SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Installing the HRA role service configures the following:
remediation
A certification authority - A web application
monitoring-only
Domain - Private - Public
2. A group of servers that noncompliant clients can access is a ______.
Remediation server group
Netstat
Network policy
logging
3. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
Windows Firewall With Advanced Security
Netstat
manually - domain controller
Request Policy
4. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
Group Policy
802.1X - VPN - or DHCP
health policy server
Remediation server group
5. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
Testing - Monitoring - Limited access
meets health requirements
VPN servers
Remote Desktop Gateways (RD Gateway).
6. The NAP health policy server combines the SoHRs from the multiple SHVs into a ______.
scope
System Statement of Health Response (SSoHR)
compliant - noncompliant
domain controller
7. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
meets health requirements
Trusted Server Group
Local IP Address
An access control list (ACL) - A virtual local area network (VLAN)
8. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Connection request policy
communicate only with other
Win 7 - Win Vista - and Win XP SP3
Network Policy And Access Services
9. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
System Health Agents (SHAs)
communicate only with other
netsh nap client show state
RD Gateway
10. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
health state
System Health Validators (SHVs)
manually - domain controller
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
11. One of the most powerful ways to increase computer security is to configure firewall ______.
Domain - Private - Public
logging
drops
scope
12. ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.
Network Access Protection (NAP)
Network Policy And Access Services
per-IP address or a per-TCP/UDP port number
health state
13. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
Win 7 - Win Vista - and Win XP SP3
Testing - Monitoring - Limited access
An access control list (ACL) - A virtual local area network (VLAN)
2008 (or Windows Server 2008 R2)
14. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
System health validators
RD Gateway
System Health Agents (SHAs)
Win 7 - Win Vista - and Win XP SP3
15. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
meets health requirements
compliant - noncompliant - and unauthenticated
Request Policy
monitoring-only
16. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
health state
RD Gateway
VPN servers
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
17. You can configure client NAP settings using the three subnodes:
IPsec connection security
Statement of Health Response (SoHR)
Win 7 - Win Vista - and Win XP SP3
Enforcement Clients - User Interface Settings - Health Registration Settings
18. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
network access
monitoring-only
An access control list (ACL) - A virtual local area network (VLAN)
Netstat
19. You need to create outbound firewall rules only when you configure outbound connections to be ______.
blocked by default
network access
Trusted Server Group
manually - domain controller
20. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
Statement of Health Response (SoHR)
User Interface Settings
network access
802.1X access points
21. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
Remote Desktop Gateways (RD Gateway).
Network Policy And Access Services
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
System Health Agents (SHAs) - System Health Validators (SHVs)
22. NAP is designed to connect hosts to different network resources depending on their current ______.
requirement policies
802.1X access points
health state
Local IP Address
23. A health requirement policy is a combination of the following:
Request Policy
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
RADIUS
Network Access Protection (NAP)
24. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
VPN servers
802.1X access points
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
25. You must enable one policy to configure clients to use this enforcement type.
RD Gateway
Network Access Protection (NAP)
Enforcement Clients - User Interface Settings - Health Registration Settings
Enforcement Clients
26. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
2008 (or Windows Server 2008 R2)
compliant client computers
Group Policy
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
27. You can quickly verify a client's configuration by running the following command at a command prompt:
DHCP servers
Remote Desktop Gateways (RD Gateway).
requirement policies
netsh nap client show state
28. A ______ determines whether a request should be processed by NPS.
Enforcement Clients - User Interface Settings - Health Registration Settings
meets health requirements
Connection request policy
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
29. The ______ defines the level of network access clients get based on which health policy they match.
SoHR
VPN servers
Remediation server group
Network policy
30. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
SoHR
compliant - noncompliant - and unauthenticated
Local IP Address
Request Policy
31. By default - Windows Firewall (as well as most other firewalls) ______.
32. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
blocks any inbound traffic that hasn't been specifically allowed
remediation
firewalls
SHA
33. The firewall profiles are:
Connection request policy
Domain - Private - Public
domain controller
Network Policy And Access Services
34. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
802.1X - VPN - or DHCP
Health policy - health policies
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
blocked by default
35. The Domain firewall profile applies whenever a computer can communicate with its ______.
drops
Connection request policy
domain controller
DHCP servers
36. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
manually - domain controller
worms
noncompliant - compliant
IPsec connection security
37. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
Remote Desktop Gateways (RD Gateway).
DHCP servers
firewalls
netsh nap client show state
38. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
Health policy - health policies
Domain - Private - Public
Windows Firewall With Advanced Security
Testing - Monitoring - Limited access
39. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
Domain - Private - Public
Windows Firewall With Advanced Security
noncompliant - compliant
Local IP Address
40. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
drops
health state
meets health requirements
Remediation server group
41. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
VPN servers
SoHR
remediation
health policy server
42. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
communicate only with other
802.1X access points
noncompliant - compliant
netsh nap client show state
43. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
Testing - Monitoring - Limited access
compliant - noncompliant
SoHR
44. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
Netstat
A certification authority - A web application
firewalls
45. With VPN server enforcement enabled - only ______ are granted unlimited network access.
compliant client computers
2008 (or Windows Server 2008 R2)
802.1X - VPN - or DHCP
Domain - Private - Public
46. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
Statement of Health Response (SoHR)
do not filter
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
drops
47. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
worms
compliant - noncompliant
health state
Network Policy And Access Services
48. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
An access control list (ACL) - A virtual local area network (VLAN)
Network Policy And Access Services
Testing - Monitoring - Limited access
communicate only with other
49. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
Network Policy And Access Services
Enforcement Clients
RADIUS
worms
50. The ______ defines health requirements using SHV settings. Separate ______ must exist for both compliant and noncompliant clients.
User Interface Settings
Health policy - health policies
2008 (or Windows Server 2008 R2)
VPN servers