1. What is the difference between a Man-in-the-Middle attack and a denial-of-service attack?
2. Define what a DDoS attack is and how it functions. How is it different from a standard DoS attack?
3. Name some common denial-of-service attacks.
4. Identify and explain three reasons that can result in a back door exploit being present on a system.
5. Define the concept of firewalking.
6. Where should an external penetration and vulnerability assessment be performed in your network?
7. When considering vulnerability scanners, why are a program’s capability to conduct an accurate scan crucial?
18.216.96.94