Review Questions

1:Why is it imprudent to rely on VLANs to provide isolation and security?
2:What does port security do?
3:Which protocols are covered under IP permit lists?
4:What is an isolated VLAN port?
5:What is a promiscuous VLAN port?
6:What is the purpose of the 802.1x standard?
7:What is EAP?
8:What is the purpose of the EAPOL standard?
9:What is the purpose of EAP-Request Identity type messages?
10:What is the EAP-Response NAK message used for?

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.