Chapter 7 Review Questions: Except
Chapter 7 Review Questions: Except
Chapter 7 Review Questions: Except
1. The File Transfer Protocol (FTP) can be accessed by each of the following
except ___________________.
a. Web browser
b. FTP client
c. command line
d. LPTP server
10. IP Security (IPSec) functions at Layer 1 of the OSI model. True or false?
11. One of the ways to reduce the risk of FTP vulnerabilities is to use _____.
secure FTP
13. A(n) _____ takes advantage of using the public Internet as if it were a private
network. virtual private network (VPN)
14. A(n) _____is a database that is stored on the network itself that contains all
the information about users and their privileges to network resources.
directory service
15. _____ is the security layer of the Wireless Access Protocol (WAP) and
provides privacy, data integrity, and authentication. Wireless Transport
Layer Security (WTLS)
16. Explain how the three elements of the IEEE 802.1x standard function.
A networking supporting the 802.1x protocol consists
of three elements. The supplicant is the client device,
like a desktop computer or PDA, which requires secure
network access. The supplicant sends the request to
an authenticator that serves as an intermediary
device. An authenticator can be a network switch or a
wireless device. The authenticator sends the request
from the supplicant to the authentication server. The
authentication server accepts or rejects the
supplicants request and sends that information back
to the authenticator, which in turn grants or denies
Security+ Guide to Network Security Fundamentals, 2e Solutions 7-3
17. What are the advantages of IPSec functioning at a lower layer of the OSI
model?
18. What are the two IPSec encryption modes? Give an example that illustrates
why two modes are necessary.
Security+ Guide to Network Security Fundamentals, 2e Solutions 7-4
19. Explain the process of how Internet data can be displayed on a cell phone.
20. What is the wired equivalent privacy (WEP) and what is its weakness?
Security+ Guide to Network Security Fundamentals, 2e Solutions 7-5