Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 10

Chapter 10

1.A. B. D. The Set Network Location dialog box enables you to configure your computer for any of the Home, Work, or Public network types. This dialog box does not have options for Private or Domain network types.
2.D. The Password protected sharing option requires users attempting to access shared resources on your computer to have a user account with a password. None of the other options enforce this requirement; without selecting the Password protected sharing option, others can access your shared resources without a valid username and password.
3.B. ICS is a simple means for enabling computers on a small office or home network to use one computer on the network as the router to the Internet. It is a simplified version of NAT designed for these small networks. The full implementation of NAT would require a server. A simplified version of DHCP is included in ICS; implementing the full version of DHCP requires a server and by itself would not grant shared Internet access. WEP is a security protocol that provides encryption of data sent on a wireless network; it does not enable computers to connect to the Internet.
4.A, B, C, D. You can encrypt data sent on a wireless connection by using TKIP, AES, WEP, WPA, or WPA2. The SSID is a network identifier that is broadcast by many wireless access points (WAPs) to enable you to locate available wireless networks; it does not provide data protection.
5.D. 802.11n is a new wireless networking protocol that is compatible with devices using older protocols but enables a transmission speed of up to 150–600 Mbps. It has the best signal range and is most resistant to interference. No other protocol offers this much transmission speed.
6.B. By default, the WPA2-Personal protocol uses AES encryption and requires a security key or passphrase. WPA-Personal and WPA-Enterprise both use TKIP encryption by default. Both WPA-Enterprise and WPA2-Enterprise do not require the user to type a security key or passphrase.
7.C. You should set up a per-user profile. This profile contains the required settings and is connected when the specified user logs on to the computer. An all-user profile applies to all users of the computer and is connected regardless of which user is logged on to the computer. There are no such profiles as per-computer and all-computer.
8.C. The Public network location locks Windows Firewall down so that others cannot access anything on your computer, although it can also limit your access to external resources. The Work and Home network locations allow others to access any items you have configured for sharing on your computer. The Private location is the same as Work and Home.
9.B, C, E. You can configure Windows Firewall to specify programs that are allowed to communicate, or you can configure Windows Firewall to block all incoming connections, from the Windows Firewall Control Panel applet. You can also specify firewall settings for home, work, and public networks from this location. However, you must use the Windows Firewall with Advanced Security snap-in to configure ports and logging (the Windows Firewall applet in Windows Vista allowed specifying allowed ports, but this function was removed from this location in Windows 7).
10.C. Windows Firewall with Advanced Security does not include any connection security rules by default. You can use the New Rules Wizard to set up connection security rules as well as additional rules for the other rule types.
11.A. You should run the New Inbound Rule Wizard, specify the path to Windows Media Player on the program page, and then specify the Allow the connection if it is secure option. The latter option permits only connections that have been authenticated using IPSec. You need an inbound rule, not an outbound rule. Connection security rules do not permit specifying programs that are allowed to connect. The Allowed Programs and Features list does not enable you to restrict connections to only those that have been authenticated using IPSec.
12.D. It is not possible to change a rule from Inbound to Outbound from any setting that is available in the rule’s Properties dialog box. It is also not possible to drag a rule from one node to another in Windows Firewall with Advanced Security. You must create a new outbound rule to perform this action.
13.A. The Properties dialog box of Windows Firewall with Advanced Security enables you to perform this action for each of the Domain, Private, and Public profiles. You can access this dialog box by right-clicking Windows Firewall with Advanced Security at the top of the console tree and choosing Properties. None of the locations mentioned in the other options provides a Properties dialog box.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint