Which two types of attack are categorized as social engineering? (Choose two.)
A. phoning
B. malvertising
C. probing
D. pharming
E. phishing
What are two functions of a firewall within an enterprise? (Choose two.)
A. It enables traffic filtering based on URLs.
B. It serves as an endpoint for a site-to-site VPN in standalone mode.
C. It provides support as an endpoint for a remote access VPN in multiple context mode.
D. It offers Layer 2 services between hosts.
E. It enables wireless devices to connect to the network.