Chapter 12 Flashcards

1
Q

Which technology is the most common to connect to a wireless network for a corporation that allows a data rate up to 54 MB/sec?

  1. 11a
  2. 11b
  3. 11g
  4. 11n
A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which tool set is designed specifically for mobile PCs?

Computer Management console

Mobile Management console

Windows Mobility Center

Computer Information Center

A

Windows Mobility Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What bundles together the configuration settings that users most often use when giving a presentation into a single switch?

Mobility on the Go

Presentation Settings

Mobile Show

Mobile Display

A

Presentation Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technology is used to configure power settings using the graphical control panel?

APM

ACPI

PIM

PS

A

ACPI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What component is used to ensure that all clients meet a minimum set of criteria such as up-to-date anti-virus protection and Windows updates?

VPN Reconnect

Network Access Protection

Remote App

Direct Access

A

Network Access Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_______________ enables remote users to automatically connect to the computer network whenever they have Internet access.

DirectAccess

BranchCache

Remote App

Network Access Protection

A

DirectAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which wireless technology is considered a weak encryption protocol?

802.1x

WEP

WPA

WPA2

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What replaced ActiveSync to synchronize data files, email, appointments, and contact information with the mobile devices?

Partner Sync Center

Sync Center

Windows Mobile Device Center

BitLocker

A

Windows Mobile Device Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the ability to configure all power settings in three ways, using graphical control panel settings, Group Policy, or the command prompt.

A

Advanced Configuration and Power Interface (ACPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Implemented in the WPA2 standard, AES uses a different and more secure encryption algorithm, called CCMP. However, while it is possible to upgrade some legacy WEP equipment to support WPA‐TKIP, most equipment cannot be upgraded to support AES. As a result, a wireless network will probably not be able to use AES encryption unless the organization chooses equipment that specifically supports it.

A

Advanced Encryption System (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a feature, first released in Windows Vista and now available in the Windows 7 Enterprise and Ultimate editions, that makes it possible to encrypt an entire volume.

A

BitLocker Drive Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card.

A

data recovery agent (DRA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

enabling clients to remain connected to their host networks whenever they have access to the Internet, reconnecting automatically whenever it is necessary.

A

DirectAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

dictate the frequencies, transmission speeds, and ranges of wireless networking products.

A

IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

enables a computer to reconnect to a VPN server automatically, after an interruption as long as eight hours. VPN only works with connections that use the IKEv2 protocol, which means that the client must be running Windows 7 and the remote access server must be running Windows Server 2008 R2.

A

IKEv2 Mobility and Multihoming (MOBIKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

standards publisher

A

Institute of Electrical and Electronic Engineers (IEEE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

New in Windows 7 and Windows Server 2008 R2, IKEv2 uses TCP port 500 and provides support for IPv6 and the new VPN Reconnect feature, as well as authentication by EAP, using PEAP, EAP‐MSCHAPv2, or smart cards.

A

Internet Key Exchange, Version 2 (IKEv2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a collection of IP extensions that provide additional security for network communications. DirectAccess relies on IPsec to authenticate users and computers and to encrypt data exchanged by clients and servers.

A

IPsec

19
Q

L2TP relies on the IP security extensions (IPsec) for encryption, and as a result performs a double encapsulation.

A

Layer 2 Tunneling Protocol (L2TP)

20
Q

increases wireless networking speeds by using multiple transmitter and receiver antennae on each device

A

multiple‐input multiple‐output (MIMO)

21
Q

a form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure.

A

Offline Files

22
Q

takes the place of the Ethernet protocol at the data‐link layer, by encapsulating the datagrams created by the Internet Protocol (IP) at the network layer, to prepare them for their transmission.

A

Point‐to‐Point Protocol (PPP)

23
Q

The oldest and least secure of the VPN protocols, PPTP takes advantage of the authentication, compression, and encryption mechanisms of PPP, tunneling the PPP frame within a Generic Routing Encapsulation (GRE) header and encrypting it with Microsoft Point‐to‐Point Encryption (MPPE) using encryption keys generated during the authentication process.

A

Point‐to‐Point Tunneling Protocol (PPTP)

24
Q

the default selection for new connections and the strongest password‐based mechanism in Windows 7, requires a certificate only at the server.

A

Secure Password (EAP‐MSCHAPv2)

25
Q

Introduced in Windows Server 2008 and supported only by clients running Windows Vista SP1 or later, SSTP encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol supported by virtually all web servers.

A

Secure Socket Tunneling Protocol (SSTP)

26
Q

The sending system splits its data into two signals for transmission, and the receiving device reassembles the signals into a single data stream.

