Q: What is the difference between a threat, a vulnerability, and a risk?
Q: What is defense in depth?
Q: Why is DNS monitoring important?
Q: What is the difference between encoding, encrypting, and hashing?
Q: What are the differences between HTTPS, SSL, and TLS?
Q: What is 2FA?
Q: What are the best 2FA methods?
Q: What are some security headers?
Q: What is the difference between symmetric and asymmetric encryption?