SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
DHCP servers
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
System Health Agents (SHAs) - System Health Validators (SHVs)
Statement of Health Response (SoHR)
2. A group of servers that noncompliant clients can access is a ______.
Remediation server group
per-IP address or a per-TCP/UDP port number
Netstat
scope
3. The NAP health policy server combines the SoHRs from the multiple SHVs into a ______.
do not filter
netsh nap client show state
System Health Agents (SHAs)
System Statement of Health Response (SSoHR)
4. NAP health validation takes place between two components:
Network policy
System Health Agents (SHAs) - System Health Validators (SHVs)
RADIUS
RD Gateway
5. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
per-IP address or a per-TCP/UDP port number
monitoring-only
logging
requirement policies
6. The firewall profiles are:
manually - domain controller
Domain - Private - Public
Network Access Protection (NAP)
scope
7. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
per-IP address or a per-TCP/UDP port number
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
drops
Testing - Monitoring - Limited access
8. Which versions of Windows can act as NAP clients?
Connection request policy
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
System health validators
noncompliant - compliant
9. The ______ enforcement type requires clients to perform a NAP health check before they can receive a health certificate.
compliant - noncompliant - and unauthenticated
System Statement of Health (SSoH)
IPsec connection security
netsh nap client show state
10. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
compliant - noncompliant - and unauthenticated
per-IP address or a per-TCP/UDP port number
Testing - Monitoring - Limited access
System Health Agents (SHAs)
11. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
domain controller
communicate only with other
requirement policies
health state
12. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
health policy server
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
Enforcement Clients - User Interface Settings - Health Registration Settings
Local IP Address
13. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
Enforcement Clients
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Connection request policy
Netstat
14. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
Win 7 - Win Vista - and Win XP SP3
RD Gateway
Local IP Address
802.1X - VPN - or DHCP
15. By default - all versions of Windows (including Win Srvr 2008 R2) ______ outbound traffic.
do not filter
System Health Validators (SHVs)
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
2008 (or Windows Server 2008 R2)
16. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Domain - Private - Public
Group Policy
Statement of Health Response (SoHR)
17. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
Testing - Monitoring - Limited access
remediation
SHA
noncompliant - compliant
18. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
blocks any inbound traffic that hasn't been specifically allowed
Health policy - health policies
compliant - noncompliant
SHA
19. You must enable one policy to configure clients to use this enforcement type.
Enforcement Clients
RADIUS
System Statement of Health Response (SSoHR)
System health validators
20. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
System Health Validators (SHVs)
System Statement of Health (SSoH)
compliant - noncompliant
netsh nap client show state
21. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
RD Gateway
Request Policy
netsh nap client show state
802.1X - VPN - or DHCP
22. NAP ______ allows you to identify noncompliant computers.
2008 (or Windows Server 2008 R2)
worms
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
logging
23. The NAP health policy server uses its installed SHVs and the health requirement policies that you have configured to determine whether the NAP client ______.
meets health requirements
domain controller
Domain - Private - Public
System Health Validators (SHVs)
24. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
monitoring-only
do not filter
firewalls
manually - domain controller
25. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
An access control list (ACL) - A virtual local area network (VLAN)
health policy server
logging
Network policy
26. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
domain controller
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Enforcement Clients
manually - domain controller
27. You can quickly verify a client's configuration by running the following command at a command prompt:
netsh nap client show state
Network Policy And Access Services
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
Request Policy
28. ______ enforcement does not provide remediation.
Trusted Server Group
firewalls
Win 7 - Win Vista - and Win XP SP3
RD Gateway
29. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
health policy server
per-IP address or a per-TCP/UDP port number
compliant - noncompliant - and unauthenticated
noncompliant - compliant
30. ______ is the most effective way to configure firewall settings for all computers in a domain.
firewalls
worms
Network Access Protection (NAP)
Group Policy
31. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
do not filter
Network Access Protection (NAP)
RADIUS
Request Policy
32. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
Trusted Server Group
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
System Health Validators (SHVs)
blocks any inbound traffic that hasn't been specifically allowed
33. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
firewalls
manually - domain controller
Win 7 - Win Vista - and Win XP SP3
User Interface Settings
34. A ______ determines whether a request should be processed by NPS.
do not filter
Connection request policy
Remote Desktop Gateways (RD Gateway).
blocked by default
35. The ______ are the server components that analyze the SoH generated by the SHA and create an SoH Response (SoHR).
Statement of Health Response (SoHR)
System Health Validators (SHVs)
firewalls
do not filter
36. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
Connection request policy
noncompliant - compliant
System Statement of Health (SSoH)
SoHR
37. The Domain firewall profile applies whenever a computer can communicate with its ______.
domain controller
User Interface Settings
GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration
An access control list (ACL) - A virtual local area network (VLAN)
38. Typically - a NAP deployment occurs in three phases:
scope
Testing - Monitoring - Limited access
2008 (or Windows Server 2008 R2)
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
39. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
remediation
network access
Testing - Monitoring - Limited access
System Health Agents (SHAs) - System Health Validators (SHVs)
40. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
scope
worms
A certification authority - A web application
41. The NAP health policy server sends the SSoHR back to the NAP client through the NAP enforcement point. The NAP enforcement point can now connect a ______ computer to the network or connect a ______ computer to a remediation network.
communicate only with other
DHCP servers
compliant - noncompliant
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
42. Installing the HRA role service configures the following:
A certification authority - A web application
SHA
User Interface Settings
per-IP address or a per-TCP/UDP port number
43. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
System Health Agents (SHAs)
2008 (or Windows Server 2008 R2)
Trusted Server Group
drops
44. You need to create outbound firewall rules only when you configure outbound connections to be ______.
Remote Desktop Gateways (RD Gateway).
VPN servers
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
blocked by default
45. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
blocked by default
Network Policy And Access Services
System Health Agents (SHAs)
RD Gateway
46. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
noncompliant - compliant
Enforcement Clients
meets health requirements
compliant - noncompliant
47. By default - Windows Firewall (as well as most other firewalls) ______.
48. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
manually - domain controller
blocked by default
SHA
802.1X access points
49. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
logging
per-IP address or a per-TCP/UDP port number
SoHR
IPsec connection security
50. ______ define which health checks a client must meet to be considered compliant.
System health validators
Network Policy And Access Services
Enforcement Clients
802.1X access points