Answering the following questions will reinforce key information presented in this chapter. If you’re unable to answer a question, review the appropriate lesson and then try the question again. Answers to the questions can be found in the appendix.
- You’re the network administrator for Consolidated Messenger. Your organization is implementing an online tracking application that allows customers to determine the status of packages that are being delivered. In order to check on the status of their orders, users must supply the tracking numbers that were provided when they shipped their packages. The tracking numbers aren’t tied to any user accounts or authentication data stores, and users don’t have to provide any information other than the tracking numbers. Which authentication model can you use for your Web site?
- Your company, Adventure Works, has implemented a Web site that allows users to access information about various locations around the world. The site uses ASP applications to access data from a SQL Server database. You configure the site with Anonymous access and configure IIS permissions on the Home directory with the Read permission and the Scripts Only execute permission. Next, you configure NTFS permissions on the Web directory. You add the IUSR_computername account to the directory and configure the account with the Read permission. When users try to access the Web site, they can read the static content on the home page but they can’t execute any of the ASP applications. What is the likeliest cause of the problem?
- You’re setting up a Web site for Trey Research. Your customers must log on to the site and be authenticated in order to access resources on the site. Your customers use different types of browsers to access the site, and their computers are set up with different types of operating systems. You implement IPSec in order to protect data as it’s being transmitted between the client computers and the Web servers; however, many clients are unable to establish a secure connection. What is the likeliest cause of the problem?
- You’re the network administrator for a small organization that provides online Web services to its customers. The site contains only static content, which is all located on the IIS server. IIS is configured to allow Anonymous access. You want to implement a firewall solution that’s inexpensive to implement, that’s easy to administer, and that separates the perimeter network from the rest of the network so that the private network isn’t dependent on the perimeter network’s availability in order to access the Internet. Which firewall solution should you use?