1. Which devices are loaded during ‘Safe-Mode’?

A. mouse, CD-ROM, keyboard
B. mouse, keyboard, speakers
C. mouse, VGA, keyboard
D. mouse, SVGA, keyboard




2. The process of writing information to the security log is known as which of the following choices?

A. Auditing
B. Logging
C. Denoting
D. Cataloguing




3. A user has a 50GB hard disk that is full. When the files are listed with DIR they do not add up to the 50GB used. What could cause this?

A. Hidden files are not counted in disk usage
B. Lists are rounded down and therefore do not add up
C. System files are not counted in disk usage
D. The user is mistaken and should try again




4. How would a VPN solution protect a wireless LAN from unauthorized access?

A. By securing the wireless medium
B. By encapsulating wireless frames within the tunnel packets
C. By tunneling the WEP key to protect it from interception
D. By encrypting data packets carried within wireless frames




5. During the boot process on a Windows NT Workstation you receive the following error message: ‘Windows NT could not start because the following file is missing or corrupt: \WinntRoot\System32\ntoskrnl.exe’ Please reinstall a copy of the above file. What is the most likely cause? (Choose all that apply)

A. The NTdetect.com file has failed
B. The Boot.ini file is missing
C. The Ntoskrnl.exe file is corrupt
D. The MBR is corrupt, so the OS cannot be found




English Close