1.Which of the following is considered a passive reconnaissance action?
2. Which encryption was selected by NIST as the principal method for providing confidentiality after the DES algorithm?
3. What tool is able to conduct a man-in-the-Middle Attack on an 802.3 environment?
4. What is the difference between a traditional firewall and an IPS?
5. Why is it important to scan your target ...