SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
meets health requirements
802.1X access points
Windows Firewall With Advanced Security
drops
2. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
Local IP Address
drops
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
2008 (or Windows Server 2008 R2)
3. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
Network policy
health state
monitoring-only
IPsec connection security
4. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
compliant - noncompliant
do not filter
802.1X - VPN - or DHCP
compliant - noncompliant - and unauthenticated
5. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
A certification authority - A web application
noncompliant - compliant
An access control list (ACL) - A virtual local area network (VLAN)
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
6. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
manually - domain controller
A certification authority - A web application
Enforcement Clients
health policy server
7. ______ define which health checks a client must meet to be considered compliant.
2008 (or Windows Server 2008 R2)
System Health Agents (SHAs) - System Health Validators (SHVs)
firewalls
System health validators
8. NAP ______ allows you to identify noncompliant computers.
Trusted Server Group
remediation
RADIUS
logging
9. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
compliant - noncompliant
do not filter
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
noncompliant - compliant
10. NAP is designed to connect hosts to different network resources depending on their current ______.
communicate only with other
Connection request policy
Win 7 - Win Vista - and Win XP SP3
health state
11. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
User Interface Settings
DHCP servers
RD Gateway
noncompliant - compliant
12. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
compliant - noncompliant - and unauthenticated
Network policy
Enforcement Clients - User Interface Settings - Health Registration Settings
remediation
13. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
User Interface Settings
Remediation server group
meets health requirements
Network Access Protection (NAP)
14. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
RD Gateway
communicate only with other
User Interface Settings
System Health Agents (SHAs)
15. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
communicate only with other
A certification authority - A web application
Connection request policy
Statement of Health Response (SoHR)
16. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
Domain - Private - Public
802.1X access points
manually - domain controller
health policy server
17. One of the most powerful ways to increase computer security is to configure firewall ______.
RD Gateway
scope
Network policy
compliant client computers
18. NAP health validation takes place between two components:
System Statement of Health Response (SSoHR)
per-IP address or a per-TCP/UDP port number
firewalls
System Health Agents (SHAs) - System Health Validators (SHVs)
19. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
RD Gateway
DHCP servers
Group Policy
20. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
SoHR
System Health Validators (SHVs)
Win 7 - Win Vista - and Win XP SP3
System Health Agents (SHAs) - System Health Validators (SHVs)
21. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
RD Gateway
System Health Agents (SHAs) - System Health Validators (SHVs)
Network Policy And Access Services
System Health Agents (SHAs)
22. Installing the HRA role service configures the following:
Trusted Server Group
firewalls
An access control list (ACL) - A virtual local area network (VLAN)
A certification authority - A web application
23. Which versions of Windows can act as NAP clients?
Trusted Server Group
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Windows Firewall With Advanced Security
Statement of Health Response (SoHR)
24. By default - Windows Firewall (as well as most other firewalls) ______.
25. You must enable one policy to configure clients to use this enforcement type.
DHCP servers
Testing - Monitoring - Limited access
noncompliant - compliant
Enforcement Clients
26. ______ is the most effective way to configure firewall settings for all computers in a domain.
blocks any inbound traffic that hasn't been specifically allowed
Group Policy
Enforcement Clients - User Interface Settings - Health Registration Settings
network access
27. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
802.1X - VPN - or DHCP
compliant - noncompliant
monitoring-only
A certification authority - A web application
28. Typically - a NAP deployment occurs in three phases:
Network Access Protection (NAP)
System health validators
Netstat
Testing - Monitoring - Limited access
29. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
SoHR
2008 (or Windows Server 2008 R2)
Trusted Server Group
Enforcement Clients
30. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
noncompliant - compliant
System Health Agents (SHAs) - System Health Validators (SHVs)
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
Windows Firewall With Advanced Security
31. The Domain firewall profile applies whenever a computer can communicate with its ______.
RADIUS
Netstat
domain controller
Domain - Private - Public
32. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
Win 7 - Win Vista - and Win XP SP3
802.1X - VPN - or DHCP
802.1X access points
System Health Validators (SHVs)
33. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
RD Gateway
Trusted Server Group
Local IP Address
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
34. The ______ defines health requirements using SHV settings. Separate ______ must exist for both compliant and noncompliant clients.
SoHR
Network policy
Health policy - health policies
System Health Agents (SHAs) - System Health Validators (SHVs)
35. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
User Interface Settings
drops
Network Policy And Access Services
2008 (or Windows Server 2008 R2)
36. The ______ defines the level of network access clients get based on which health policy they match.
DHCP servers
Network policy
System health validators
worms
37. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
blocked by default
compliant client computers
Group Policy
VPN servers
38. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
System Health Validators (SHVs)
manually - domain controller
2008 (or Windows Server 2008 R2)
Remediation server group
39. You can configure client NAP settings using the three subnodes:
Testing - Monitoring - Limited access
Trusted Server Group
Enforcement Clients - User Interface Settings - Health Registration Settings
RADIUS
40. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
per-IP address or a per-TCP/UDP port number
System Health Agents (SHAs) - System Health Validators (SHVs)
logging
monitoring-only
41. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
Win 7 - Win Vista - and Win XP SP3
Windows Firewall With Advanced Security
RD Gateway
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
42. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
Statement of Health Response (SoHR)
Win 7 - Win Vista - and Win XP SP3
Network Policy And Access Services
SHA
43. The NAP health policy server combines the SoHRs from the multiple SHVs into a ______.
meets health requirements
health state
User Interface Settings
System Statement of Health Response (SSoHR)
44. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
communicate only with other
worms
Netstat
health policy server
45. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
health state
Local IP Address
Windows Firewall With Advanced Security
firewalls
46. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
Enforcement Clients
Network Policy And Access Services
scope
network access
47. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
System Health Validators (SHVs)
Network Access Protection (NAP)
System Health Agents (SHAs)
blocks any inbound traffic that hasn't been specifically allowed
48. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
requirement policies
System health validators
DHCP servers
Domain - Private - Public
49. Which NAP enforcement types do not require support from your network infrastructure?
Trusted Server Group
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
monitoring-only
DHCP servers
50. A ______ determines whether a request should be processed by NPS.
Connection request policy
compliant - noncompliant
logging
manually - domain controller