1. Which of the following spreads malware-infected files and creates vulnerabilities on a network?
- ACL
- Encryption
- Tunneling
- NAT/Pat
- P2P==
2. Which of the following can be defeated by packets containing spoofed IP addresses?
- P2P
- TOR
- ACL
- encryption
- NAT/PAT
3. Which of the following makes message contents and file attachments unreadable?
- NAT/PAT
- TOR
- Load balancing
- Encryption
- ACL
4. Which of the following hides identity details of users who are browsing the web?
- TOR
- P2P
- ACL
- NAT/PAT
- Load balancing