SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Health policy - health policies
Network Policy And Access Services
RD Gateway
2. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
System health validators
Enforcement Clients - User Interface Settings - Health Registration Settings
RD Gateway
DHCP servers
3. You can quickly verify a client's configuration by running the following command at a command prompt:
meets health requirements
Enforcement Clients
netsh nap client show state
System Health Agents (SHAs)
4. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
worms
scope
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
compliant - noncompliant
5. A health requirement policy is a combination of the following:
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Testing - Monitoring - Limited access
Windows Firewall With Advanced Security
System Health Agents (SHAs)
6. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
compliant - noncompliant
RADIUS
compliant - noncompliant - and unauthenticated
VPN servers
7. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
per-IP address or a per-TCP/UDP port number
meets health requirements
worms
Netstat
8. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
Trusted Server Group
Network Policy And Access Services
SoHR
compliant client computers
9. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
do not filter
Netstat
2008 (or Windows Server 2008 R2)
logging
10. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
blocked by default
2008 (or Windows Server 2008 R2)
System Health Agents (SHAs) - System Health Validators (SHVs)
IPsec connection security
11. ______ enforcement does not provide remediation.
meets health requirements
RD Gateway
worms
scope
12. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
System Health Agents (SHAs) - System Health Validators (SHVs)
802.1X access points
RADIUS
An access control list (ACL) - A virtual local area network (VLAN)
13. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
logging
remediation
VPN servers
monitoring-only
14. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
Remote Desktop Gateways (RD Gateway).
System Statement of Health Response (SSoHR)
per-IP address or a per-TCP/UDP port number
System Health Validators (SHVs)
15. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
System Health Agents (SHAs)
System Statement of Health (SSoH)
Domain - Private - Public
SoHR
16. By default - Windows Firewall (as well as most other firewalls) ______.
17. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
SHA
compliant - noncompliant - and unauthenticated
firewalls
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
18. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
manually - domain controller
logging
System Health Validators (SHVs)
compliant - noncompliant - and unauthenticated
19. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
User Interface Settings
logging
noncompliant - compliant
SHA
20. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
VPN servers
firewalls
A certification authority - A web application
Request Policy
21. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
SoHR
System Health Agents (SHAs) - System Health Validators (SHVs)
Netstat
health policy server
22. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
do not filter
meets health requirements
RADIUS
noncompliant - compliant
23. You need to create outbound firewall rules only when you configure outbound connections to be ______.
remediation
blocked by default
Statement of Health Response (SoHR)
monitoring-only
24. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
manually - domain controller
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
IPsec connection security
An access control list (ACL) - A virtual local area network (VLAN)
25. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
Statement of Health Response (SoHR)
health state
network access
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
26. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
802.1X - VPN - or DHCP
compliant client computers
blocks any inbound traffic that hasn't been specifically allowed
do not filter
27. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
System Health Agents (SHAs) - System Health Validators (SHVs)
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
802.1X - VPN - or DHCP
IPsec connection security
28. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
Network Policy And Access Services
Request Policy
System Statement of Health Response (SSoHR)
A certification authority - A web application
29. The ______ defines health requirements using SHV settings. Separate ______ must exist for both compliant and noncompliant clients.
drops
User Interface Settings
System Health Agents (SHAs) - System Health Validators (SHVs)
Health policy - health policies
30. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
meets health requirements
per-IP address or a per-TCP/UDP port number
System Health Agents (SHAs) - System Health Validators (SHVs)
compliant - noncompliant
31. ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.
System Health Agents (SHAs)
An access control list (ACL) - A virtual local area network (VLAN)
Health policy - health policies
Network Access Protection (NAP)
32. The ______ defines the level of network access clients get based on which health policy they match.
System Statement of Health Response (SSoHR)
domain controller
compliant client computers
Network policy
33. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
requirement policies
noncompliant - compliant
compliant - noncompliant
worms
34. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
communicate only with other
SHA
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Netstat
35. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
per-IP address or a per-TCP/UDP port number
SHA
VPN servers
802.1X access points
36. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
domain controller
Enforcement Clients
Network Policy And Access Services
RD Gateway
37. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
Network Policy And Access Services
Local IP Address
Domain - Private - Public
System Statement of Health Response (SSoHR)
38. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Group Policy
compliant - noncompliant - and unauthenticated
System Health Validators (SHVs)
39. Which versions of Windows can act as NAP clients?
logging
Netstat
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Network policy
40. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
manually - domain controller
Health policy - health policies
netsh nap client show state
compliant - noncompliant
41. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
Network Access Protection (NAP)
Remote Desktop Gateways (RD Gateway).
System Statement of Health (SSoH)
noncompliant - compliant
42. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
requirement policies
compliant - noncompliant
System Health Agents (SHAs)
compliant - noncompliant
43. NAP health validation takes place between two components:
noncompliant - compliant
System Health Validators (SHVs)
Remediation server group
System Health Agents (SHAs) - System Health Validators (SHVs)
44. Which NAP enforcement types do not require support from your network infrastructure?
compliant client computers
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
Enforcement Clients - User Interface Settings - Health Registration Settings
System Health Validators (SHVs)
45. ______ define which health checks a client must meet to be considered compliant.
Remote Desktop Gateways (RD Gateway).
System health validators
drops
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
46. The Domain firewall profile applies whenever a computer can communicate with its ______.
blocks any inbound traffic that hasn't been specifically allowed
Request Policy
domain controller
Netstat
47. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
Enforcement Clients - User Interface Settings - Health Registration Settings
Health policy - health policies
DHCP servers
48. The NAP health policy server combines the SoHRs from the multiple SHVs into a ______.
Netstat
netsh nap client show state
System Statement of Health Response (SSoHR)
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
49. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
scope
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
DHCP servers
SHA
50. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
Statement of Health Response (SoHR)
VPN servers
802.1X - VPN - or DHCP
per-IP address or a per-TCP/UDP port number