Copyright  Goodheart-Willcox  Co.,  Inc.  491  Chapter  15  Network  Security  15.  List  two  examples  of  asymmetric  algorithms.  16.  What  is  the  purpose  of  a  certifi  cate  authority  (CA)?  17.  Who  developed  SSL?  18.  What  is  the  purpose  of  SSL?  19.  Which  two  protocols  are  specifi  cally  designed  to  make  website  transactions  safe?  20.  What  is  IPSec?  21.  What  is  the  diff  erence  between  IPSec  tunnel  mode  and  transport  mode?  22.  What  two  protocols  are  common  to  IPSec?  23.  What  are  the  three  original  wireless  device  security  mechanisms?  24.  What  encryption  mechanism  was  developed  as  a  replacement  for  WEP?  25.  What  is  802.11i?  26.  What  is  802.1x?  27.  List  the  three  components  of  an  802.1x  confi  guration.  28.  Identify  three  security  technologies  that  meet  the  AAA  requirements.  29.  Which  protocol  could  be  considered  as  the  next  generation  RADIUS?  30.  Provide  an  example  of  something  you  know,  something  you  have,  and  something  you  are.  31.  What  is  geofencing?  32.  Why  is  PAP  considered  an  unsecured  system  of  authorization?  33.  What  does  the  acronym  CHAP  represent?  34.  Why  is  CHAP  considered  an  improvement  over  PAP?  35.  MS-CHAP  is  designed  exclusively  for  _____  operating  systems.  36.  Of  the  three  diff  erent  protocols,  PAP,  CHAP,  and  MS-CHAP,  which  encrypts  the  contents  of  the  packet?  37.  What  is  Kerberos?  38.  Before  a  network  operating  system  installation  can  be  considered  complete,  the  latest  _____  must  be  installed.  39.  Why  should  the  default  name  of  an  administrator  account  be  changed?  40.  Making  network  devices  as  secure  as  possible  is  often  referred  to  as  device  _____.  41.  Describe  the  characteristics  of  a  poor  password.  42.  Describe  the  characteristics  of  a  good  password.  43.  How  is  a  fi  rewall  used  to  secure  network  access?  44.  What  factors  are  used  by  fi  rewalls  to  fi  lter  inbound  and  outbound  network  traffi  c?  45.  What  is  the  diff  erence  between  stateful  and  stateless  fi  rewall  inspection?  46.  In  terms  of  network  security,  what  is  a  demilitarized  zone  (DMZ)?  47.  How  is  a  proxy  server  used  to  secure  network  access?  
