- (Exam Topic 2)
Which of the following is not one of the types of controls? Response:
Correct Answer:
A
- (Exam Topic 2)
Which type of threat is often used in conjunction with phishing attempts and is often viewed as greatly increasing the likeliness of success?
Response:
Correct Answer:
A
- (Exam Topic 2)
Which of the following is not a feature of SAST? Response:
Correct Answer:
B
- (Exam Topic 1)
At which layer does the IPSec protocol operate to encrypt and protect communications between two parties? Response:
Correct Answer:
A