SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
Enforcement Clients - User Interface Settings - Health Registration Settings
compliant - noncompliant
logging
DHCP servers
2. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
firewalls
meets health requirements
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
communicate only with other
3. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
RD Gateway
System Health Validators (SHVs)
Remote Desktop Gateways (RD Gateway).
Connection request policy
4. The NAP health policy server combines the SoHRs from the multiple SHVs into a ______.
System Statement of Health Response (SSoHR)
RADIUS
Windows Firewall With Advanced Security
Remote Desktop Gateways (RD Gateway).
5. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
VPN servers
2008 (or Windows Server 2008 R2)
Domain - Private - Public
System Health Agents (SHAs)
6. NAP is designed to connect hosts to different network resources depending on their current ______.
Group Policy
health state
monitoring-only
Win 7 - Win Vista - and Win XP SP3
7. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
Network Access Protection (NAP)
compliant - noncompliant
Enforcement Clients - User Interface Settings - Health Registration Settings
drops
8. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
Network Policy And Access Services
System Statement of Health Response (SSoHR)
IPsec connection security
communicate only with other
9. You need to create outbound firewall rules only when you configure outbound connections to be ______.
blocked by default
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
System Statement of Health Response (SSoHR)
System Health Agents (SHAs)
10. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
worms
Netstat
requirement policies
Enforcement Clients - User Interface Settings - Health Registration Settings
11. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
IPsec connection security
Enforcement Clients - User Interface Settings - Health Registration Settings
System Health Validators (SHVs)
compliant - noncompliant
12. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
compliant - noncompliant - and unauthenticated
RADIUS
Domain - Private - Public
13. Installing the HRA role service configures the following:
Trusted Server Group
scope
User Interface Settings
A certification authority - A web application
14. A health requirement policy is a combination of the following:
manually - domain controller
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
remediation
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
15. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
compliant - noncompliant - and unauthenticated
compliant client computers
per-IP address or a per-TCP/UDP port number
Network Policy And Access Services
16. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
Health policy - health policies
User Interface Settings
health policy server
network access
17. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
User Interface Settings
Testing - Monitoring - Limited access
blocked by default
logging
18. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
System Statement of Health (SSoH)
worms
Win 7 - Win Vista - and Win XP SP3
Network policy
19. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
worms
Remote Desktop Gateways (RD Gateway).
Enforcement Clients - User Interface Settings - Health Registration Settings
System Health Agents (SHAs) - System Health Validators (SHVs)
20. The firewall profiles are:
compliant - noncompliant
IPsec connection security
Domain - Private - Public
SoHR
21. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
Local IP Address
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
drops
manually - domain controller
22. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
Local IP Address
Remediation server group
blocks any inbound traffic that hasn't been specifically allowed
meets health requirements
23. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
SoHR
blocked by default
Network Policy And Access Services
Trusted Server Group
24. Which versions of Windows can act as NAP clients?
Health policy - health policies
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Statement of Health Response (SoHR)
Netstat
25. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
manually - domain controller
System Health Agents (SHAs) - System Health Validators (SHVs)
Testing - Monitoring - Limited access
compliant - noncompliant - and unauthenticated
26. The ______ defines the level of network access clients get based on which health policy they match.
Group Policy
System health validators
IPsec connection security
Network policy
27. You can quickly verify a client's configuration by running the following command at a command prompt:
communicate only with other
SoHR
netsh nap client show state
Network Policy And Access Services
28. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
blocks any inbound traffic that hasn't been specifically allowed
Network Policy And Access Services
Network policy
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
29. ______ is the most effective way to configure firewall settings for all computers in a domain.
RD Gateway
Group Policy
Network Access Protection (NAP)
Enforcement Clients
30. A ______ determines whether a request should be processed by NPS.
Connection request policy
netsh nap client show state
manually - domain controller
requirement policies
31. The Domain firewall profile applies whenever a computer can communicate with its ______.
Domain - Private - Public
Enforcement Clients
System Statement of Health (SSoH)
domain controller
32. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
monitoring-only
SoHR
Windows Firewall With Advanced Security
33. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
A certification authority - A web application
compliant client computers
worms
Network policy
34. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
Remote Desktop Gateways (RD Gateway).
do not filter
Enforcement Clients
SHA
35. NAP health validation takes place between two components:
domain controller
System Health Agents (SHAs) - System Health Validators (SHVs)
User Interface Settings
noncompliant - compliant
36. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
Trusted Server Group
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
compliant client computers
blocked by default
37. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
System Health Agents (SHAs)
2008 (or Windows Server 2008 R2)
monitoring-only
RD Gateway
38. A group of servers that noncompliant clients can access is a ______.
Remediation server group
Testing - Monitoring - Limited access
2008 (or Windows Server 2008 R2)
do not filter
39. ______ enforcement does not provide remediation.
RD Gateway
Win 7 - Win Vista - and Win XP SP3
requirement policies
network access
40. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
drops
per-IP address or a per-TCP/UDP port number
802.1X access points
Network Access Protection (NAP)
41. ______ define which health checks a client must meet to be considered compliant.
Remediation server group
Network policy
System health validators
Trusted Server Group
42. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
compliant - noncompliant
worms
remediation
IPsec connection security
43. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
requirement policies
logging
monitoring-only
RD Gateway
44. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
2008 (or Windows Server 2008 R2)
Win 7 - Win Vista - and Win XP SP3
VPN servers
Local IP Address
45. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
worms
VPN servers
Statement of Health Response (SoHR)
domain controller
46. You must enable one policy to configure clients to use this enforcement type.
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Testing - Monitoring - Limited access
logging
Enforcement Clients
47. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
domain controller
health policy server
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
noncompliant - compliant
48. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Network Policy And Access Services
Trusted Server Group
Network policy
Statement of Health Response (SoHR)
49. With VPN server enforcement enabled - only ______ are granted unlimited network access.
compliant client computers
logging
System Health Agents (SHAs)
compliant - noncompliant
50. NAP ______ allows you to identify noncompliant computers.
Windows Firewall With Advanced Security
Enforcement Clients
Local IP Address
logging