What are you trying toaccomplish here?
What is Simon trying to accomplishhere?
Why is it a good idea to perform a penetration test from the inside?
An “idle” system is also referred to as what?
What kind of results did Jim receive from his vulnerability analysis?
What countermeasures could he take to prevent DDoS attacks?
What have you found?
What are you trying to accomplish here?
What search string will you use to locate them?