1-	Define cloud computing?
2-	What differentiate a rule based firewall from application aware firewall or next generation firewall?
3-	Explain the difference between an intrusion detection system (IDS) and an intrusion prevention system (IPS)?
4-	T/F Cloud computing is less secure . explain your reasoning to the above question?
5-	What are some of the reasons that would make an organization opt for a Hybrid cloud instead of pure public or private cloud.
6-	What do you get from a cloud provider when you sing up for an infrastructure as a service (laaS) cloud computing model?
* operating system.
7-	Using illustration explain the meaning of single sing on (SSO)?
8-	1- Define in details sensitivity labels as used in a secure system that use mandatory access control (MAC) for access control?
2- What is the difference between War Driving and War chalking?
3- Explain in detail how the DNS work when a new device is added to domain and the user need to access a new external website. This will require clear demonstration and explanation of how various components of DNS work including the role of the DNS cache. Host file TLD.
Local DNS est)?
4- Define the concept of least privilege as it relates to access control?
5- use illustration to describe the following components of a Blue tooth network topology?
•	Master/slave.
•	Piconet .
•	Scatternet
•	Actine slave
•	Parked slave
6- what is the difference between open ID and open Auth( oauth)?
9-	Switch /2 
HUP/1               
IP/4
TCP/4
FTP/4
UDP/4
HTTP/7
10-	Use illustration to describe how a network proxy work?
11-	What do you get from a cloud provider when you sing up for a platform as a service (Paas) cloud computing model?
•	Custom Application
•	Storage
•	Hardware
•	Operating.
12-	In access control which one of the following falls in the category of something you are?
•	Password 
•	Token
•	Cellphone
•	Fingerprint.
13-	What is the difference between bluejacking and Bluesnarfine Bluetooth attack?
14-	In wireless network what does SSID stand for?
15-	An unauthorized wireless Access point plugged in a corporate network is known as?
•	Rogue Access point.
•	Evil Twin
•	Malicious wireless point (MWP)
•	Malicious Access point (MAP)
16-	T/F MAC address Filtering is a proven way of securing wireless network?
17-	T/f Disabling wireless SSID keep your network hidden hence protecting your wireless network ?
18-	In wireless network what dose WEp stand for?
19-	List 2 security setup that can help secure mobile devices?
20-	Define the following Access control Terminology?
•	Object:
•	Subject
21-	T/F in Discretionary access control model (DAC) the system's owner set Access rights and permissions?
22-	What is the difference between separation of duties and Job rotation? Why is each important?