What are you trying toaccomplish here?
Why is it a good idea to perform a penetration test from the inside?
What is Simon trying to accomplishhere?
An “idle” system is also referred to as what?
What kind of results did Jim receive from his vulnerability analysis?
What countermeasures could he take to prevent DDoS attacks?
What have you found?
What are you trying to accomplish here?
What search string will you use to locate them?