1. Compare and contrast symmetric and asymmetric cryptography.
2. Argue some of the advantages of using DES encryption over asymmetric encryption.
3. "Cryptography is ‘generally' considered to be the broadest security technique available." Explain what this statement means with respect to the principles of information security.
4. Examine the output from the scanning tool shown in Figure 1 and describe what services are running and what security implications these may have for this particular network.