SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Configuring Windows Firewall And Network Access Protection
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Private profile must be ______ applied to a network. The Public profile applies any time a ______ is not available - and a network has not been configured as Private.
Remote Desktop Gateways (RD Gateway).
manually - domain controller
health policy server
SHA
2. By default - Windows Firewall (as well as most other firewalls) ______.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. ______ define which health checks a client must meet to be considered compliant.
System health validators
802.1X - VPN - or DHCP
manually - domain controller
RD Gateway
4. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
DHCP servers
compliant - noncompliant - and unauthenticated
Enforcement Clients
logging
5. Use the ______ snap-in to create an inbound firewall rule that allows a server application to receive incoming connections.
noncompliant - compliant
Windows Firewall With Advanced Security
blocks any inbound traffic that hasn't been specifically allowed
SoHR
6. Which versions of Windows can act as NAP clients?
RADIUS
Local IP Address
Health policy - health policies
Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.
7. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
Connection request policy
compliant client computers
RD Gateway
System health validators
8. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
Request Policy
Win 7 - Win Vista - and Win XP SP3
System Health Agents (SHAs)
network access
9. To install NAP - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
per-IP address or a per-TCP/UDP port number
RD Gateway
Network Policy And Access Services
802.1X - VPN - or DHCP
10. NAP depends on a Win Server 2008 or Win Server 2008 R2 NAP health policy server - which acts as a ______ server - to evaluate the health of client computers.
logging
compliant - noncompliant
requirement policies
RADIUS
11. ______ is the most effective way to configure firewall settings for all computers in a domain.
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
Group Policy
logging
User Interface Settings
12. NAP health validation takes place between two components:
802.1X access points
drops
System Health Agents (SHAs) - System Health Validators (SHVs)
communicate only with other
13. A group of servers that noncompliant clients can access is a ______.
DHCP servers
Remediation server group
do not filter
System health validators
14. The only time you would want to configure the scope using the ______ group is when the computer is configured with multiple IP addresses - and you do not want to accept connections on all IP addresses.
compliant - noncompliant
manually - domain controller
Local IP Address
System Health Agents (SHAs) - System Health Validators (SHVs)
15. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
firewalls
netsh nap client show state
System health validators
scope
16. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
System Health Validators (SHVs)
compliant - noncompliant
A certification authority - A web application
SHA
17. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
Network Policy And Access Services
logging
Request Policy
RADIUS
18. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
VPN servers
A certification authority - A web application
Local IP Address
802.1X access points
19. Use the ______ subnode to configure an HRA for IPsec NAP clients to use.
Trusted Server Group
monitoring-only
manually - domain controller
Remediation server group
20. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
Netstat
System Health Agents (SHAs)
Enforcement Clients - User Interface Settings - Health Registration Settings
manually - domain controller
21. Installing the HRA role service configures the following:
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
compliant client computers
System Health Agents (SHAs) - System Health Validators (SHVs)
A certification authority - A web application
22. In the case of _____ - automated software attacks computers across the Internet - gains elevated privileges - copies itself to the compromised computer - and then begins attacking other computers (typically at random).
domain controller
DHCP servers
worms
User Interface Settings
23. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
SoHR
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
System health validators
Netstat
24. The Domain firewall profile applies whenever a computer can communicate with its ______.
Network Policy And Access Services
domain controller
logging
communicate only with other
25. IPsec enforcement requires a CA running Win Server ______ or ________ Certificate Services and NAP to support health certificates.
RD Gateway
Remote Desktop Gateways (RD Gateway).
2008 (or Windows Server 2008 R2)
logging
26. This installs the core NPS service - which is sufficient for using the Win Server 2008 computer as a RADIUS server for ______ - ______ - or ______ enforcement.
802.1X - VPN - or DHCP
Win 7 - Win Vista - and Win XP SP3
compliant - noncompliant
Network Policy And Access Services
27. For NAP to work - a network component must enforce NAP by either allowing or denying network access. The following list describes the different NAP enforcement types you can use:
health policy server
Remote Desktop Gateways (RD Gateway).
logging
Domain - Private - Public
28. Typically - you apply an ACL to ______ computer connections and allow ______ computers to connect without an ACL (thus granting them unlimited network access).
