00:00

QUESTION 26

- (Exam Topic 2)
Which of the following is an example of a phishing attack?

Correct Answer: A

QUESTION 27

- (Exam Topic 1)
Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?

Correct Answer: D

QUESTION 28

- (Exam Topic 1)
Which of the following borrowing options is an unsecured loan?

Correct Answer: B

QUESTION 29

- (Exam Topic 1)
The decision to implement enhanced failure detection and back-up systems to improve data integrity is an example of which risk response?

Correct Answer: D

QUESTION 30

- (Exam Topic 2)
An organization's network administrator received an email that appeared to come from the organization's external IT service provider requesting his credentials to perform an update of a server operating system If the IT service provider did not send the email, which of the following best describes the likely purpose of the email?

Correct Answer: A