R1. Describe four types of secrecy practiced by enterprises.
R2. Describe two techniques to help reduce the insider threat.
R3. Which headers are left in plaintext when we use link encryption? Network encryption? Application encryption?
R4. Explain how key wrapping works on a network. Compare network-based key wrapping with file-based key wrapping.