1. Why is a firewall a good place to implement a VPN? Why not implement it at the actual server(s) being accessed?
2. Explain how computer memory and addressing can be protected by using the following methods: 1) Fence 2) Relocation 3) Segmentation 4) Paging