00:00

QUESTION 61

- (Exam Topic 14)
What technique used for spoofing the origin of an email can successfully conceal the sender s Internet Protocol (IP) address?

Correct Answer: C

QUESTION 62

- (Exam Topic 12)
Which of the following is a characteristic of the initialization vector when using Data Encryption Standard (DES)?

Correct Answer: B

QUESTION 63

- (Exam Topic 14)
What should be used immediately after a Business Continuity Plan (BCP) has been invoked?

Correct Answer: B

QUESTION 64

- (Exam Topic 15)

Correct Answer: D

QUESTION 65

- (Exam Topic 15)
What is the MOST common cause of Remote Desktop Protocol (RDP) compromise?

Correct Answer: B