SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
Network Access Protection (NAP)
Netstat
RADIUS
VPN servers
2. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
compliant - noncompliant
domain controller
monitoring-only
health policy server
3. NAP health validation takes place between two components:
IPsec connection security
System Health Agents (SHAs) - System Health Validators (SHVs)
network access
compliant - noncompliant - and unauthenticated
4. A health requirement policy is a combination of the following:
SHA
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
RADIUS
remediation
5. Which versions of Windows can act as NAP clients?
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Win 7 - Win Vista - and Win XP SP3
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
RADIUS
6. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
remediation
System Health Agents (SHAs) - System Health Validators (SHVs)
Local IP Address
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
7. You can configure client NAP settings using the three subnodes:
802.1X - VPN - or DHCP
Remote Desktop Gateways (RD Gateway).
Enforcement Clients - User Interface Settings - Health Registration Settings
meets health requirements
8. NAP ______ allows you to identify noncompliant computers.
Connection request policy
System Health Agents (SHAs)
logging
Network Policy And Access Services
9. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
Trusted Server Group
Network Policy And Access Services
Network policy
User Interface Settings
10. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
logging
RD Gateway
worms
domain controller
11. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
worms
SoHR
firewalls
network access
12. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
Statement of Health Response (SoHR)
Remote Desktop Gateways (RD Gateway).
per-IP address or a per-TCP/UDP port number
compliant - noncompliant - and unauthenticated
13. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
RD Gateway
RADIUS
Network Policy And Access Services
blocks any inbound traffic that hasn't been specifically allowed
14. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
noncompliant - compliant
compliant - noncompliant - and unauthenticated
Testing - Monitoring - Limited access
Group Policy
15. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
compliant client computers
Enforcement Clients - User Interface Settings - Health Registration Settings
System Statement of Health (SSoH)
compliant - noncompliant
16. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
compliant client computers
System Health Validators (SHVs)
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
Enforcement Clients
17. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
requirement policies
drops
blocks any inbound traffic that hasn't been specifically allowed
remediation
18. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
do not filter
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
Request Policy
firewalls
19. One of the most powerful ways to increase computer security is to configure firewall ______.
compliant - noncompliant - and unauthenticated
scope
Windows Firewall With Advanced Security
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
20. The firewall profiles are:
Network Policy And Access Services
logging
Domain - Private - Public
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
21. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
health state
Netstat
meets health requirements
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
22. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
per-IP address or a per-TCP/UDP port number
RD Gateway
RADIUS
drops
23. By default - Windows Firewall (as well as most other firewalls) ______.
24. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
An access control list (ACL) - A virtual local area network (VLAN)
drops
Windows Firewall With Advanced Security
Enforcement Clients
25. You need to create outbound firewall rules only when you configure outbound connections to be ______.
blocked by default
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
domain controller
remediation
26. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
VPN servers
Windows Firewall With Advanced Security
requirement policies
IPsec connection security
27. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
blocked by default
health policy server
DHCP servers
logging
28. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Local IP Address
drops
Statement of Health Response (SoHR)
Network Policy And Access Services
29. NAP is designed to connect hosts to different network resources depending on their current ______.
health state
meets health requirements
System Health Agents (SHAs)
monitoring-only
30. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
Group Policy
System Health Agents (SHAs) - System Health Validators (SHVs)
RD Gateway
System Statement of Health (SSoH)
31. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
802.1X access points
2008 (or Windows Server 2008 R2)
A certification authority - A web application
An access control list (ACL) - A virtual local area network (VLAN)
32. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
Remote Desktop Gateways (RD Gateway).
Win 7 - Win Vista - and Win XP SP3
firewalls
Health policy - health policies
33. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
compliant client computers
System Health Agents (SHAs) - System Health Validators (SHVs)
Win 7 - Win Vista - and Win XP SP3
drops
34. ______ enforcement does not provide remediation.
SoHR
RD Gateway
User Interface Settings
do not filter
35. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Network Policy And Access Services
Remote Desktop Gateways (RD Gateway).
System Health Validators (SHVs)
health policy server
36. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
remediation
logging
health policy server
Network policy
37. You can quickly verify a client's configuration by running the following command at a command prompt:
IPsec connection security
netsh nap client show state
blocked by default
System Health Agents (SHAs)
38. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
worms
communicate only with other
compliant - noncompliant
IPsec connection security
39. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
System health validators
logging
Statement of Health Response (SoHR)
drops
40. The ______ defines health requirements using SHV settings. Separate ______ must exist for both compliant and noncompliant clients.
Health policy - health policies
blocked by default
802.1X - VPN - or DHCP
Enforcement Clients - User Interface Settings - Health Registration Settings
41. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
requirement policies
Request Policy
VPN servers
logging
42. Installing the HRA role service configures the following:
A certification authority - A web application
noncompliant - compliant
firewalls
Network Access Protection (NAP)
43. Which NAP enforcement types do not require support from your network infrastructure?
System Statement of Health (SSoH)
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
A certification authority - A web application
Network Access Protection (NAP)
44. A ______ determines whether a request should be processed by NPS.
2008 (or Windows Server 2008 R2)
Local IP Address
Connection request policy
health state
45. The Domain firewall profile applies whenever a computer can communicate with its ______.
System health validators
domain controller
blocks any inbound traffic that hasn't been specifically allowed
VPN servers
46. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
monitoring-only
2008 (or Windows Server 2008 R2)
compliant - noncompliant
do not filter
47. With VPN server enforcement enabled - only ______ are granted unlimited network access.
compliant client computers
A certification authority - A web application
SoHR
netsh nap client show state
48. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
A certification authority - A web application
RD Gateway
compliant - noncompliant
RADIUS
49. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
802.1X - VPN - or DHCP
Request Policy
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
RD Gateway
50. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
2008 (or Windows Server 2008 R2)
Win 7 - Win Vista - and Win XP SP3
do not filter
logging