Questions:
1. What advantage does an asymmetric cryptographic system provide over a symmetric cryptosystem? (at least 3 sentences)
2. This is a special category of malware often used to commit identity or financial theft. Usually sold, supported, and managed by organized crime rings. (one word answer)
3. Define and describe multi-factor authentication. Use complete sentences and structure your answer in short essay form. (4-6 sentences)
4. Define and describe the concept of Advanced Persistent Threat (APT). Use complete sentences and structure your answer in short essay form. (4-6 sentences.) (P.S - don't try to just make something up or copy from the Internet, seriously.)
5. What are three potential disclosure vectors for sensitive and/or protected data? Use complete sentences and provide at least one proposed security control for each risk / disclosure vector. (Hint: when attempting to control or influence user behavior, security awareness training is a perfectly adequate security control.)