Answer Below Questions in Paper Format
- How do exploits relate to vulnerabilities?
- Using the Internet, find and read the SANS/FBI Top 20 Vulnerabilities. Discuss at least 2 of the Top 20. Discuss the threat group, category and potential risks and steps to mitigate the vulnerability.
- Jailbreaking your iPhone – is it ethical and/or legal?