Start off by answering the questions that you have the knowledge base to answer, then on a separate list write down the questions that you do not know the answers to, because you need to revise those areas before testing:
1. What type of virus produces a different hash as it replicates through your network?
2. What type of attack can use a hidden password that has been in place since the application was installed?
3. What type of attack involves an agent attacking a high‐level executive calling them on a telephone and leaving a voicemail?
4. What type of attack involves a huge fireman arriving in the reception area of your company and you letting him into your server room?
5. What type of attack involves downloading a performance-enhancing computer program that says that I have 20,000 exploits and that I should purchase the full version of the product to remove them?
6. What type of attack collects...