Chapter 81: Securing the Infrastructure
Review Questions/Exercises
True/False
1. True
2. False
3. True
4. False
5. False
Multiple Choice
1. C
2. D
3. C
4. B
5. E
Exercise
Solution
The following is a partial exercise solution. The students should be able to expand on the following:
It's appropriate to enable 802.1x authentication on any and all Ethernet ports on which you do not explicitly trust the device connected to the port. Be aware that to really trust the device, you need to have a high level of confidence in the physical security of the Ethernet switch, the device connecting to it, and the Ethernet cable path connecting them. It's generally assumed that wireless connections are not secure in real-world deployments. People widely recognize the need for ...
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.