A1:
| Answer: The network security process is an ongoing process that ensures the constant improvement of security in accordance with the security policy. |
A2:
| Answer: The attacker first gains information about the network by launching a reconnaissance attack against specific targets and then attempts to exploit vulnerabilities discovered during the reconnaissance. |
A3:
| Answer: Replies from ICMP requests will tell you which addresses on the network are assigned to running systems. |
A4:
| Answer: There is no single most important component. Defense in depth is a combination of products, processes, and architecture used to identify and mitigate attacks. |
A5:
| Answer: Organizations are expected to exercise "reasonable care" to secure their networks and resources. |