1. List the types of computer attacks.
2. What is the role of private and public keys in encryption?
3. List the layers implemented in a depth-in-design network design.
4. What are the four elements of host security?
5. What are the key aspects of network administration and management?