Chapter 7 - Implement Network Connectivity and Remote Access Solutions Flashcards
You are the administrator for your company network. You have a Windows Server 2016 server named Server1 that will be used as a virtual private network (VPN) server. What VPN protocol should you use if you need to configure Server1 to support VPN Reconnect?
A. Internet Key Exchange Protocol Version 2 (IKEv2)
B. Layer 2 Tunneling Protocol (L2TP)
C. Point-to-Point Tunneling Protocol (PPTP)
D. Secure Socket Tunneling Protocol (SSTP)
A. VPN Reconnect uses the Internet Key Exchange v2 (IKEv2) tunneling protocol. VPN Reconnect can be used in conjunction with DirectAccess.
You are the administrator for your company network. You have a Windows Server 2016 server named Server1 that is located on the perimeter network and only uses inbound TCP port 443 to connect from the Internet. You install the Remote Access server role on Server1. You need to configure Server1 to accept VPN connections over port 443. Which VPN protocol should you use?
A. Internet Key Exchange Protocol Version 2 (IKEv2)
B. Layer 2 Tunneling Protocol (L2TP)
C. Point-to-Point Tunneling Protocol (PPTP)
D. Secure Socket Tunneling Protocol (SSTP)
D. Secure Socket Tunneling Protocol (SSTP) is a form of VPN tunnel that provides a mech- anism to transport Point-to-Point Protocol (PPP) traffic through a Secure Sockets Layer/ Transport Layer Security (SSL/TLS) channel. SSL/TLS provides transport-level security with key negotiation, encryption, and traffic integrity checking. The use of SSL/TLS over TCP port 443 allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.
You are the administrator for your company network. You create a VPN connection that has the VPN type set to Automatic. What VPN protocol will be used first when attempting to establish a VPN connection?
A. Internet Key Exchange Protocol Version 2 (IKEv2)
B. Layer 2 Tunneling Protocol (L2TP)
C. Point-to-Point Tunneling Protocol (PPTP)
D. Secure Socket Tunneling Protocol (SSTP)
A. Routing and Remote Access Service (RRAS) supports Internet Key Exchange version 2 (IKEv2), a VPN tunneling protocol. The primary advantage of IKEv2 is that it tolerates inter- ruptions in the underlying network connection. If the connection is temporarily lost, or if a user moves a client computer from one network to another, IKEv2 automatically restores the VPN after the network connection is reestablished without intervention on the part of the user.
You are the administrator for your company network. You have an Active Directory domain. The domain contains Windows Server 2016 servers named Server1 and Server2. On Server1, you install the Remote Access server role. On Server2, you install the Network Policy and Access Services server role. What should you do if you need
to configure Server1 to use Server2 as a Remote Authentication Dial-In User Service (RADIUS) server?
A. Configure the authentication provider from Routing and Remote Access.
B. Create a Connection Manager profile from the Connection Manager Administration
Kit.
C. Create an Access Policy from Server Manager.
D. Modify the Delegation settings of the Server1 computer account from Active Directory Users and Computers.
A. When you select the RADIUS Authentication option from the Authentication Provider drop-down menu, you are enabling a RADIUS client that passes authentication duties to a RADIUS server.
To configure a RADIUS server to be the authentication provider:
1. Open the Routing and Remote Access MMC snap-in.
2. Right-click the server name for which you want to configure RADIUS authentication and then click Properties.
3. On the Security tab, in Authentication Provider, click RADIUS Authentication and then click Configure.
4. In the RADIUS Authentication dialog box, click Add.
5. In the Add RADIUS Server dialog box, configure the settings for your RADIUS authen-
tication server and then click OK.
You are the administrator for your company network. The network contains one Active Directory domain named abc.com. You deploy DirectAccess on the network. During the deployment, you enable DirectAccess only for a group called ABC\Test Computers. What should you do if you need to enable DirectAccess for all the client computers in the domain after the initial installation?
A. Modify the membership of the Windows Authorization Access Group from Active Directory Users and Computers.
B. Modify the security filtering of an object named DirectAccess Client Setting Group Policy from Group Policy Management.
C. Run the Set-DAClient cmdlet using PowerShell.
D. Run the Set-DirectAccess cmdlet using PowerShell.
B. Deploying Remote Access requires a minimum of two Group Policy Objects: one Group Policy Object contains settings for the Remote Access server and one contains settings for DirectAccess client computers. When you configure Remote Access, the wizard automati- cally creates the required Group Policy Object. However, if your organization enforces a naming convention, or you do not have the required permissions to create or edit Group Policy Objects, they must be created prior to configuring Remote Access.
