Discussion Question 1:
What is the most common method that hackers gain access to networks, and what do you feel is the best method to defend against this attack?
Discussion Question 2:
What is the importance of the OSI seven layer model and how does it help troubleshoot issues that arise?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.