The document contains answers to short questions on computer security topics, including virus propagation, social engineering, and the handling of packets by firewalls. It explains how viruses spread through browsers, email, and infected programs, and describes social engineering techniques such as phishing and pretexting. Additionally, it outlines access control lists (ACLs) and their functionality in permitting or denying network access, particularly in relation to FTP servers.