1.
A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
2.
When using airodump, what should the IVs Flag be set to in order to capture IVs only?
3.
Justin is checking some network traffic logs on his firewall. Justin finds some IP packets from a computer purporting to be on the internal network. The packets originate from 172.16.1.44 with an IP ID number of 3422. The received response from 172.16.1.44 has an IP ID number of 512. What can he infer from this traffic log?