00:00

QUESTION 106

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

Correct Answer: C

QUESTION 107

What is the least important information when you analyze a public IP address in a security alert?

Correct Answer: D

QUESTION 108

One of your team members has asked you to analyze the following SOA record.
What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.)

Correct Answer: D

QUESTION 109

An attacker can employ many methods to perform social engineering against unsuspecting employees, including scareware.
What is the best example of a scareware attack?

Correct Answer: D

QUESTION 110

Which of the following programs is usually targeted at Microsoft Office products?

Correct Answer: C