While viewing packet capture data, an analyst sees that one IP is sending and receiving traffic for multiple devices by modifying the IP header.
Which technology makes this behavior possible?
encapsulation
TOR
tunneling
NAT
Correct answer: D
Question 2
When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.
Which information is available on the server certificate?
server name, trusted subordinate CA, and private key
trusted subordinate CA, public key, and cipher suites
trusted CA name, cipher suites, and private key
server name, trusted CA, and public key
Correct answer: D
Question 3
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.