1. For a system without a DMZ, where is the best area in the network to install a honeypot?
2. Why are honeypots important to a network? Discuss the disadvantages of having a honeypot in the network.
3. Discuss three approaches of acquiring information needed to penetrate a network.
4. Discuss ways a system administrator can reduce system scanning by hackers.