Chapter 12 Flashcards
Which technology is the most common to connect to a wireless network for a corporation that allows a data rate up to 54 MB/sec?
- 11a
- 11b
- 11g
- 11n
802.11g
Which tool set is designed specifically for mobile PCs?
Computer Management console
Mobile Management console
Windows Mobility Center
Computer Information Center
Windows Mobility Center
What bundles together the configuration settings that users most often use when giving a presentation into a single switch?
Mobility on the Go
Presentation Settings
Mobile Show
Mobile Display
Presentation Settings
What technology is used to configure power settings using the graphical control panel?
APM
ACPI
PIM
PS
ACPI
What component is used to ensure that all clients meet a minimum set of criteria such as up-to-date anti-virus protection and Windows updates?
VPN Reconnect
Network Access Protection
Remote App
Direct Access
Network Access Protection
_______________ enables remote users to automatically connect to the computer network whenever they have Internet access.
DirectAccess
BranchCache
Remote App
Network Access Protection
DirectAccess
Which wireless technology is considered a weak encryption protocol?
802.1x
WEP
WPA
WPA2
WEP
What replaced ActiveSync to synchronize data files, email, appointments, and contact information with the mobile devices?
Partner Sync Center
Sync Center
Windows Mobile Device Center
BitLocker
Windows Mobile Device Center
the ability to configure all power settings in three ways, using graphical control panel settings, Group Policy, or the command prompt.
Advanced Configuration and Power Interface (ACPI)
Implemented in the WPA2 standard, AES uses a different and more secure encryption algorithm, called CCMP. However, while it is possible to upgrade some legacy WEP equipment to support WPA‐TKIP, most equipment cannot be upgraded to support AES. As a result, a wireless network will probably not be able to use AES encryption unless the organization chooses equipment that specifically supports it.
Advanced Encryption System (AES)
a feature, first released in Windows Vista and now available in the Windows 7 Enterprise and Ultimate editions, that makes it possible to encrypt an entire volume.
BitLocker Drive Encryption
a user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card.
data recovery agent (DRA)
enabling clients to remain connected to their host networks whenever they have access to the Internet, reconnecting automatically whenever it is necessary.
DirectAccess
dictate the frequencies, transmission speeds, and ranges of wireless networking products.
IEEE 802.11
enables a computer to reconnect to a VPN server automatically, after an interruption as long as eight hours. VPN only works with connections that use the IKEv2 protocol, which means that the client must be running Windows 7 and the remote access server must be running Windows Server 2008 R2.
IKEv2 Mobility and Multihoming (MOBIKE)
standards publisher
Institute of Electrical and Electronic Engineers (IEEE)
New in Windows 7 and Windows Server 2008 R2, IKEv2 uses TCP port 500 and provides support for IPv6 and the new VPN Reconnect feature, as well as authentication by EAP, using PEAP, EAP‐MSCHAPv2, or smart cards.
Internet Key Exchange, Version 2 (IKEv2)
a collection of IP extensions that provide additional security for network communications. DirectAccess relies on IPsec to authenticate users and computers and to encrypt data exchanged by clients and servers.
IPsec
L2TP relies on the IP security extensions (IPsec) for encryption, and as a result performs a double encapsulation.
Layer 2 Tunneling Protocol (L2TP)
increases wireless networking speeds by using multiple transmitter and receiver antennae on each device
multiple‐input multiple‐output (MIMO)
a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure.
Offline Files
takes the place of the Ethernet protocol at the data‐link layer, by encapsulating the datagrams created by the Internet Protocol (IP) at the network layer, to prepare them for their transmission.
Point‐to‐Point Protocol (PPP)
The oldest and least secure of the VPN protocols, PPTP takes advantage of the authentication, compression, and encryption mechanisms of PPP, tunneling the PPP frame within a Generic Routing Encapsulation (GRE) header and encrypting it with Microsoft Point‐to‐Point Encryption (MPPE) using encryption keys generated during the authentication process.
Point‐to‐Point Tunneling Protocol (PPTP)
the default selection for new connections and the strongest password‐based mechanism in Windows 7, requires a certificate only at the server.
Secure Password (EAP‐MSCHAPv2)
Introduced in Windows Server 2008 and supported only by clients running Windows Vista SP1 or later, SSTP encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol supported by virtually all web servers.
