Get started Bring yourself up to speed with our introductory content.

Know-IT-all Chapter Quiz #29 Hardening Network Infrastructure

Is your network vulnerable? Check your knowledge here - before a hacker finds out for you.

Is your network vulnerable? Check your knowledge here - before a hacker finds out for you! Send your score to us for a chance to win a copy of Windows Hardening Network Infrastructure by Wesley Noonan, courtesy of McGraw-Hill/Osborne Media.
All answers to this quiz are found in the Sept 10-16 featured chapter download, but be warned - this quiz is designed to be challenging! Good luck!

How to take the quiz:
- After reading the question, note the letter of your answer. Check your answers by clicking the link to the answer key at the end of the quiz.
- Send us an e-mail telling us how you did to participate in our book giveaway this week.
NOTE: The weekly prize drawing is random - your score will not affect your chances of winning.
- To read more about a topic, open the chapter and locate the indicated page after each answer.

Chapter Quiz #29

1. These routing protocols support authentication, except one. Which?

a. RIP version 2
c. BGP
e. All the above supports authentication.
f. None of the above supports authentication.

2. What does ISAKMP do?

a. ISAKMP centralizes security association management.
b. ISAKMP generates and manages authenticated keys used to secure information.
c. ISAKMP reduces connection time.
d. ISAKMP server mode hides the endpoint identities, while ISAKMP client mode encrypts the ESP tunnel.
e. Options A and B.
f. Options A and C.
g. Options B and D.
h. Options A, C and D.
i. It's a trick question - there is no ISAKMP, just ISKAMP.

3. IPSec is a...

a. Layer 2 protocol
b. Layer 3 protocol
c. Layer 4 protocol
d. Bad choice for VPNs, period.

4. What is the best approach for securing dial-in access?

a. Centralize all dial-in access through a DMZ.
b. Require authentication of all connections.
c. Require callback or caller ID verification.
d. Don't provide it. Only allow access through a global Internet dialer and VPN software.

5. Most devices support three primary VPN technologies. Which option is NOT one of them?

a. Point-to-Point Tunneling Protocol
b. Layer 2 Tunneling Protocol
c. IPsec
d. Secure Socket Layer
e. It's another trick question - all the above are usually supported.


This was last published in September 2004

Dig Deeper on Windows Operating System Management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.