SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
IPsec connection security
802.1X - VPN - or DHCP
firewalls
802.1X access points
2. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
meets health requirements
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
802.1X - VPN - or DHCP
health policy server
3. You need to create outbound firewall rules only when you configure outbound connections to be ______.
IPsec connection security
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
blocked by default
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
4. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
DHCP servers
worms
System health validators
per-IP address or a per-TCP/UDP port number
5. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
Group Policy
meets health requirements
RADIUS
Netstat
6. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
compliant - noncompliant
Local IP Address
System Health Agents (SHAs) - System Health Validators (SHVs)
scope
7. NAP ______ allows you to identify noncompliant computers.
domain controller
logging
System Health Agents (SHAs) - System Health Validators (SHVs)
Domain - Private - Public
8. You must enable one policy to configure clients to use this enforcement type.
remediation
DHCP servers
compliant - noncompliant - and unauthenticated
Enforcement Clients
9. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
requirement policies
RADIUS
System Health Agents (SHAs) - System Health Validators (SHVs)
manually - domain controller
10. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
DHCP servers
RD Gateway
netsh nap client show state
Remote Desktop Gateways (RD Gateway).
11. The Domain firewall profile applies whenever a computer can communicate with its ______.
firewalls
Connection request policy
compliant - noncompliant - and unauthenticated
domain controller
12. A ______ determines whether a request should be processed by NPS.
blocks any inbound traffic that hasn't been specifically allowed
Windows Firewall With Advanced Security
Connection request policy
Network Access Protection (NAP)
13. You can configure client NAP settings using the three subnodes:
Network Policy And Access Services
Enforcement Clients - User Interface Settings - Health Registration Settings
RD Gateway
SoHR
14. ______ is the most effective way to configure firewall settings for all computers in a domain.
SHA
compliant - noncompliant - and unauthenticated
Group Policy
A certification authority - A web application
15. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
System Statement of Health Response (SSoHR)
monitoring-only
802.1X access points
System Health Agents (SHAs)
16. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
manually - domain controller
drops
communicate only with other
System Health Validators (SHVs)
17. Which NAP enforcement types do not require support from your network infrastructure?
802.1X - VPN - or DHCP
manually - domain controller
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
remediation
18. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
requirement policies
802.1X access points
monitoring-only
Enforcement Clients
19. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
meets health requirements
compliant - noncompliant
blocks any inbound traffic that hasn't been specifically allowed
User Interface Settings
20. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
Trusted Server Group
worms
compliant - noncompliant
Win 7 - Win Vista - and Win XP SP3
21. By default - Windows Firewall (as well as most other firewalls) ______.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. ______ define which health checks a client must meet to be considered compliant.
noncompliant - compliant
System health validators
Remediation server group
An access control list (ACL) - A virtual local area network (VLAN)
23. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
monitoring-only
System Health Validators (SHVs)
System health validators
2008 (or Windows Server 2008 R2)
24. ______ enforcement does not provide remediation.
2008 (or Windows Server 2008 R2)
do not filter
RD Gateway
requirement policies
25. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
SoHR
communicate only with other
compliant - noncompliant
Enforcement Clients
26. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
System health validators
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
compliant - noncompliant - and unauthenticated
802.1X - VPN - or DHCP
27. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
Windows Firewall With Advanced Security
blocks any inbound traffic that hasn't been specifically allowed
monitoring-only
Network policy
28. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
System Statement of Health Response (SSoHR)
manually - domain controller
Network Policy And Access Services
logging
29. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
IPsec connection security
A certification authority - A web application
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
monitoring-only
30. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
System Health Agents (SHAs) - System Health Validators (SHVs)
Statement of Health Response (SoHR)
VPN servers
2008 (or Windows Server 2008 R2)
31. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
requirement policies
compliant - noncompliant - and unauthenticated
Network policy
System Statement of Health Response (SSoHR)
32. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
RADIUS
Network Policy And Access Services
network access
health policy server
33. Which versions of Windows can act as NAP clients?
System Health Validators (SHVs)
2008 (or Windows Server 2008 R2)
IPsec connection security
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
34. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
Enforcement Clients
do not filter
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
domain controller
35. One of the most powerful ways to increase computer security is to configure firewall ______.
Group Policy
logging
scope
An access control list (ACL) - A virtual local area network (VLAN)
36. Typically - a NAP deployment occurs in three phases:
Connection request policy
Statement of Health Response (SoHR)
Enforcement Clients - User Interface Settings - Health Registration Settings
Testing - Monitoring - Limited access
37. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
worms
Local IP Address
RD Gateway
Win 7 - Win Vista - and Win XP SP3
38. With VPN server enforcement enabled - only ______ are granted unlimited network access.
DHCP servers
802.1X - VPN - or DHCP
Health policy - health policies
compliant client computers
39. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
802.1X - VPN - or DHCP
VPN servers
System health validators
Win 7 - Win Vista - and Win XP SP3
40. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
SoHR
logging
remediation
RD Gateway
41. A health requirement policy is a combination of the following:
IPsec connection security
RD Gateway
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
worms
42. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
SHA
manually - domain controller
remediation
Enforcement Clients
43. The ______ defines the level of network access clients get based on which health policy they match.
802.1X access points
Network policy
System Statement of Health Response (SSoHR)
monitoring-only
44. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
User Interface Settings
Connection request policy
RD Gateway
45. NAP health validation takes place between two components:
logging
SHA
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
System Health Agents (SHAs) - System Health Validators (SHVs)
46. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
SHA
IPsec connection security
Enforcement Clients - User Interface Settings - Health Registration Settings
Windows Firewall With Advanced Security
47. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
An access control list (ACL) - A virtual local area network (VLAN)
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
worms
per-IP address or a per-TCP/UDP port number
48. The NAP health policy server combines the SoHRs from the multiple SHVs into a ______.
network access
System Statement of Health Response (SSoHR)
remediation
An access control list (ACL) - A virtual local area network (VLAN)
49. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
requirement policies
System Statement of Health (SSoH)
Trusted Server Group
50. Installing the HRA role service configures the following:
health policy server
drops
A certification authority - A web application
Enforcement Clients - User Interface Settings - Health Registration Settings