- Discuss 5 different types of malware.
- Explain the different types of port scans, and when you would use each.
- What is the relationship between the following concepts: risk, threat, threat actor, vulnerability, exploit, payload.
- Discuss one attack and mitigation technique on DNS, and one attack and mitigation technique on DHCP.
- What are the risks using public WiFi? How does a VPN work?
Discuss the advantages and disadvantages of the different modes of processing (i.e., On Line Transaction Entry (OLTE) and On Line Real Time (OLRT).