Explain how a worm propagates itself.
Summarize the benefits of application-level gateways.
Explain why intrusion detection is necessary in terms of the known good state.
Analyze the types of firewalls and point out two of the most common building-block architectures.
List the important security characteristics of a good firewall.