Question 1: What are the similarities between an MD5 hash and a fingerprint?
Question 2: How would you encrypt a Web server and the pages it serves up?
Question 3: Why is hashing all database inputs not considered encryption of the database? What value does hashing database entries provide?
Question 4: Where would you remove a user's certificate from being able to access systems on your network?
Question 5: Which connection type is secure and which is cleartext between SSH, Telnet, and FTP?