1. e 2. i 3. d 4. h 5. b 6. c 7. j 8. g 9. a 10. f
Multiple Choice page 429-430
1. c 2. c 3. a 4. d 5. a 6. c 7. a 8. b 9. d 10. d
Review Questions page 430
1) List four steps involved in deploying DRM-protected content in the correct order
a) Packaging b) Distribution c) Licensing d) Playback 2) List and explain five limitations that you can apply to a DRM license to control client access to a protected content file. a) Time limits – You can restrict the content to play back only between a specific start and end time or specify a license duration limit. b) Copy limit – Users can freely copy the content files to other computers, but each computer requires its own license. c) Multiple License – You can create licenses …show more content…
a) In: UDP ports 1024 through 5000 i) The Windows Media server uses UDP In ports 1024-5000 to receive data from another server. b) Out: TCP on port 80 and 554 i) The Windows Media server uses the TCP Out ports to establish an HTTP connection (port 80) or RTSP connection (port 554) to another server or encoder. c) Out: UDP on port 5005 i) When RTSPU distribution is used, the Windows Media server uses UDP Out port 5005 to send resend requests to another server.
2) What is the recommended security method for running the Windows Media Administration site? a) Integrated Windows authentication provides a means of authorizing users of the administration site, but does not allow credentials to be transmitted over the network. When you enable integrated Windows authentication, the browser running the administrative interface initiates a cryptographic exchange with the Web server using either NTLM or Kerberos authentication to validate the user. This method provides a great deal of security, but does not allow IIS to delegate user names and passwords to remote servers 3) Does using basic authentication offer any advantages? If so, what? a) Basic authentication is widely used on networks for collecting user credential information. The advantage of basic authentication is that it is simple to use and works with most browsers, proxy servers, and firewalls.