IP Telephony

Applied Knowledge Questions

The following questions are designed to test your knowledge of supporting-technology design considerations and sometimes build on knowledge found elsewhere in the book. You might find that a question has more than one possible answer. The answers provided in Appendix B are intended to reinforce concepts that you can apply in your own networking environment.

1:

In the transparent cache deployment, WCCP is generally used to redirect web queries from a router to the cache. Assuming the cache is on a dedicated router interface and is properly filtered with ACLs, what is the most likely way a determined attacker could try to compromise the cache?

2:

Considering the techniques used to load balance security devices in this chapter, are there any unique considerations when attempting to load balance IPsec devices?

3:

In a teleworker environment, are there any unique security considerations for WLANs?

4:

Why are some of the 802.1x concerns discussed in Chapter 9 lessened in a WLAN environment?

5:

Are there any security considerations for using IPsec and IPT together?





Network Security Architectures
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors: Sean Convery
Simiral book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net