This document contains review questions from Chapters 10 and 11 of an information security textbook. Chapter 10 questions cover topics like the differences between authentication and authorization, firewall types, network footprinting and fingerprinting, cryptology components, asymmetric encryption, and VPNs. Chapter 11 questions focus on information security job roles, hiring practices, required qualifications, and security principles like separation of duties and least privilege.