Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?
Correct Answer:
C
What is the least important information when you analyze a public IP address in a security alert?
Correct Answer:
D
One of your team members has asked you to analyze the following SOA record.
What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.)
Correct Answer:
D
An attacker can employ many methods to perform social engineering against unsuspecting employees, including scareware.
What is the best example of a scareware attack?
Correct Answer:
D
Which of the following programs is usually targeted at Microsoft Office products?
Correct Answer:
C