- (Exam Topic 2)
Which of the following is an example of a phishing attack?
Correct Answer:
A
- (Exam Topic 1)
Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?
Correct Answer:
D
- (Exam Topic 1)
Which of the following borrowing options is an unsecured loan?
Correct Answer:
B
- (Exam Topic 1)
The decision to implement enhanced failure detection and back-up systems to improve data integrity is an example of which risk response?
Correct Answer:
D
- (Exam Topic 2)
An organization's network administrator received an email that appeared to come from the organization's external IT service provider requesting his credentials to perform an update of a server operating system If the IT service provider did not send the email, which of the following best describes the likely purpose of the email?
Correct Answer:
A