Answering the following questions will reinforce key information presented in this chapter. If you are unable to answer a question, review the appropriate lesson and then try the question again. Answers to the questions can be found in the appendix.
- Baldwin Museum of Science is designing several herbicide solutions for farmers. Many of the herbicides are highly toxic and require that any clothing exposed to the chemicals be destroyed. To access the testing laboratory, scientists must be authenticated with a retinal scan. The retinal scanner established a dial-up connection to a Windows 2000 remote access server and the retinal scan is compared to an extended attribute in Active Directory to validate the authentication. What authentication protocol would be used in this scenario?
- Your organization has standardized on using L2TP/IPSec VPN connections for employees connecting to the corporate office from home. The remote access server doesn't support any other VPN protocols. A member of the help desk was terminated about an hour ago and you've been asked to prevent the employee from connecting to the network using a VPN connection. You're certain that the former employee may know several user accounts and passwords in use on the network. What can be done to prevent the former employee from connecting to the network?
- You've discovered by reviewing log files that several employees have been accessing the network through remote access connections, even though the remote access project team hasn't authorized them for remote access permissions. It appears that the users are connecting through a server in their department that they have configured with RRAS. What can you do to prevent the installation of unauthorized remote access servers?
- Sensitive data seems to be leaking from your organization. After eliminating all other possibilities, you suspect that the local telephone company that provides your WAN link may be the culprit. What can you do to protect data on the WAN?
- Your salespeople tend to lose their laptops. In addition to your considerable hardware expenses, more and more unauthorized users have appeared on the network. Besides renewing user passwords, how can you prevent salespeople from leaving their passwords in their dial-up networking objects?
- Your organization has started a short-term project that requires a temporary office to be connected to the corporate network. Because of deployment costs, you decide to use a VPN to connect to the corporate office. How does the configuration of your organization's DMZ at the corporate office affect your VPN protocol decision?