The following questions are designed to test your knowledge of identity issues and sometimes build on knowledge found elsewhere in the book. You might find that each question has more than one possible answer. The answers provided in Appendix B are intended to reinforce concepts that you can apply in your own networking environment.
Besides securing the authentication event, why is Hypertext Transfer Protocol Secure (HTTPS) much more secure than HTTP?
Can network layer authentication be leveraged as a replacement for authenticating a particular application?
Which kinds of physical security provide the most benefit if the goal is to reduce the requirements on an authentication system when inside the corporate perimeter?
When should you deploy a separate AAA server for administrative access versus your general user repository?