SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
firewalls
IPsec connection security
compliant - noncompliant - and unauthenticated
A certification authority - A web application
2. NAP ______ allows you to identify noncompliant computers.
logging
System Health Agents (SHAs) - System Health Validators (SHVs)
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
do not filter
3. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
logging
IPsec connection security
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
meets health requirements
4. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
Domain - Private - Public
domain controller
Netstat
network access
5. You can quickly verify a client's configuration by running the following command at a command prompt:
blocks any inbound traffic that hasn't been specifically allowed
netsh nap client show state
Win 7 - Win Vista - and Win XP SP3
domain controller
6. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
System Health Validators (SHVs)
Group Policy
Connection request policy
Domain - Private - Public
7. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
Network Access Protection (NAP)
IPsec connection security
Group Policy
Network policy
8. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
System Health Agents (SHAs)
scope
compliant - noncompliant - and unauthenticated
requirement policies
9. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
SHA
RADIUS
Remote Desktop Gateways (RD Gateway).
RD Gateway
10. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
compliant - noncompliant - and unauthenticated
firewalls
manually - domain controller
Remote Desktop Gateways (RD Gateway).
11. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
per-IP address or a per-TCP/UDP port number
meets health requirements
network access
Network Policy And Access Services
12. NAP health validation takes place between two components:
System Health Agents (SHAs) - System Health Validators (SHVs)
A certification authority - A web application
Statement of Health Response (SoHR)
Local IP Address
13. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Win 7 - Win Vista - and Win XP SP3
RD Gateway
per-IP address or a per-TCP/UDP port number
14. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
worms
scope
System Statement of Health (SSoH)
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
15. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
blocks any inbound traffic that hasn't been specifically allowed
Network Policy And Access Services
blocked by default
netsh nap client show state
16. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
do not filter
requirement policies
netsh nap client show state
network access
17. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
VPN servers
Statement of Health Response (SoHR)
requirement policies
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
18. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
System health validators
Enforcement Clients
Statement of Health Response (SoHR)
Trusted Server Group
19. By default - Windows Firewall (as well as most other firewalls) ______.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. With VPN server enforcement enabled - only ______ are granted unlimited network access.
Win 7 - Win Vista - and Win XP SP3
Health policy - health policies
Statement of Health Response (SoHR)
compliant client computers
21. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
compliant client computers
802.1X access points
Network Policy And Access Services
Health policy - health policies
22. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
compliant - noncompliant
manually - domain controller
health state
802.1X - VPN - or DHCP
23. A ______ determines whether a request should be processed by NPS.
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
health state
Connection request policy
Trusted Server Group
24. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
Windows Firewall With Advanced Security
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
manually - domain controller
noncompliant - compliant
25. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
do not filter
Win 7 - Win Vista - and Win XP SP3
worms
remediation
26. Which NAP enforcement types do not require support from your network infrastructure?
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
802.1X - VPN - or DHCP
blocked by default
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
27. A group of servers that noncompliant clients can access is a ______.
monitoring-only
RD Gateway
802.1X access points
Remediation server group
28. You need to create outbound firewall rules only when you configure outbound connections to be ______.
compliant client computers
Connection request policy
drops
blocked by default
29. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
System Health Validators (SHVs)
System Health Agents (SHAs) - System Health Validators (SHVs)
2008 (or Windows Server 2008 R2)
meets health requirements
30. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
Local IP Address
IPsec connection security
2008 (or Windows Server 2008 R2)
compliant client computers
31. One of the most powerful ways to increase computer security is to configure firewall ______.
compliant - noncompliant - and unauthenticated
scope
Trusted Server Group
Enforcement Clients
32. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
communicate only with other
System Health Agents (SHAs)
logging
Network Policy And Access Services
33. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
Request Policy
Network Policy And Access Services
User Interface Settings
VPN servers
34. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
netsh nap client show state
RD Gateway
IPsec connection security
compliant - noncompliant
35. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
logging
compliant - noncompliant
communicate only with other
802.1X - VPN - or DHCP
36. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
SoHR
Network Policy And Access Services
DHCP servers
SHA
37. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
compliant - noncompliant
User Interface Settings
RD Gateway
System Statement of Health (SSoH)
38. The firewall profiles are:
Local IP Address
compliant - noncompliant
Domain - Private - Public
communicate only with other
39. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
802.1X access points
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
compliant - noncompliant - and unauthenticated
2008 (or Windows Server 2008 R2)
40. ______ define which health checks a client must meet to be considered compliant.
System health validators
compliant - noncompliant - and unauthenticated
compliant - noncompliant
Local IP Address
41. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
Health policy - health policies
802.1X - VPN - or DHCP
System Statement of Health (SSoH)
scope
42. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
health policy server
System Statement of Health Response (SSoHR)
System Health Agents (SHAs) - System Health Validators (SHVs)
43. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Request Policy
Domain - Private - Public
Connection request policy
44. Installing the HRA role service configures the following:
netsh nap client show state
System Statement of Health Response (SSoHR)
A certification authority - A web application
Domain - Private - Public
45. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
compliant - noncompliant - and unauthenticated
requirement policies
System Health Agents (SHAs) - System Health Validators (SHVs)
drops
46. You can configure client NAP settings using the three subnodes:
Enforcement Clients - User Interface Settings - Health Registration Settings
netsh nap client show state
health state
Domain - Private - Public
47. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Remediation server group
User Interface Settings
netsh nap client show state
48. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
monitoring-only
DHCP servers
firewalls
communicate only with other
49. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
802.1X access points
System Health Agents (SHAs) - System Health Validators (SHVs)
Win 7 - Win Vista - and Win XP SP3
compliant - noncompliant
50. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
health policy server
Health policy - health policies
manually - domain controller
Network policy