background image
582 Chapter 15: Network Security Technologies
13
Does L2F support multiprotocol?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
14
Does L2TP support multiprotocol?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
15
What is the name of the product that replaced NetRanger?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
16
Where would the local network server be located--at the ISP or on the customer's
property?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
17
What does the authentication header protect?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
18
How many bits does the MD5 hash encrypt with?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
19
What are the router commands that are used for exchanging keys called?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
87200333.book Page 582 Wednesday, August 22, 2001 1:41 PM