Secure Socket Tunneling Protocol (SSTP)
The sending system splits its data into two signals for transmission, and the receiving device reassembles the signals into a single data stream.
spatial multiplexing
Implemented in the original WPA standard, TKIP encrypts data using the RC4 algorithm with a 128‐bit key. This is the same algorithm as WEP, but TKIP virtually eliminates WEP’s most exploited vulnerability by using a unique encryption key for each packet.
Temporal Key Integrity Protocol (TKIP)
functionally similar to the BranchCache except that each Windows 7 workstation has exclusive use of its own cache; it does not share the cached files with other clients.
transparent caching
a dedicated cryptographic processor chip that the system uses to store the BitLocker encryption keys.
Trusted Platform Module (TPM)
VPN clients and servers use a specialized protocol when establishing a connection, which encapsulates their data packets inside another packet
tunneling
the remote client and the remote access server are both connected to the Internet, using local service providers.
virtual private network (VPN)
enables a computer to reconnect to a VPN server automatically, after an interruption as long as eight hours. VPN only works with connections that use the IKEv2 protocol, which means that the client must be running Windows 7 and the remote access server must be running Windows Server 2008 R2.
VPN Reconnect
inherently more secure than WEP, so they are usually preferable, but if the network has any devices that do not support WPA, you must either replace those devices or settle for WEP.WPA can use the same authentication mechanisms and encryption algorithms as WEP, which enables manufacturers to add support for WPA to existing products with a simple software or firmware upgrade.
WiFi Protected Access (WPA and WPA2)
a wireless security protocol that helps protect transmitted information by using a security setting, called a shared secret or a shared key, to encrypt network traffic before sending it.
Wired Equivalent Privacy (WEP)
Which of the following wireless networking standards uses spatial multiplexing to increase bandwidth?
a. IEEE 802.11b
b. IEEE 802.11g
c. IEEE 802.11n
d. IEEE 802.1X
c. IEEE 802.11n
Which of the following wireless security protocols is the most secure?
a. WPA-TKIP
b. WEP (128-bit) with 802.1X authentication
c. WEP (128-bit)
d. WPA-AES
d. WPA-AES
Which of the following is the most secure password-based authentication protocol supported by the VPN client in Windows 7?
a. EAP (PEAP)
b. EAP-MSCHAPv2
c. CHAP
d. POP
b. EAP-MSCHAPv2
Which of the following BitLocker operational modes must you configure using Group Policy? (Choose all correct answers.)
a. TPM + startup PIN + startup key
b. TPM + startup key
c. TPM only
d. Startup key only
a. TPM + startup PIN + startup key
d. Startup key only
Which of the following IPv6/IPv4 transition technologies takes the form of a hardware device?
a. ISATAP
b. 6to4
c. NAT-PT
d. Teredo
c. NAT-PT
What is the main advantage of using DirectAccess over VPN connections?
a. Users don’t have to manually connect to the remote network.
b. DirectAccess uses IPv4 rather than IPv6.
c. DirectAccess supports more operating systems than VPNs.
d. DirectAccess connections are unidirectional.
a. Users don’t have to manually connect to the remote network.
b. DirectAccess uses IPv4 rather than IPv6.
Which of the following is NOT a prerequisite for a DirectAccess server?
a. Membership in an AD DS domain
b. Two network interface adapters
c. Two consecutive, public IPv4 addresses
d. A NAT connection to the Internet
d. A NAT connection to the Internet
Which of the following tools can you use to import and export power management plans in Windows 7?
a. Powercfg.exe and Group Policy
b. Power Options control panel only
c. Powercfg.exe only
d. Power Options control panel and Group Policy
c. Powercfg.exe only
Transparent caching saves temporary copies of files based on which of the following criteria?
a. Number of requests for the file
b. User time limits
c. File size
d. Network roundtrip latency
d. Network roundtrip latency
Which of the following steps in the DirectAccess connection establishment process occurs first?
a. The client and the DirectAccess server authenticate each other using their computer certificates.
b. The client attempts to connect to a designated network detection server on the intranet.
c. The client establishes a connection to the domain controller and performs a standard AD DS user authentication.
d. The client submits a health certificate to a Network Policy Server (NPS) on the host network.
b. The client attempts to connect to a designated network detection server on the intranet.