Chapter 17


1:

What does the acronym AAA stand forat least the networking version of it?

A1:

Answer: Authentication, authorization, accounting

2:

What information does a user typically supply to perform authorization?

A2:

Answer: Username and password

3:

What is the one major fact that was mentioned in this book regarding good information to report about using the accounting function of AAA?

A3:

Answer: To report repeated invalid authentication attempts for the same username

4:

What is the difference between authorization and authentication?

A4:

Answer: Authorization defines what you're allowed to access, but authentication confirms that you are who you say you are.

5:

Comparing a LAN-based user inside a company to a corporate employee working via the Internet from home, what other security step does the home user typically have to go through?

A5:

Answer: Internet users need to authenticate to the ISP when they connect before they can access the ISP's network. For LAN-based users inside a corporate location, there is the presumption that they have the right to access the LAN, so there is no authentication for the right to access the LAN. Interestingly, more corporations in the coming years will likely require authentication before allowing a user to use a LAN.

6:

Which two protocols that are part of PPP are used for authentication?

A6:

Answer: PAP and CHAP

7:

Of the two PPP protocols used for authentication, which passes the password in clear-text?

A7:

Answer: PAP

8:

How does CHAP prevent someone from using a tool such as a sniffer to see the packets sent over a network and learn the password?

A8:

Answer: CHAP passes a message digest, which is a mathematical function based on a random number and the password. Message digests use mathematical functions that are designed specifically to prevent the re-creation of the password.

9:

What feature of a VPN prevents packets that someone else has captured from being useful to him?

A9:

Answer: The packets that are sent over a VPN connection have been encrypted.

10:

What are the two terms, one named for a particularly popular product, that refer to tools that can capture packets on a LAN?

A10:

Answer: Network analysis tool and Sniffer




Computer Networking first-step
Computer Networking First-Step
ISBN: 1587201011
EAN: 2147483647
Year: 2004
Pages: 173
Authors: Wendell Odom

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net