1.Describe the CIA triad and the defense in depth principle and why it is important in network security strategy?
2.What are the steps for an incident response plan? How does network security play into an incident response plan?
3.What are some major differences between open source and commercial source softwares?
4.What are firewalls and VPNs? What are some alternatives to a traditional firewall and VPN?