1. Explain the relationship and difference between a vulnerability and an exploit. 2. Explain the difference between a false positive and a false negative. Which is more dangerous? Why? 3. What is an SQL injection? 4. What is a buffer overflow? 5. What is a race condition? 6. What is a file inclusion vulnerability? .