Social Engineering Denial of Service VPN Questions

Section 13.1 answer either

What are some examples of physical security measures you can implement to protect your network? OR
Who can prevent and react to security breaches?

from Section 13.2

What is social engineering? What is the best defense against social engineering?

from Section 13.3 answer 1 of the following

What is the main goal in a Denial of Service (DoS) attack?
What is the difference between a virus and a worm?
In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations?

from Section 13.4 answer 1 of the following

How does a command injection attack a web application?
How does salting the hash protect your network?

From Section 13.5 answer 1 of the following:

What is the role of a CA in a PKI?
What does an authentication protocol do?

from section 13.7 answer 1 of the two questions

How does a remote access VPN differ from a host-to-host VPN?
Why are SSL VPNs more likely to be implemented when creating VPNs across the Internet through firewalls that you do not control?