Discuss common forms of attack on Microsoft systems using the Internet, and/or your job 2. List 5 concerns that could result in vulnerabilities during installation deployment of Windows Server 2012 3. Discuss three basic network components and how they are used today.
