1) A few attacks described in this paper had to do with the ability of
an attacker to predict a sequence number. Give an example of such an
attack and then describe a defense to it.


2) In the original DNS design described in this paper, how could an
attacker impersonate a DNS server and convince a client machine to
send traffic to the wrong IP address? What was a consequence of that?