BIS230- Ch 10 Solutions

BIS230- Ch 10 Solutions - Guide to Networking Essentials,...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Guide to Networking Essentials , 5th ed., 14188-37180 Ch. 10 Solutions-1 Chapter 10 Solutions Review Questions 1. Your friend creates a shared folder on her computer for several co-workers to use. She assigns the password “0OxqH}ml2-wO” to the folder. Is it an example of a good password or a bad password? Explain. It’s a bad password because it’s probably too difficult to remember, which means the user might have to write it down somewhere. 2. List at least three techniques you could use to help secure a wireless network. WEP, WPA, or 802.11i encryption; don’t broadcast the SSID; and use MAC address filtering 3. Which of these protocols is used for VPNs? (Choose all that apply.) a. PPTP d. L2TP 4. How do VPNs accomplish the private part of a virtual private network? By using tunneling protocols, such as L2TP or PPTP, a secure and encrypted tunnel is created through the public network. 5. Which of the following terms refers to attacking an Internet server by forcing it to respond to a flood of ping packets so that the server can’t respond to normal traffic? c. DoS
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 3

BIS230- Ch 10 Solutions - Guide to Networking Essentials,...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online