SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
Network Access Protection (NAP)
health policy server
Win 7 - Win Vista - and Win XP SP3
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
2. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
Network Policy And Access Services
network access
802.1X access points
Group Policy
3. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
Request Policy
Windows Firewall With Advanced Security
blocked by default
System Health Agents (SHAs) - System Health Validators (SHVs)
4. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Network Policy And Access Services
System Health Validators (SHVs)
Group Policy
requirement policies
5. The Domain firewall profile applies whenever a computer can communicate with its ______.
Network policy
domain controller
compliant - noncompliant - and unauthenticated
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
6. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
RADIUS
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
2008 (or Windows Server 2008 R2)
communicate only with other
7. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
blocks any inbound traffic that hasn't been specifically allowed
Enforcement Clients - User Interface Settings - Health Registration Settings
compliant - noncompliant
compliant - noncompliant - and unauthenticated
8. You can quickly verify a client's configuration by running the following command at a command prompt:
manually - domain controller
netsh nap client show state
Network Policy And Access Services
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
9. ______ enforcement does not provide remediation.
drops
DHCP servers
RD Gateway
compliant - noncompliant
10. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
Windows Firewall With Advanced Security
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
compliant - noncompliant
netsh nap client show state
11. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
IPsec connection security
compliant - noncompliant
health policy server
VPN servers
12. The firewall profiles are:
health state
Domain - Private - Public
SoHR
Statement of Health Response (SoHR)
13. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
drops
do not filter
Statement of Health Response (SoHR)
Trusted Server Group
14. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
Network Policy And Access Services
Netstat
SHA
compliant - noncompliant
15. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
Statement of Health Response (SoHR)
Network Policy And Access Services
2008 (or Windows Server 2008 R2)
IPsec connection security
16. ______ define which health checks a client must meet to be considered compliant.
Network Policy And Access Services
System health validators
Windows Firewall With Advanced Security
Network Policy And Access Services
17. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
blocks any inbound traffic that hasn't been specifically allowed
System Health Agents (SHAs)
802.1X - VPN - or DHCP
compliant - noncompliant - and unauthenticated
18. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
Local IP Address
A certification authority - A web application
do not filter
Remediation server group
19. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
System Health Validators (SHVs)
worms
Group Policy
VPN servers
20. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
Statement of Health Response (SoHR)
IPsec connection security
requirement policies
Request Policy
21. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
Netstat
compliant - noncompliant
Enforcement Clients - User Interface Settings - Health Registration Settings
Local IP Address
22. NAP ______ allows you to identify noncompliant computers.
worms
Testing - Monitoring - Limited access
System Statement of Health Response (SSoHR)
logging
23. Which NAP enforcement types do not require support from your network infrastructure?
scope
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Netstat
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
24. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
blocks any inbound traffic that hasn't been specifically allowed
remediation
firewalls
System Health Validators (SHVs)
25. You need to create outbound firewall rules only when you configure outbound connections to be ______.
System Statement of Health (SSoH)
Enforcement Clients
domain controller
blocked by default
26. ______ is the most effective way to configure firewall settings for all computers in a domain.
Group Policy
scope
2008 (or Windows Server 2008 R2)
noncompliant - compliant
27. One of the most powerful ways to increase computer security is to configure firewall ______.
Remediation server group
Enforcement Clients
compliant - noncompliant - and unauthenticated
scope
28. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
worms
meets health requirements
System Health Agents (SHAs)
Remediation server group
29. A ______ determines whether a request should be processed by NPS.
Remediation server group
System Health Agents (SHAs) - System Health Validators (SHVs)
Connection request policy
Network Access Protection (NAP)
30. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
Request Policy
Statement of Health Response (SoHR)
monitoring-only
RADIUS
31. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
firewalls
DHCP servers
Remote Desktop Gateways (RD Gateway).
Local IP Address
32. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
SHA
health policy server
Network Policy And Access Services
Group Policy
33. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
Connection request policy
monitoring-only
worms
34. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
compliant - noncompliant
An access control list (ACL) - A virtual local area network (VLAN)
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Group Policy
35. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
remediation
Local IP Address
Win 7 - Win Vista - and Win XP SP3
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
36. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
communicate only with other
RD Gateway
worms
meets health requirements
37. By default - Windows Firewall (as well as most other firewalls) ______.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
Request Policy
System Health Agents (SHAs)
Remediation server group
SHA
39. Typically - a NAP deployment occurs in three phases:
blocks any inbound traffic that hasn't been specifically allowed
remediation
Testing - Monitoring - Limited access
Request Policy
40. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
compliant client computers
SoHR
System Health Agents (SHAs)
SHA
41. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
noncompliant - compliant
health policy server
requirement policies
Trusted Server Group
42. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
DHCP servers
firewalls
blocked by default
VPN servers
43. With VPN server enforcement enabled - only ______ are granted unlimited network access.
System health validators
compliant client computers
Trusted Server Group
System Statement of Health (SSoH)
44. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
network access
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
drops
2008 (or Windows Server 2008 R2)
45. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
noncompliant - compliant
per-IP address or a per-TCP/UDP port number
remediation
46. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
logging
compliant - noncompliant
remediation
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
47. A health requirement policy is a combination of the following:
Local IP Address
Remote Desktop Gateways (RD Gateway).
SHA
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
48. ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.
noncompliant - compliant
Network Access Protection (NAP)
Netstat
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
49. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
manually - domain controller
Domain - Private - Public
Network Policy And Access Services
network access
50. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
IPsec connection security
System Statement of Health (SSoH)
802.1X - VPN - or DHCP
network access
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests