]="A. Confidentiality and integrity";b[87]="B. Prevention of data loss and prevention of data theft";c[87]="C. Physical and logical";d[87]="D. None of the above";ans[87]="0";q[88]="The organizations security begins with a:";a[88]="A. Thorough security audit";b[88]="B. Well designed network architecture";c[88]="C. Well protected server/telecommuninations room(s)";d[88]="D. Security Policy";ans[88]="3";q[89]="Concerning the server itself, generally what must be protected?";a[89]="A. Physical and logical access to it";b[89]="B. The hard drives and network interfaces";c[89]="C. The BIOS and the operating system";d[89]="D. The hardware and the software";ans[89]="0";q[90]="Which of the following is a physical server security measure?";a[90]="A. Setting BIOS passwords";b[90]="B. Disabling all external expansion ports";c[90]="C. Disabling all other boot devices except the intended boot device";d[90]="D. All of the above";ans[90]="3";q[91]="Physical server security measures are intended primarily to make it difficult to:";a[91]="A. boot the server to an alternate boot disk or device";b[91]="B. hack into it over the network";c[91]="C. capture encrypted data";d[91]="D. login to it locally";ans[91]="0";q[92]="Which of the following is a logical server security measure?";a[92]="A. System monitoring software";b[92]="B. Remote administration";c[92]="C. System baselining software";d[92]="D. Local administration";ans[92]="0";q[93]="Which of the following is not a logical server security measure?";a[93]="A. Event logs";b[93]="B. Authentication policies";c[93]="C. Hardware level passwords";d[93]="D. System benchmarking software";ans[93]="3";q[94]="Which of the following is not a fundamental access control paradigm?";a[94]="A. user-level rights";b[94]="B. share-level rights";c[94]="C. distributed-level rights";d[94]="D. discrete-level rights";ans[94]="2";q[95]="Which of the following is an objective of data integrity forms of security?";a[95]="A. Disallow authorized users from making unauthorized changes to the data";b[95]="B. Disallow unauthorized users from making any changes to the data";c[95]="C. Disallow multiple authorized users from changing the same data at the same time";d[95]="D. All of the above";ans[95]="3";q[96]="Within the operating system data integrity security measures are called:";a[96]="A. encryption";b[96]="B. policies";c[96]="C. authentication";d[96]="D. mechanisms";ans[96]="3";q[97]="Within the operating system data confidentiality security measures are called:";a[97]="A. encryption";b[97]="B. policies";c[97]="C. authentication";d[97]="D. mechanisms";ans[97]="1";q[98]="Which of the following is considered a network security risk category?";a[98]="A. People based risks";b[98]="B. Hardware and network design based risks";c[98]="C. Public access based risks";d[98]="D. All of the above";ans[98]="3";q[99]="A user would be held accountable for which of the following security breaches?";a[99]="A. Using his company telephone extension as his password";b[99]="B. Going on a 2-week vacation, but his network account was left active";c[99]="C. His account is hacked by someone and he never notices it";d[99]="D. Even though the security policy does not forbid it, he uses his USB drive ";ans[99]="0 ";