3. Why does polymorphism cause greater concern than traditional malware? How does it affect detection?

4. What are the types of password attacks? What can a systems administrator do to protect against them?