Know-IT-all Chapter Quiz #29 Hardening Network Infrastructure

Is your network vulnerable? Check your knowledge here - before a hacker finds out for you.

Is your network vulnerable? Check your knowledge here - before a hacker finds out for you! Send your score to us for a chance to win a copy of Windows Hardening Network Infrastructure by Wesley Noonan, courtesy of McGraw-Hill/Osborne Media.
All answers to this quiz are found in the Sept 10-16 featured chapter download, but be warned - this quiz is designed to be challenging! Good luck!

How to take the quiz:
- After reading the question, note the letter of your answer. Check your answers by clicking the link to the answer key at the end of the quiz.
- Send us an e-mail telling us how you did to participate in our book giveaway this week.
NOTE: The weekly prize drawing is random - your score will not affect your chances of winning.
- To read more about a topic, open the chapter and locate the indicated page after each answer.



Chapter Quiz #29

1. These routing protocols support authentication, except one. Which?

a. RIP version 2
b. OSPF
c. BGP
d. OREP
e. All the above supports authentication.
f. None of the above supports authentication.

2. What does ISAKMP do?

a. ISAKMP centralizes security association management.
b. ISAKMP generates and manages authenticated keys used to secure information.
c. ISAKMP reduces connection time.
d. ISAKMP server mode hides the endpoint identities, while ISAKMP client mode encrypts the ESP tunnel.
e. Options A and B.
f. Options A and C.
g. Options B and D.
h. Options A, C and D.
i. It's a trick question - there is no ISAKMP, just ISKAMP.

3. IPSec is a...

a. Layer 2 protocol
b. Layer 3 protocol
c. Layer 4 protocol
d. Bad choice for VPNs, period.

4. What is the best approach for securing dial-in access?

a. Centralize all dial-in access through a DMZ.
b. Require authentication of all connections.
c. Require callback or caller ID verification.
d. Don't provide it. Only allow access through a global Internet dialer and VPN software.

5. Most devices support three primary VPN technologies. Which option is NOT one of them?

a. Point-to-Point Tunneling Protocol
b. Layer 2 Tunneling Protocol
c. IPsec
d. Secure Socket Layer
e. It's another trick question - all the above are usually supported.



CLICK HERE FOR ANSWER KEY AND TO WIN A FREE BOOK!


This was last published in September 2004

Dig Deeper on Windows Operating System Management

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchExchange

SearchSQLServer

SearchWinIT

SearchEnterpriseDesktop

SearchVirtualDesktop

Close