Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?
Correct Answer:
C
🗳️
Which of the following is used to add extra complexity before using a one-way data transformation algorithm?
Correct Answer:
D
🗳️
An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?
Correct Answer:
D
🗳️
An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?
Correct Answer:
C
🗳️