Identity Deployment Recommendations

Applied Knowledge Questions

The following questions are designed to test your knowledge of identity issues and sometimes build on knowledge found elsewhere in the book. You might find that each question has more than one possible answer. The answers provided in Appendix B are intended to reinforce concepts that you can apply in your own networking environment.


Besides securing the authentication event, why is Hypertext Transfer Protocol Secure (HTTPS) much more secure than HTTP?


Can network layer authentication be leveraged as a replacement for authenticating a particular application?


Which kinds of physical security provide the most benefit if the goal is to reduce the requirements on an authentication system when inside the corporate perimeter?


When should you deploy a separate AAA server for administrative access versus your general user repository?

Network Security Architectures
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors: Sean Convery
Simiral book on Amazon © 2008-2017.
If you may any questions please contact us: