1. What is the difference between stand-alone and networked computers?
2. Describe the similarities and differences between a hub, a switch, and a router.
3. What is the difference between an intrusion detection system (IDS) and an intrusion prevention system (IPS)?
4. What are the two different types of network forensics analysis tools?
(Hint: The answer is not IDS or IPS.)
5. List and describe some of the different types of attacks that can be conducted on network components.
Critical Thinking Questions
1. Which legal issues might be raised with the use of network honeypots or honeynets?
2. In your opinion, should they be used to a greater or lesser extent by law enforcement agencies? Explain why.
3. What are some of the special issues that are associated with conducting a computer investigation in a networked environment?