SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
Statement of Health Response (SoHR)
DHCP servers
VPN servers
requirement policies
2. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
SoHR
Health policy - health policies
Remote Desktop Gateways (RD Gateway).
Remediation server group
3. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
Statement of Health Response (SoHR)
System Health Validators (SHVs)
System health validators
A certification authority - A web application
4. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
drops
logging
Windows Firewall With Advanced Security
Health policy - health policies
5. NAP is designed to connect hosts to different network resources depending on their current ______.
Request Policy
health state
logging
noncompliant - compliant
6. You need to create outbound firewall rules only when you configure outbound connections to be ______.
compliant - noncompliant - and unauthenticated
System health validators
blocks any inbound traffic that hasn't been specifically allowed
blocked by default
7. The ______ defines health requirements using SHV settings. Separate ______ must exist for both compliant and noncompliant clients.
2008 (or Windows Server 2008 R2)
monitoring-only
Health policy - health policies
meets health requirements
8. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
blocks any inbound traffic that hasn't been specifically allowed
User Interface Settings
compliant - noncompliant
per-IP address or a per-TCP/UDP port number
9. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
System Health Validators (SHVs)
Network Policy And Access Services
blocked by default
communicate only with other
10. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
monitoring-only
RADIUS
compliant client computers
An access control list (ACL) - A virtual local area network (VLAN)
11. ______ enforcement does not provide remediation.
RD Gateway
per-IP address or a per-TCP/UDP port number
Network Access Protection (NAP)
A certification authority - A web application
12. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
requirement policies
do not filter
compliant - noncompliant - and unauthenticated
domain controller
13. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
RADIUS
Local IP Address
802.1X access points
scope
14. ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.
Network Access Protection (NAP)
scope
Network Policy And Access Services
health policy server
15. A ______ determines whether a request should be processed by NPS.
Connection request policy
noncompliant - compliant
Netstat
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
16. A group of servers that noncompliant clients can access is a ______.
Remediation server group
compliant client computers
monitoring-only
Health policy - health policies
17. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
Windows Firewall With Advanced Security
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
System Health Validators (SHVs)
blocks any inbound traffic that hasn't been specifically allowed
18. Which versions of Windows can act as NAP clients?
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Enforcement Clients - User Interface Settings - Health Registration Settings
Network policy
Testing - Monitoring - Limited access
19. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
logging
communicate only with other
compliant - noncompliant
Network Policy And Access Services
20. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
compliant - noncompliant - and unauthenticated
System health validators
compliant - noncompliant
blocked by default
21. Installing the HRA role service configures the following:
requirement policies
A certification authority - A web application
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
VPN servers
22. You can quickly verify a client's configuration by running the following command at a command prompt:
Windows Firewall With Advanced Security
communicate only with other
Testing - Monitoring - Limited access
netsh nap client show state
23. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
SHA
System health validators
worms
logging
24. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
System Statement of Health (SSoH)
requirement policies
Remote Desktop Gateways (RD Gateway).
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
25. Which NAP enforcement types do not require support from your network infrastructure?
Group Policy
Health policy - health policies
worms
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
26. You must enable one policy to configure clients to use this enforcement type.
System Health Agents (SHAs) - System Health Validators (SHVs)
Enforcement Clients
DHCP servers
remediation
27. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
health policy server
User Interface Settings
Network policy
System Health Agents (SHAs) - System Health Validators (SHVs)
28. Typically - a NAP deployment occurs in three phases:
Testing - Monitoring - Limited access
System Health Validators (SHVs)
RADIUS
Connection request policy
29. ______ define which health checks a client must meet to be considered compliant.
communicate only with other
System health validators
health policy server
System Statement of Health (SSoH)
30. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
SHA
Local IP Address
SoHR
Remote Desktop Gateways (RD Gateway).
31. NAP ______ allows you to identify noncompliant computers.
logging
IPsec connection security
2008 (or Windows Server 2008 R2)
scope
32. By default - Windows Firewall (as well as most other firewalls) ______.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
Network Policy And Access Services
remediation
domain controller
Windows Firewall With Advanced Security
34. The firewall profiles are:
compliant - noncompliant
Network Access Protection (NAP)
2008 (or Windows Server 2008 R2)
Domain - Private - Public
35. You can configure client NAP settings using the three subnodes:
Enforcement Clients - User Interface Settings - Health Registration Settings
Connection request policy
noncompliant - compliant
compliant - noncompliant
36. ______ is the most effective way to configure firewall settings for all computers in a domain.
firewalls
Trusted Server Group
Group Policy
RADIUS
37. With VPN server enforcement enabled - only ______ are granted unlimited network access.
compliant client computers
drops
Windows Firewall With Advanced Security
per-IP address or a per-TCP/UDP port number
38. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
firewalls
System Statement of Health (SSoH)
health policy server
Testing - Monitoring - Limited access
39. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
meets health requirements
System Statement of Health Response (SSoHR)
drops
2008 (or Windows Server 2008 R2)
40. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
System health validators
IPsec connection security
Group Policy
An access control list (ACL) - A virtual local area network (VLAN)
41. The Domain firewall profile applies whenever a computer can communicate with its ______.
2008 (or Windows Server 2008 R2)
domain controller
VPN servers
802.1X - VPN - or DHCP
42. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
System Health Agents (SHAs)
drops
Windows Firewall With Advanced Security
IPsec connection security
43. One of the most powerful ways to increase computer security is to configure firewall ______.
scope
802.1X - VPN - or DHCP
System Statement of Health Response (SSoHR)
Win 7 - Win Vista - and Win XP SP3
44. NAP health validation takes place between two components:
System Health Agents (SHAs) - System Health Validators (SHVs)
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
An access control list (ACL) - A virtual local area network (VLAN)
monitoring-only
45. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
Network Access Protection (NAP)
Network Policy And Access Services
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
network access
46. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
health policy server
manually - domain controller
RD Gateway
Network Policy And Access Services
47. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
blocked by default
Remediation server group
802.1X - VPN - or DHCP
Win 7 - Win Vista - and Win XP SP3
48. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
User Interface Settings
Network Policy And Access Services
compliant - noncompliant
49. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
per-IP address or a per-TCP/UDP port number
System Health Validators (SHVs)
System health validators
Local IP Address
50. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
blocks any inbound traffic that hasn't been specifically allowed
per-IP address or a per-TCP/UDP port number
Connection request policy