You are using Red Hat Linux and are using GPG for your secure email solution. What is the command to configure the system for the first use of GPG for your user account?
Answer : A
What type of certificates does S/MIME utilize for secure email?
Answer : D
What tool built into Windows can provide investigators with MAC information?
Answer : A
Which one of the following is an incorrect mod equation?
Answer : D
What is the default algorithm used to sign PGP messages?
Answer : C
Which of the following numbers are Prime Numbers?
Answer : A, B, E
What are the two primary types of fingerprint scanners?
Answer : A, B