SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
Enforcement Clients
Win 7 - Win Vista - and Win XP SP3
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
worms
2. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
IPsec connection security
Netstat
Network Policy And Access Services
Testing - Monitoring - Limited access
3. Installing the HRA role service configures the following:
worms
A certification authority - A web application
Testing - Monitoring - Limited access
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
4. A group of servers that noncompliant clients can access is a ______.
Remediation server group
logging
Network Policy And Access Services
DHCP servers
5. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
RD Gateway
Statement of Health Response (SoHR)
communicate only with other
System Statement of Health Response (SSoHR)
6. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
Windows Firewall With Advanced Security
RD Gateway
health policy server
Connection request policy
7. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
Enforcement Clients
Win 7 - Win Vista - and Win XP SP3
Remote Desktop Gateways (RD Gateway).
Windows Firewall With Advanced Security
8. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
compliant - noncompliant
do not filter
logging
VPN servers
9. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
SHA
monitoring-only
RD Gateway
2008 (or Windows Server 2008 R2)
10. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
Group Policy
SHA
requirement policies
logging
11. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
Network policy
System health validators
Remediation server group
compliant - noncompliant
12. You can configure client NAP settings using the three subnodes:
Enforcement Clients - User Interface Settings - Health Registration Settings
health state
IPsec connection security
Network Policy And Access Services
13. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
RD Gateway
Trusted Server Group
logging
meets health requirements
14. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
logging
SHA
DHCP servers
per-IP address or a per-TCP/UDP port number
15. NAP ______ allows you to identify noncompliant computers.
logging
Trusted Server Group
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
requirement policies
16. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
2008 (or Windows Server 2008 R2)
blocked by default
meets health requirements
System Health Agents (SHAs) - System Health Validators (SHVs)
17. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
SoHR
Enforcement Clients - User Interface Settings - Health Registration Settings
Request Policy
compliant - noncompliant - and unauthenticated
18. With VPN server enforcement enabled - only ______ are granted unlimited network access.
logging
Local IP Address
compliant client computers
Remote Desktop Gateways (RD Gateway).
19. A health requirement policy is a combination of the following:
Enforcement Clients - User Interface Settings - Health Registration Settings
RD Gateway
compliant - noncompliant - and unauthenticated
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
20. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
health policy server
802.1X - VPN - or DHCP
netsh nap client show state
Network Access Protection (NAP)
21. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
scope
VPN servers
An access control list (ACL) - A virtual local area network (VLAN)
System Health Validators (SHVs)
22. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
An access control list (ACL) - A virtual local area network (VLAN)
per-IP address or a per-TCP/UDP port number
Statement of Health Response (SoHR)
23. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
System Health Validators (SHVs)
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
requirement policies
2008 (or Windows Server 2008 R2)
24. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
RADIUS
manually - domain controller
Netstat
blocks any inbound traffic that hasn't been specifically allowed
25. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Remote Desktop Gateways (RD Gateway).
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
RADIUS
Network Policy And Access Services
26. ______ enforcement does not provide remediation.
Network Access Protection (NAP)
compliant - noncompliant
health policy server
RD Gateway
27. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
Request Policy
SoHR
User Interface Settings
RD Gateway
28. ______ is the most effective way to configure firewall settings for all computers in a domain.
noncompliant - compliant
A certification authority - A web application
Group Policy
per-IP address or a per-TCP/UDP port number
29. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
Local IP Address
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
blocked by default
communicate only with other
30. NAP health validation takes place between two components:
DHCP servers
System Health Agents (SHAs) - System Health Validators (SHVs)
System health validators
SHA
31. Which versions of Windows can act as NAP clients?
Network Policy And Access Services
Enforcement Clients
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
meets health requirements
32. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
802.1X access points
per-IP address or a per-TCP/UDP port number
compliant - noncompliant - and unauthenticated
Request Policy
33. You can quickly verify a client's configuration by running the following command at a command prompt:
Remediation server group
System Health Agents (SHAs)
per-IP address or a per-TCP/UDP port number
netsh nap client show state
34. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
System health validators
Health policy - health policies
monitoring-only
network access
35. NAP is designed to connect hosts to different network resources depending on their current ______.
Network Policy And Access Services
health state
Request Policy
System Health Validators (SHVs)
36. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
802.1X - VPN - or DHCP
Enforcement Clients
Trusted Server Group
Network Policy And Access Services
37. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
802.1X access points
compliant client computers
logging
Enforcement Clients - User Interface Settings - Health Registration Settings
38. By default - Windows Firewall (as well as most other firewalls) ______.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. The Domain firewall profile applies whenever a computer can communicate with its ______.
RADIUS
manually - domain controller
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
domain controller
40. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
Local IP Address
drops
SoHR
compliant - noncompliant
41. The firewall profiles are:
Network Access Protection (NAP)
Statement of Health Response (SoHR)
Domain - Private - Public
System Health Agents (SHAs)
42. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
Statement of Health Response (SoHR)
Netstat
802.1X - VPN - or DHCP
blocked by default
43. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
blocks any inbound traffic that hasn't been specifically allowed
System Statement of Health (SSoH)
firewalls
Network Access Protection (NAP)
44. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
compliant - noncompliant - and unauthenticated
Connection request policy
compliant - noncompliant
Request Policy
45. You need to create outbound firewall rules only when you configure outbound connections to be ______.
blocked by default
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
domain controller
46. ______ define which health checks a client must meet to be considered compliant.
Network Policy And Access Services
Remote Desktop Gateways (RD Gateway).
SoHR
System health validators
47. The ______ defines health requirements using SHV settings. Separate ______ must exist for both compliant and noncompliant clients.
802.1X - VPN - or DHCP
Health policy - health policies
Remote Desktop Gateways (RD Gateway).
Win 7 - Win Vista - and Win XP SP3
48. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
compliant - noncompliant
health policy server
A certification authority - A web application
noncompliant - compliant
49. ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.
VPN servers
Network Access Protection (NAP)
RD Gateway
System Health Agents (SHAs)
50. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
System Statement of Health (SSoH)
compliant - noncompliant
Remediation server group
System health validators