102 Chapter 4 ■ Communication and Network Security (Domain 4)
- During a forensic investigation, Charles is able to determine the Media Access Control
address of a system that was connected to a compromised network. Charles knows that
MAC addresses are tied back to a manufacturer or vendor and are part of the fingerprint
of the system. To which OSI layer does a MAC address belong?
A. The Application layer
B. The Session layer
C. The Physical layer
D. The Data Link layer - Ben knows that his organization wants to be able to validate the identity of other organi-
zations based on their domain name when receiving and sending email. What tool should
Ben recommend?
A. PEM
B. S/MIME
C. DKIM
D. MOSS