SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
System Statement of Health Response (SSoHR)
Testing - Monitoring - Limited access
An access control list (ACL) - A virtual local area network (VLAN)
System Health Agents (SHAs)
2. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
System Health Agents (SHAs)
Windows Firewall With Advanced Security
Win 7 - Win Vista - and Win XP SP3
Netstat
3. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
System Health Agents (SHAs)
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
Trusted Server Group
4. NAP health validation takes place between two components:
System Health Validators (SHVs)
System Health Agents (SHAs) - System Health Validators (SHVs)
SHA
IPsec connection security
5. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
System Statement of Health Response (SSoHR)
Netstat
manually - domain controller
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
6. One of the most powerful ways to increase computer security is to configure firewall ______.
System Statement of Health (SSoH)
scope
blocks any inbound traffic that hasn't been specifically allowed
SoHR
7. Which versions of Windows can act as NAP clients?
IPsec connection security
blocked by default
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
logging
8. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
compliant - noncompliant
do not filter
IPsec connection security
Network Policy And Access Services
9. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
remediation
User Interface Settings
netsh nap client show state
do not filter
10. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
Netstat
2008 (or Windows Server 2008 R2)
RADIUS
System health validators
11. ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.
An access control list (ACL) - A virtual local area network (VLAN)
Network Access Protection (NAP)
communicate only with other
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
12. The NAP health policy server combines the SoHRs from the multiple SHVs into a ______.
network access
Group Policy
System Statement of Health Response (SSoHR)
per-IP address or a per-TCP/UDP port number
13. By default - Windows Firewall (as well as most other firewalls) ______.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
blocks any inbound traffic that hasn't been specifically allowed
802.1X access points
Request Policy
802.1X - VPN - or DHCP
15. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
RADIUS
requirement policies
802.1X access points
Health policy - health policies
16. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
System Statement of Health (SSoH)
Testing - Monitoring - Limited access
Group Policy
Network Access Protection (NAP)
17. The ______ defines health requirements using SHV settings. Separate ______ must exist for both compliant and noncompliant clients.
logging
Request Policy
System Statement of Health (SSoH)
Health policy - health policies
18. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
Enforcement Clients - User Interface Settings - Health Registration Settings
meets health requirements
requirement policies
health state
19. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
noncompliant - compliant
remediation
netsh nap client show state
Network Access Protection (NAP)
20. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
requirement policies
VPN servers
Testing - Monitoring - Limited access
worms
21. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
drops
compliant - noncompliant
Network Access Protection (NAP)
Network Policy And Access Services
22. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
logging
DHCP servers
System Health Agents (SHAs) - System Health Validators (SHVs)
802.1X - VPN - or DHCP
23. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
compliant - noncompliant
remediation
VPN servers
Request Policy
24. A ______ determines whether a request should be processed by NPS.
netsh nap client show state
Connection request policy
802.1X access points
SoHR
25. Typically - a NAP deployment occurs in three phases:
Testing - Monitoring - Limited access
drops
RADIUS
RD Gateway
26. ______ define which health checks a client must meet to be considered compliant.
Windows Firewall With Advanced Security
network access
RD Gateway
System health validators
27. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
meets health requirements
do not filter
Remote Desktop Gateways (RD Gateway).
Trusted Server Group
28. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
domain controller
An access control list (ACL) - A virtual local area network (VLAN)
logging
RADIUS
29. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
Netstat
RD Gateway
blocks any inbound traffic that hasn't been specifically allowed
communicate only with other
30. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
IPsec connection security
2008 (or Windows Server 2008 R2)
Win 7 - Win Vista - and Win XP SP3
DHCP servers
31. You can configure client NAP settings using the three subnodes:
Enforcement Clients - User Interface Settings - Health Registration Settings
Remote Desktop Gateways (RD Gateway).
An access control list (ACL) - A virtual local area network (VLAN)
blocks any inbound traffic that hasn't been specifically allowed
32. Which NAP enforcement types do not require support from your network infrastructure?
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
Connection request policy
Netstat
monitoring-only
33. ______ enforcement does not provide remediation.
Win 7 - Win Vista - and Win XP SP3
System Statement of Health (SSoH)
RD Gateway
Health policy - health policies
34. With VPN server enforcement enabled - only ______ are granted unlimited network access.
System health validators
Connection request policy
compliant client computers
System Health Validators (SHVs)
35. The Domain firewall profile applies whenever a computer can communicate with its ______.
RD Gateway
monitoring-only
domain controller
RADIUS
36. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
scope
logging
Health policy - health policies
Local IP Address
37. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
RADIUS
compliant - noncompliant
2008 (or Windows Server 2008 R2)
A certification authority - A web application
38. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
Win 7 - Win Vista - and Win XP SP3
Request Policy
Network policy
SHA
39. NAP is designed to connect hosts to different network resources depending on their current ______.
per-IP address or a per-TCP/UDP port number
Netstat
remediation
health state
40. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
Health policy - health policies
logging
802.1X - VPN - or DHCP
Win 7 - Win Vista - and Win XP SP3
41. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
Request Policy
Statement of Health Response (SoHR)
Network Policy And Access Services
A certification authority - A web application
42. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
drops
health policy server
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Testing - Monitoring - Limited access
43. NAP ______ allows you to identify noncompliant computers.
logging
Network Policy And Access Services
meets health requirements
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
44. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
firewalls
network access
Network Policy And Access Services
Network Policy And Access Services
45. You must enable one policy to configure clients to use this enforcement type.
Enforcement Clients
Local IP Address
System health validators
do not filter
46. ______ is the most effective way to configure firewall settings for all computers in a domain.
manually - domain controller
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
Group Policy
IPsec connection security
47. The ______ defines the level of network access clients get based on which health policy they match.
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
System Health Agents (SHAs)
Network policy
domain controller
48. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
Network Policy And Access Services
RD Gateway
Win 7 - Win Vista - and Win XP SP3
System Statement of Health Response (SSoHR)
49. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
Request Policy
RADIUS
remediation
network access
50. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
RD Gateway
scope
meets health requirements
compliant - noncompliant - and unauthenticated