"What If?" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:
• Read the “What if” case in Chapter 3 from the Book: Secure Network Operating Systems and Infrastructures provide a brief summary and respond to the two questions that are asked.
• Discuss any aspect of “honeypots” and share your views on the value of such honeypots for ethical hackers, or how as a security professional you can protect yourself against providing such honeypots for exploitation.
• Any current topic or article related to penetration techniques.
• The instructor insight