Chapter 10 Homework

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Chapter 10 – Security in Network Design

Homework

1. How does a reverse proxy differ from a normal proxy?

2. If your LAN utilizes a proxy server, and you wish to send an email message from your

workstation inside the LAN to a colleague via the Internet, what does this process look

like?

3. What is the purpose of Unified Threat Management (UTM)?

4. What are the three components required to manage access control to a network and its

resources? List and give a brief explanation.


5. In a network access control (NAC) system, what are the two different types of software

agents that are commonly used? List and give brief description.

6. What is multifactor authentication, and what are some examples?

7. Describe the TACACS+ AAA protocol, and detail how it differs from RADIUS.

8. How does the CCMP help ensure data confidentiality?

9. What is the difference between an Intrusion Detection System and an Intrusion Protection

System?
10. How does the Remote Authentication Dial-In User Service (RADIUS) function?

You might also like