Copyright Goodheart-Willcox Co., Inc. 491 Chapter 15 Network Security 15. List two examples of asymmetric algorithms. 16. What is the purpose of a certifi cate authority (CA)? 17. Who developed SSL? 18. What is the purpose of SSL? 19. Which two protocols are specifi cally designed to make website transactions safe? 20. What is IPSec? 21. What is the diff erence between IPSec tunnel mode and transport mode? 22. What two protocols are common to IPSec? 23. What are the three original wireless device security mechanisms? 24. What encryption mechanism was developed as a replacement for WEP? 25. What is 802.11i? 26. What is 802.1x? 27. List the three components of an 802.1x confi guration. 28. Identify three security technologies that meet the AAA requirements. 29. Which protocol could be considered as the next generation RADIUS? 30. Provide an example of something you know, something you have, and something you are. 31. What is geofencing? 32. Why is PAP considered an unsecured system of authorization? 33. What does the acronym CHAP represent? 34. Why is CHAP considered an improvement over PAP? 35. MS-CHAP is designed exclusively for _____ operating systems. 36. Of the three diff erent protocols, PAP, CHAP, and MS-CHAP, which encrypts the contents of the packet? 37. What is Kerberos? 38. Before a network operating system installation can be considered complete, the latest _____ must be installed. 39. Why should the default name of an administrator account be changed? 40. Making network devices as secure as possible is often referred to as device _____. 41. Describe the characteristics of a poor password. 42. Describe the characteristics of a good password. 43. How is a fi rewall used to secure network access? 44. What factors are used by fi rewalls to fi lter inbound and outbound network traffi c? 45. What is the diff erence between stateful and stateless fi rewall inspection? 46. In terms of network security, what is a demilitarized zone (DMZ)? 47. How is a proxy server used to secure network access?