You can find the answers to the following questions in Appendix A, "Answers to Chapter Review Questions."
1:
What does the acronym AAA stand forat least the networking version of it?
2:
What information does a user typically supply to perform authorization?
3:
What is the one major fact that was mentioned in this book regarding good information to report about using the accounting function of AAA?
4:
What is the difference between authorization and authentication?
5:
Comparing a LAN-based user inside a company to a corporate employee working via the Internet from home, what other security step does the home user typically have to go through?
6:
Which two protocols that are part of PPP are used for authentication?
7:
Of the two PPP protocols used for authentication, which passes the password in clear-text?
8:
How does CHAP prevent someone from using a tool such as a sniffer to see the packets sent over a network and learn the password?
9:
What feature of a VPN prevents packets that someone else has captured from being useful to him?
10:
What are the two terms, one named for a particularly popular product, that refer to tools that can capture packets on a LAN?