IP Telephony
Applied Knowledge Questions
The following questions are designed to test your knowledge of supporting-technology design considerations and sometimes build on knowledge found elsewhere in the book. You might find that a question has more than one possible answer. The answers provided in Appendix B are intended to reinforce concepts that you can apply in your own networking environment.
1: |
In the transparent cache deployment, WCCP is generally used to redirect web queries from a router to the cache. Assuming the cache is on a dedicated router interface and is properly filtered with ACLs, what is the most likely way a determined attacker could try to compromise the cache? |
2: |
Considering the techniques used to load balance security devices in this chapter, are there any unique considerations when attempting to load balance IPsec devices? |
3: |
In a teleworker environment, are there any unique security considerations for WLANs? |
4: |
Why are some of the 802.1x concerns discussed in Chapter 9 lessened in a WLAN environment? |
5: |
Are there any security considerations for using IPsec and IPT together? |