With regard to pen testing, discuss the importance of having a signed agreement, and give the implications of conducting a pen test without one.
Many organizations employ intrusion detection systems (IDS) or even intrusion prevention systems (IPS). It is important to understand how these tools protect the organization.
Describe how footprinting the stages of an attack might not be detected by an IDS.
Recommend an IDS for an organization and include the pros and cons behind your recommendation.