Health policy - health policies
System Health Agents (SHAs)
Testing - Monitoring - Limited access
noncompliant - compliant
29. NAP is designed to connect hosts to different network resources depending on their current ______.
per-IP address or a per-TCP/UDP port number
firewalls
health policy server
health state
30. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
remediation
System Health Agents (SHAs)
health state
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
31. With VPN server enforcement enabled - only ______ are granted unlimited network access.
802.1X - VPN - or DHCP
Network Access Protection (NAP)
compliant client computers
System health validators
32. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
2008 (or Windows Server 2008 R2)
logging
VPN servers
Trusted Server Group
33. Each SHA on the NAP client validates its system health and generates an SoH. The NAP client combines the SoHs from multiple SHAs into a ______ - which includes version info for the NAP client and the set of SoHs for the installed SHAs.
noncompliant - compliant
remediation
communicate only with other
System Statement of Health (SSoH)
34. You must enable one policy to configure clients to use this enforcement type.
RD Gateway
RADIUS
System health validators
Enforcement Clients
35. The NAP client sends the SSoH to the NAP ______ through the NAP enforcement point.
Trusted Server Group
An access control list (ACL) - A virtual local area network (VLAN)
System Health Agents (SHAs) - System Health Validators (SHVs)
health policy server
36. When deploying NAP - plan to implement it in ______ mode first. This will allow you to identify and fix noncompliant computers before preventing them from connecting to your network.
monitoring-only
Domain - Private - Public
Enforcement Clients
SoHR
37. You can configure client NAP settings using the three subnodes:
Connection request policy
do not filter
Enforcement Clients - User Interface Settings - Health Registration Settings
An access control list (ACL) - A virtual local area network (VLAN)
38. You need to create outbound firewall rules only when you configure outbound connections to be ______.
blocked by default
per-IP address or a per-TCP/UDP port number
requirement policies
drops
39. Each SHV produces a _____ - which can contain remediation instructions (such as the version number of an antivirus signature file) if the client doesn't meet that SHV's health requirements.
Statement of Health Response (SoHR)
scope
Health policy - health policies
SoHR
40. To install HRA - first install the ______ role - then select the Network Policy Server check box on the Select Role Services page.
Enforcement Clients
firewalls
Group Policy
Network Policy And Access Services
41. If an application must accept incoming connections but the developers have not documented the communication ports that the application uses - you can use the ______ tool to identify which ports the application listens on.
SoHR
Netstat
network access
blocks any inbound traffic that hasn't been specifically allowed
42. A health requirement policy is a combination of the following:
drops
Enforcement Clients - User Interface Settings - Health Registration Settings
Windows Firewall With Advanced Security
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
43. Which NAP enforcement types do not require support from your network infrastructure?
remediation
meets health requirements
health policy server
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
44. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.
System Health Validators (SHVs)
SHA
communicate only with other
45. IPsec enforcement allows you to require health compliance on a ______ or a ______ basis.
Netstat
Remediation server group
compliant client computers
per-IP address or a per-TCP/UDP port number
46. One of the most powerful ways to increase computer security is to configure firewall ______.
Network policy
scope
network access
System Statement of Health Response (SSoHR)
47. 802.1X enforcement uses one of two methods to control which level of access compliant - noncompliant - and unauthenticated computers receive:
System Health Agents (SHAs) - System Health Validators (SHVs)
manually - domain controller
drops
An access control list (ACL) - A virtual local area network (VLAN)
48. You can quickly verify a client's configuration by running the following command at a command prompt:
netsh nap client show state
Connection request policy
monitoring-only
System Health Validators (SHVs)
49. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
DHCP servers
Connection request policy - System health validators - Remediation server group - Health policy - Network policy
drops
Trusted Server Group
50. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
VPN servers
Win 7 - Win Vista - and Win XP SP3
RADIUS
scope