Information Security-Chapters 1 thru 4
• What is the best method for preventing an illegal or unethical activity?
• What is competitive disadvantage?
Chapter 5-8
• What is network foot printing? What is network fingerprinting? How are they related?
• What is the difference between active and passive vulnerability scanners?
Chapter 9 and 10
• What is a mantrap? When should it be used?
• What is a negative feedback loop? How is it used to keep a project in control?