Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.


  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Objective 3.5. Answers

A1: Correct Answers: A and D
  1. Correct: This will allow users to roam between access points without losing their connection to the network.

  2. Incorrect: If Rooslan only specifies the native access point, when workers with Tablet PCs move beyond these points they will be unable to access the network without restarting their Tablet PCs.

  3. Incorrect: Shared keys are generated between the native access point and the client. If the client moves beyond the initial access point, a new shared key would need to be generated. This could cause problems for users roaming between access points with Tablet PCs.

  4. Correct: If you use IEEE 802.1X authentication on the network, new keys will not be required when users with Tablet PCs roam between access points. New keys would be required for these roaming users if you were to use shared key authentication.

A2: Correct Answers: B
  1. Incorrect: This will allow students to join peer-to-peer networks.

  2. Correct: The Allow Infrastructure Networking Only setting forces wireless connections to go through access points.

  3. Incorrect: This GPO will allow only ad hoc networks to be used; this is the type of network type that you're trying to restrict.

  4. Incorrect: This will do nothing to curb the problem of having students use ad hoc networks.

A3: Correct Answers: A
  1. Correct: EAP-TLS is the only Windows Server 2003 authentication protocol that supports smart cards.

  2. Incorrect: PEAP-MS-CHAP v2 does not support smart cards, and hence cannot be used as the authentication protocol in this particular solution.

  3. Incorrect: PAP does not support smart cards, and hence cannot be used as the authentication protocol in this particular solution.

  4. Incorrect: Shared Key authentication does not support smart cards, and hence cannot be used as the authentication protocol in this particular solution.

A4: Correct Answers: C
  1. Incorrect: This protocol is used for authentication with certificates, generally smart cards. This protocol is not suited for password-based authentication.

  2. Incorrect: Although MD5 can be used for password authentication, it is not as strong as PEAP, which provides the strongest password-based authentication for WEP with 802.1X.

  3. Correct: PEAP provides the strongest password-based authentication for a WEP solution with 802.1X.

  4. Incorrect: PAP cannot be used for authentication with a WEP solution with 802.1X.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint