Page 177 - StudyBook.pdf
P. 177

Communication Security: Remote Access and Messaging • Chapter 3  161

                 Exam Objectives

                 Frequently Asked Questions



                 The following Frequently Asked Questions, answered by the authors of this
                 book, are designed to both measure your understanding of the Exam Objectives
                 presented in this chapter, and to assist you with real-life implementation of
                 these concepts.


                 Q: Why is it important to secure communications?
                 A: Important data is transmitted over public media every day, and making sure
                    unauthorized users are not reading it can be crucial to users, companies, gov-
                    ernments, and so on.

                 Q: In reality, how easy is it for someone to hack into my network?
                 A: It all depends on how secure your network is. If you have the correct tools in
                    place (i.e., firewalls, secure VPNs, and so forth), you make it very difficult for a
                    hacker to penetrate your network.Theoretically, any network can be hacked.
                    The purpose of network security is to make it so difficult and time consuming
                    that hackers will be discouraged. In reality, there is no such thing as 100 percent
                    “hackproofing” a network—security measures only slow hackers down and
                    frustrate them; they never guarantee that a network cannot be penetrated.


                 Q: Why is wireless networking such a security concern?
                 A: Wireless networks run over the open-air using standardized frequencies and
                    protocols.Wireless network transmissions use radio signals that can be picked
                    up by anyone with the right reception equipment.Therefore, anyone within
                    range can potentially listen in on a user network for data.There is no need to
                    make a physical connection. By adding WEP and WPA as well as authentication
                    protocols like 802.1x, users make it more difficult for hackers to listen to the
                    airwaves.


                 Q: If I have to choose between L2TP and PPTP for my VPN, which should I use?
                 A: That is a matter of opinion. Some older Microsoft OSes (such as Windows 95)
                    can only handle PPTP, and others (Windows 9x/ME/NT 4.0) require that
                    users download an add-on L2TP/IPSec client to use L2TP, while the newer



                                                                              www.syngress.com
   172   173   174   175   176   177   178   179   180   181   182