SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
RD Gateway
Statement of Health Response (SoHR)
Health policy - health policies
Network Access Protection (NAP)
2. NAP health validation takes place between two components:
System Health Agents (SHAs) - System Health Validators (SHVs)
System Statement of Health (SSoH)
domain controller
communicate only with other
3. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
requirement policies
Enforcement Clients - User Interface Settings - Health Registration Settings
Enforcement Clients
do not filter
4. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
System Health Agents (SHAs) - System Health Validators (SHVs)
noncompliant - compliant
netsh nap client show state
worms
5. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
Netstat
blocks any inbound traffic that hasn't been specifically allowed
do not filter
System Statement of Health (SSoH)
6. A ______ determines whether a request should be processed by NPS.
noncompliant - compliant
Connection request policy
RD Gateway
A certification authority - A web application
7. Which versions of Windows can act as NAP clients?
An access control list (ACL) - A virtual local area network (VLAN)
Windows Firewall With Advanced Security
2008 (or Windows Server 2008 R2)
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
8. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
Local IP Address
VPN servers
IPsec connection security
System Health Agents (SHAs) - System Health Validators (SHVs)
9. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
logging
Trusted Server Group
A certification authority - A web application
monitoring-only
10. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
User Interface Settings
Group Policy
do not filter
11. The ______ defines health requirements using SHV settings. Separate ______ must exist for both compliant and noncompliant clients.
Network Policy And Access Services
Trusted Server Group
Network Policy And Access Services
Health policy - health policies
12. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
drops
RD Gateway
health policy server
SoHR
13. You can configure client NAP settings using the three subnodes:
System Health Validators (SHVs)
Enforcement Clients - User Interface Settings - Health Registration Settings
domain controller
network access
14. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
Enforcement Clients - User Interface Settings - Health Registration Settings
System Statement of Health (SSoH)
scope
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
15. Typically - a NAP deployment occurs in three phases:
per-IP address or a per-TCP/UDP port number
Testing - Monitoring - Limited access
Local IP Address
DHCP servers
16. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
SHA
logging
Health policy - health policies
An access control list (ACL) - A virtual local area network (VLAN)
17. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
monitoring-only
System Statement of Health Response (SSoHR)
Enforcement Clients
System health validators
18. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
communicate only with other
Remote Desktop Gateways (RD Gateway).
Group Policy
An access control list (ACL) - A virtual local area network (VLAN)
19. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
Testing - Monitoring - Limited access
meets health requirements
802.1X - VPN - or DHCP
System Health Validators (SHVs)
20. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
meets health requirements
compliant - noncompliant - and unauthenticated
firewalls
do not filter
21. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
SoHR
System health validators
System Statement of Health (SSoH)
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
22. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
System Health Agents (SHAs)
Windows Firewall With Advanced Security
System Health Validators (SHVs)
Enforcement Clients - User Interface Settings - Health Registration Settings
23. NAP ______ allows you to identify noncompliant computers.
requirement policies
802.1X access points
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
logging
24. With VPN server enforcement enabled - only ______ are granted unlimited network access.
communicate only with other
compliant client computers
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
DHCP servers
25. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
System Health Agents (SHAs)
do not filter
communicate only with other
per-IP address or a per-TCP/UDP port number
26. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
Windows Firewall With Advanced Security
RADIUS
per-IP address or a per-TCP/UDP port number
System health validators
27. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
monitoring-only
A certification authority - A web application
Testing - Monitoring - Limited access
compliant - noncompliant
28. A group of servers that noncompliant clients can access is a ______.
System Statement of Health (SSoH)
Remediation server group
do not filter
Statement of Health Response (SoHR)
29. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
per-IP address or a per-TCP/UDP port number
Remediation server group
manually - domain controller
30. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
scope
802.1X access points
compliant - noncompliant - and unauthenticated
remediation
31. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
System Health Agents (SHAs) - System Health Validators (SHVs)
per-IP address or a per-TCP/UDP port number
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
noncompliant - compliant
32. Which NAP enforcement types do not require support from your network infrastructure?
2008 (or Windows Server 2008 R2)
communicate only with other
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
meets health requirements
33. The NAP health policy server combines the SoHRs from the multiple SHVs into a ______.
VPN servers
health state
System Statement of Health Response (SSoHR)
Request Policy
34. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
network access
manually - domain controller
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
An access control list (ACL) - A virtual local area network (VLAN)
35. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
Request Policy
logging
compliant - noncompliant - and unauthenticated
System health validators
36. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
Netstat
2008 (or Windows Server 2008 R2)
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
A certification authority - A web application
37. The ______ defines the level of network access clients get based on which health policy they match.
noncompliant - compliant
Network policy
An access control list (ACL) - A virtual local area network (VLAN)
Request Policy
38. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
Connection request policy
health state
remediation
communicate only with other
39. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
IPsec connection security
logging
802.1X - VPN - or DHCP
System Statement of Health (SSoH)
40. The firewall profiles are:
Domain - Private - Public
System Health Agents (SHAs) - System Health Validators (SHVs)
Testing - Monitoring - Limited access
IPsec connection security
41. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
An access control list (ACL) - A virtual local area network (VLAN)
compliant client computers
System Health Validators (SHVs)
Network Policy And Access Services
42. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
802.1X access points
compliant - noncompliant
Win 7 - Win Vista - and Win XP SP3
System Health Validators (SHVs)
43. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
firewalls
RD Gateway
802.1X - VPN - or DHCP
Remediation server group
44. ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.
Remote Desktop Gateways (RD Gateway).
Network Access Protection (NAP)
Network policy
System Statement of Health (SSoH)
45. One of the most powerful ways to increase computer security is to configure firewall ______.
blocked by default
Network Policy And Access Services
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
scope
46. By default - Windows Firewall (as well as most other firewalls) ______.
47. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
communicate only with other
meets health requirements
DHCP servers
An access control list (ACL) - A virtual local area network (VLAN)
48. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
IPsec connection security
SoHR
802.1X - VPN - or DHCP
Statement of Health Response (SoHR)
49. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
requirement policies
RADIUS
Statement of Health Response (SoHR)
blocks any inbound traffic that hasn't been specifically allowed
50. You need to create outbound firewall rules only when you configure outbound connections to be ______.
logging
do not filter
compliant - noncompliant - and unauthenticated
blocked by default