Question 1: If you were doing a penetration test on a Redhat 6.2 box. What would be
the first 3 things you would test for?
|
Question 2: What are some ideas you would try in attacking a VPN appliance? (This question
has no wrong answers, be imaginative)
|