please answer these 4 answers:
What is information security?
Define the various roles of a security administrator.
What are three of the five categories authentication can be broken down into?
What is the name of the people who attempts to hack into a computer system before it goes live to test the system.