SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
SHA
domain controller
System Statement of Health (SSoH)
An access control list (ACL) - A virtual local area network (VLAN)
2. NAP is designed to connect hosts to different network resources depending on their current ______.
health state
monitoring-only
Group Policy
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
3. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
worms
meets health requirements
DHCP servers
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
4. The NAP health policy server combines the SoHRs from the multiple SHVs into a ______.
Statement of Health Response (SoHR)
Health policy - health policies
System Health Validators (SHVs)
System Statement of Health Response (SSoHR)
5. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
Netstat
User Interface Settings
firewalls
drops
6. A health requirement policy is a combination of the following:
VPN servers
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
blocked by default
A certification authority - A web application
7. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
netsh nap client show state
RD Gateway
System health validators
Enforcement Clients
8. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
A certification authority - A web application
Statement of Health Response (SoHR)
remediation
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
9. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
Group Policy
Netstat
communicate only with other
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
10. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
compliant client computers
manually - domain controller
Network Policy And Access Services
RADIUS
11. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
Remediation server group
noncompliant - compliant
Remote Desktop Gateways (RD Gateway).
communicate only with other
12. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
logging
A certification authority - A web application
Statement of Health Response (SoHR)
requirement policies
13. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
Network Access Protection (NAP)
Network policy
remediation
network access
14. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
manually - domain controller
communicate only with other
netsh nap client show state
do not filter
15. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
2008 (or Windows Server 2008 R2)
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Local IP Address
802.1X - VPN - or DHCP
16. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Network Policy And Access Services
A certification authority - A web application
manually - domain controller
Trusted Server Group
17. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
compliant - noncompliant
User Interface Settings
RD Gateway
RADIUS
18. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
VPN servers
Enforcement Clients
System Health Validators (SHVs)
System Health Agents (SHAs)
19. ______ is the most effective way to configure firewall settings for all computers in a domain.
802.1X access points
Remote Desktop Gateways (RD Gateway).
do not filter
Group Policy
20. The firewall profiles are:
Domain - Private - Public
IPsec connection security
2008 (or Windows Server 2008 R2)
Win 7 - Win Vista - and Win XP SP3
21. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Connection request policy
noncompliant - compliant
Network Policy And Access Services
VPN servers
22. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
Windows Firewall With Advanced Security
netsh nap client show state
meets health requirements
Enforcement Clients - User Interface Settings - Health Registration Settings
23. The Domain firewall profile applies whenever a computer can communicate with its ______.
noncompliant - compliant
domain controller
manually - domain controller
meets health requirements
24. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
A certification authority - A web application
System Health Validators (SHVs)
firewalls
remediation
25. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
Connection request policy
RADIUS
802.1X - VPN - or DHCP
Network Policy And Access Services
26. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
meets health requirements
2008 (or Windows Server 2008 R2)
domain controller
System health validators
27. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
Network policy
System Statement of Health (SSoH)
Enforcement Clients
health policy server
28. You need to create outbound firewall rules only when you configure outbound connections to be ______.
RD Gateway
blocked by default
monitoring-only
Enforcement Clients
29. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
Statement of Health Response (SoHR)
Group Policy
compliant - noncompliant
logging
30. Typically - a NAP deployment occurs in three phases:
System Health Validators (SHVs)
Win 7 - Win Vista - and Win XP SP3
Group Policy
Testing - Monitoring - Limited access
31. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
noncompliant - compliant
802.1X access points
802.1X - VPN - or DHCP
RD Gateway
32. NAP ______ allows you to identify noncompliant computers.
logging
compliant - noncompliant - and unauthenticated
Trusted Server Group
RADIUS
33. Which versions of Windows can act as NAP clients?
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Statement of Health Response (SoHR)
meets health requirements
User Interface Settings
34. You can quickly verify a client's configuration by running the following command at a command prompt:
Trusted Server Group
User Interface Settings
communicate only with other
netsh nap client show state
35. NAP health validation takes place between two components:
health state
System Health Agents (SHAs) - System Health Validators (SHVs)
blocks any inbound traffic that hasn't been specifically allowed
manually - domain controller
36. A group of servers that noncompliant clients can access is a ______.
System Health Agents (SHAs)
Remediation server group
noncompliant - compliant
Enforcement Clients - User Interface Settings - Health Registration Settings
37. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
System Statement of Health (SSoH)
SHA
Network Policy And Access Services
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
38. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
logging
compliant client computers
requirement policies
Network Policy And Access Services
39. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
netsh nap client show state
Local IP Address
manually - domain controller
Trusted Server Group
40. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
System Statement of Health Response (SSoHR)
Local IP Address
monitoring-only
Windows Firewall With Advanced Security
41. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
Health policy - health policies
System Health Agents (SHAs)
Trusted Server Group
noncompliant - compliant
42. ______ define which health checks a client must meet to be considered compliant.
Enforcement Clients - User Interface Settings - Health Registration Settings
meets health requirements
System health validators
RD Gateway
43. One of the most powerful ways to increase computer security is to configure firewall ______.
VPN servers
Win 7 - Win Vista - and Win XP SP3
scope
blocks any inbound traffic that hasn't been specifically allowed
44. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
VPN servers
System Statement of Health Response (SSoHR)
monitoring-only
compliant - noncompliant
45. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
IPsec connection security
System Statement of Health Response (SSoHR)
Remote Desktop Gateways (RD Gateway).
monitoring-only
46. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
health state
scope
compliant client computers
compliant - noncompliant - and unauthenticated
47. You can configure client NAP settings using the three subnodes:
scope
do not filter
802.1X - VPN - or DHCP
Enforcement Clients - User Interface Settings - Health Registration Settings
48. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
monitoring-only
An access control list (ACL) - A virtual local area network (VLAN)
System Health Agents (SHAs) - System Health Validators (SHVs)
Trusted Server Group
49. Which NAP enforcement types do not require support from your network infrastructure?
health policy server
802.1X access points
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
Network Policy And Access Services
50. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
IPsec connection security
worms
Trusted Server Group
drops