1). Why is the issue of trust an integral part of a security policy
2). Why is an e-mail use policy important?
3). What is the result of packets that are created which exceed the MTU of the network? How can this process be exploited?
Answers must be short and accurate.