MCTS: Configuring Windows Firewall And Network Access Protection MCQs

MCTS: Configuring Windows Firewall And Network Access Protection MCQs

Our experts have gathered these MCTS: Configuring Windows Firewall And Network Access Protection MCQs through research, and we hope that you will be able to see how much knowledge base you have for the subject of MCTS: Configuring Windows Firewall And Network Access Protection by answering these 30 multiple-choice questions.
Get started now by scrolling down!

1: Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.

A.   SHA

B.   Network Policy And Access Services

C.   An access control list (ACL) - A virtual local area network (VLAN)

D.   Statement of Health Response (SoHR)

2: Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).

A.   Request Policy

B.   Requirement policies

C.   Blocked by default

D.   Connection request policy - System health validators - Remediation server group - Health policy - Network policy

3: Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.

A.   Noncompliant - compliant

B.   Group Policy

C.   SoHR

D.   Logging

4: Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.

A.   User Interface Settings

B.   System health validators

C.   Win 7 - Win Vista - and Win XP SP3

D.   GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration

5: NAP health validation takes place between two components:

A.   Communicate only with other

B.   RD Gateway

C.   System Health Agents (SHAs) - System Health Validators (SHVs)

D.   SHA

6: A health requirement policy is a combination of the following:

A.   Scope

B.   Connection request policy - System health validators - Remediation server group - Health policy - Network policy

C.   RADIUS

D.   Logging

7: A ______ determines whether a request should be processed by NPS.

A.   Connection request policy

B.   System health validators

C.   Logging

D.   Network Policy And Access Services

8: ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.

A.   Noncompliant - compliant

B.   Network Access Protection (NAP)

C.   Win 7 - Win Vista - and Win XP SP3

D.   Enforcement Clients - User Interface Settings - Health Registration Settings

9: With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.

A.   Trusted Server Group

B.   DHCP servers

C.   Health policy server

D.   Remediation

10: The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.

A.   SHA

B.   Testing - Monitoring - Limited access

C.   802.1X access points

D.   Request Policy

11: ______ define which health checks a client must meet to be considered compliant.

A.   RD Gateway

B.   IPsec connection security - DHCP - and VPN enforcement do not require support from your network infrastructure.

C.   System health validators

D.   Compliant - noncompliant - and unauthenticated

12: The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.

A.   SoHR

B.   2008 (or Windows Server 2008 R2)

C.   A certification authority - A web application

D.   System Health Validators (SHVs)

13: The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.

A.   Network access

B.   GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration

C.   Connection request policy - System health validators - Remediation server group - Health policy - Network policy

D.   System Health Agents (SHAs)

14: If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.

A.   Per-IP address or a per-TCP/UDP port number

B.   Communicate only with other

C.   Remediation

D.   Network access

15: With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.

A.   DHCP servers

B.   Compliant - noncompliant

C.   Requirement policies

D.   Worms

16: The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.

A.   DHCP servers

B.   Connection request policy

C.   Noncompliant - compliant

D.   Windows Firewall With Advanced Security

17: Installing the HRA role service configures the following:

A.   A certification authority - A web application

B.   Request Policy

C.   Meets health requirements

D.   Network policy

18: The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.

A.   Compliant client computers

B.   802.1X access points

C.   Network Policy And Access Services

D.   VPN servers

19: Typically - a NAP deployment occurs in three phases:

A.   Monitoring-only

B.   Enforcement Clients

C.   Testing - Monitoring - Limited access

D.   System Health Agents (SHAs)

20: VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.

A.   Remediation

B.   Network Access Protection (NAP)

C.   System Health Agents (SHAs) - System Health Validators (SHVs)

D.   Compliant - noncompliant - and unauthenticated

21: You can also use IPsec connection security to allow healthy computers to ______ healthy computers.

A.   System health validators

B.   Communicate only with other

C.   802.1X - VPN - or DHCP

D.   System Health Agents (SHAs) - System Health Validators (SHVs)

22: The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.

A.   Blocked by default

B.   An access control list (ACL) - A virtual local area network (VLAN)

C.   RD Gateway

D.   Drops

23: Which versions of Windows can act as NAP clients?

A.   Do not filter

B.   Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.

C.   Statement of Health Response (SoHR)

D.   Compliant - noncompliant

24: Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.

A.   Compliant client computers

B.   User Interface Settings

C.   Remediation

D.   Requirement policies

25: You need to create outbound firewall rules only when you configure outbound connections to be ______.

A.   Blocked by default

B.   Manually - domain controller

C.   RD Gateway

D.   2008 (or Windows Server 2008 R2)

26: After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.

A.   GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration

B.   Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.

C.   802.1X access points

D.   Network Policy And Access Services

27: Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.

A.   GPO settings in the Computer ConfigurationPoliciesWindows SettingsSecurity SettingsNetwork Access ProtectionNAP Client Configuration

B.   Requirement policies

C.   User Interface Settings

D.   Blocks any inbound traffic that hasn't been specifically allowed

28: If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.

A.   Remediation server group

B.   RD Gateway

C.   Communicate only with other

D.   User Interface Settings

29: You can quickly verify a client's configuration by running the following command at a command prompt:

A.   Connection request policy - System health validators - Remediation server group - Health policy - Network policy

B.   Netsh nap client show state

C.   Firewalls

D.   Remediation server group

30: In networking - ______ analyze communications and drop packets that haven't been specifically allowed.

A.   Network Policy And Access Services

B.   Noncompliant - compliant

C.   Win XP SP3 - Win Vista - Win 7 - Win Server 2008 - and Win Server 2008 R2.

D.   Firewalls