A

spatial multiplexing

27
Q

Implemented in the original WPA standard, TKIP encrypts data using the RC4 algorithm with a 128‐bit key. This is the same algorithm as WEP, but TKIP virtually eliminates WEP’s most exploited vulnerability by using a unique encryption key for each packet.

A

Temporal Key Integrity Protocol (TKIP)

28
Q

functionally similar to the BranchCache except that each Windows 7 workstation has exclusive use of its own cache; it does not share the cached files with other clients.

A

transparent caching

29
Q

a dedicated cryptographic processor chip that the system uses to store the BitLocker encryption keys.

A

Trusted Platform Module (TPM)

30
Q

VPN clients and servers use a specialized protocol when establishing a connection, which encapsulates their data packets inside another packet

A

tunneling

31
Q

the remote client and the remote access server are both connected to the Internet, using local service providers.

A

virtual private network (VPN)

32
Q

enables a computer to reconnect to a VPN server automatically, after an interruption as long as eight hours. VPN only works with connections that use the IKEv2 protocol, which means that the client must be running Windows 7 and the remote access server must be running Windows Server 2008 R2.

A

VPN Reconnect

33
Q

inherently more secure than WEP, so they are usually preferable, but if the network has any devices that do not support WPA, you must either replace those devices or settle for WEP.WPA can use the same authentication mechanisms and encryption algorithms as WEP, which enables manufacturers to add support for WPA to existing products with a simple software or firmware upgrade.

A

WiFi Protected Access (WPA and WPA2)

34
Q

a wireless security protocol that helps protect transmitted information by using a security setting, called a shared secret or a shared key, to encrypt network traffic before sending it.

A

Wired Equivalent Privacy (WEP)

35
Q

Which of the following wireless networking standards uses spatial multiplexing to increase bandwidth?

a. IEEE 802.11b
b. IEEE 802.11g
c. IEEE 802.11n
d. IEEE 802.1X

A

c. IEEE 802.11n

36
Q

Which of the following wireless security protocols is the most secure?

a. WPA-TKIP
b. WEP (128-bit) with 802.1X authentication
c. WEP (128-bit)
d. WPA-AES

A

d. WPA-AES

37
Q

Which of the following is the most secure password-based authentication protocol supported by the VPN client in Windows 7?

a. EAP (PEAP)
b. EAP-MSCHAPv2
c. CHAP
d. POP

A

b. EAP-MSCHAPv2

38
Q

Which of the following BitLocker operational modes must you configure using Group Policy? (Choose all correct answers.)

a. TPM + startup PIN + startup key
b. TPM + startup key
c. TPM only
d. Startup key only

A

a. TPM + startup PIN + startup key

d. Startup key only

39
Q

Which of the following IPv6/IPv4 transition technologies takes the form of a hardware device?

a. ISATAP
b. 6to4
c. NAT-PT
d. Teredo

A

c. NAT-PT

40
Q

What is the main advantage of using DirectAccess over VPN connections?

a. Users don’t have to manually connect to the remote network.
b. DirectAccess uses IPv4 rather than IPv6.
c. DirectAccess supports more operating systems than VPNs.
d. DirectAccess connections are unidirectional.

A

a. Users don’t have to manually connect to the remote network.
b. DirectAccess uses IPv4 rather than IPv6.

41
Q

Which of the following is NOT a prerequisite for a DirectAccess server?

a. Membership in an AD DS domain
b. Two network interface adapters
c. Two consecutive, public IPv4 addresses
d. A NAT connection to the Internet

A

d. A NAT connection to the Internet

42
Q

Which of the following tools can you use to import and export power management plans in Windows 7?

a. Powercfg.exe and Group Policy
b. Power Options control panel only
c. Powercfg.exe only
d. Power Options control panel and Group Policy

A

c. Powercfg.exe only

43
Q

Transparent caching saves temporary copies of files based on which of the following criteria?

a. Number of requests for the file
b. User time limits
c. File size
d. Network roundtrip latency

A

d. Network roundtrip latency

44
Q

Which of the following steps in the DirectAccess connection establishment process occurs first?

a. The client and the DirectAccess server authenticate each other using their computer certificates.
b. The client attempts to connect to a designated network detection server on the intranet.
c. The client establishes a connection to the domain controller and performs a standard AD DS user authentication.
d. The client submits a health certificate to a Network Policy Server (NPS) on the host network.

A

b. The client attempts to connect to a designated network detection server on the intranet.