1) A few attacks described in this paper had to do with the ability of an attacker to predict a sequence number. Give an example of such an attack and then describe a defense to it. 2) In the original DNS design described in this paper, how could an attacker impersonate a DNS server and convince a client machine to send traffic to the wrong IP address? What was a consequence of that?