1. Most security vulnerabilities are from new or previously unknown problems. True or False?
2. What is one of the protocols IPsec uses to secure IP layer communications?
_________________________________________
3. What is defense in depth (or DiD)?
a. A type of highly-secure cryptography for data at rest.
b. A type of highly-secure cryptography for data in transit.
c. Both of the above.
d.
…