1) Provided an alphabetically sorted list of the 500,000 people’s names and telephone numbers, explain an algorithm that you could implement that would enable you to determine a given person’s telephone number in shortest amount of time.
2) Discuss or describe one or more LAN based attacks (also known as layer 2 attacks or lower layer attacks) or share any additional thoughts you may have on the LAN based attacks.