1. What is the difference between authentication and authorization? Can a system permit authorization without authentication? Why or why not?
2. What is the typical relationship between the untrusted network, the firewall, and the trusted network?
3. How is an application layer firewall different from a packet filtering firewall? Why an application layer firewall is sometimes called a proxy server?
4. What is network footprinting? What is network fingerprinting? How are they related?
5. What are the main components of cryptology?
6. Define asymmetric encryption. Why would it be of interest to information security professionals?
7. Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management?
8. What is VPN? Why are VPNs widely used?