IP Telephony

Applied Knowledge Questions

The following questions are designed to test your knowledge of supporting-technology design considerations and sometimes build on knowledge found elsewhere in the book. You might find that a question has more than one possible answer. The answers provided in Appendix B are intended to reinforce concepts that you can apply in your own networking environment.

1:

In the transparent cache deployment, WCCP is generally used to redirect web queries from a router to the cache. Assuming the cache is on a dedicated router interface and is properly filtered with ACLs, what is the most likely way a determined attacker could try to compromise the cache?

2:

Considering the techniques used to load balance security devices in this chapter, are there any unique considerations when attempting to load balance IPsec devices?

3:

In a teleworker environment, are there any unique security considerations for WLANs?

4:

Why are some of the 802.1x concerns discussed in Chapter 9 lessened in a WLAN environment?

5:

Are there any security considerations for using IPsec and IPT together?

Категории