A person approaches a network administrator and wants advice on how to send encrypted email from home.
The end user does not want to have to pay for any license fees or manage server services.
Which of the following is the most secure encryption protocol that the network administrator should
recommend?
Justin is checking some network traffic logs on his firewall. Justin finds some IP packets from a computer
purporting to be on the internal network. The packets originate from 172.16.1.44 with an IP ID number of 3422.
The received response from 172.16.1.44 has an IP ID number of 512.
What can he infer from this traffic log?