You are the administrator for your company network. Your network contains an Active Directory forest. The forest contains two domains named abc.com and xyz.com. The com- pany recently deployed DirectAccess for the members of a group named DA_Computers. All client computers are members of DA_Computers. You discover that DirectAccess clients can access the resources located in the abc.com domain only. The clients can access the resources in the xyz.com domain by using an L2TP VPN connection to the network. What should you do if you need to ensure that the DirectAccess clients can access the resources in the xyz.com domain?
A. Configure the Delegation settings from the properties of the servers in xyz.com.
B. Create a zone delegation for xyz.com on an external DNS server.
C. Modify the Name Resolution Policy Table (NRPT) from a Group Policy Object (GPO).
D. Add the servers in xyz.com to the RAS and IAS Servers group.
C. The Name Resolution Policy Table (NRPT) contains rules configured by an administra- tor for either names or namespaces and the settings for the required special handling. When performing a DNS name resolution, the DNS Client service compares the requested name against each rule in the NRPT before sending a DNS name query. Queries and responses that match an NRPT rule get the specified special handling applied. You can configure the NRPT with Group Policy.
You are the administrator for your company network. You have a Windows Server 2016 Remote Access server named Server1 that has DirectAccess enabled. You have a proxy server named Server2. All computers on the internal network connect to the Internet by using the proxy. You run the cmdlet Set-DAClient -forceTunnel Enabled on Server1. Which cmdlet should you run on Server1 if you need to ensure that when a DirectAccess client connects to the network the client accesses all the Internet resources through the proxy? A. Set-DAEntryPoint B. Set-DnsClientGlobalSetting C. Set-DnsClientNrptGlobal D. Set-DnsClientNrptRule
A. The Set-DAEntryPoint cmdlet configures entry point settings, including the name of the server in the entry point, the name of the entry point, and the IP address used for global load balancing on the specified entry point.
You are the administrator for your company network. You are discussing Remote Access Service (RAS) Gateway modes with a colleague. Which mode are you describing here? Deploy the RAS Gateway as an edge VPN server, an edge DirectAccess server, or both simultaneously. In this configuration, RAS Gateway provides remote employees with con- nectivity to your network by using either VPN or DirectAccess connections. A. Multitenant mode B. Single tenant mode C. Unattached tenant mode D. Remote tenant mode
B. In the single tenant mode, administrators can deploy RAS Gateways as an edge VPN server, an edge DirectAccess server, or both simultaneously. Using RAS Gateways this
way provides remote users with connectivity to your network by using either VPN or DirectAccess connections. Also, single tenant mode allows administrators to connect offices at different physical locations through the Internet.
You are the administrator for your company network. Your company has a main office
and has 1,000 users who are located in other countries. You plan to deploy a large Remote Access solution for the company. The main office has three Windows Server 2016 servers named Server1, Server2, and Server3. You plan to use Server1 as a VPN server, Server2 as
a RADIUS proxy, and Server3 as a RADIUS server. What actions should you perform on Server2 if you need to configure Server2 to support the planned deployment? (Choose three.)
A. Add a RADIUS client.
B. Create a connection request policy.
C. Create a network policy.
D. Create a remote RADIUS server group.
E. Deploy a Windows container.
A, B, D. To set up a RADIUS server, the components needed on the RADIUS server include the RADIUS client and a RADIUS group. Microsoft recommends that you set up RADIUS connection policies as well.
You are the administrator for your company network. Your network contains an Active Directory forest that has a functional level of Windows Server 2012. The forest contains five domain controllers and five VPN servers that run Windows Server 2016. The VPN server has 500 users who connect daily. What should you do first if you need to configure a new RADIUS server named Server1?
A. Deploy the Remote Access server role on Server1.
B. Set the forest functional level to Windows Server 2016 on a domain controller.
C. Deploy the Network Policy and Access Services role on Server1.
D. Run the New-NpsRadiusClient cmdlet on each VPN server.
C. Network Policy Server (NPS) is Microsoft’s solution for enforcing company-wide access policies, including remote authentication. NPS is a role service of the Network Policy
and Access Services (NPAS) server role. Other role services of NPAS are the Routing and Remote Access Service, Health Registration Authority, and Host Credential. These help you safeguard the health and security of a network.
You are the administrator for your company network. Your company has 5,000 remote users. You have 40 VPN servers that host the remote connections. You plan to deploy a RADIUS solution that contains five RADIUS servers. What should you do if you need to ensure that client authentication requests are distributed evenly among the RADIUS servers?
A. Install the Network Load Balancing (NLB) role service on all of the RADIUS servers and configure all of the RADIUS clients to connect to a virtual IP address.
B. Deploy a RADIUS proxy to a new server and configure all of the RADIUS clients to connect to the RADIUS proxy.
C. Deploy a RAS Gateway to a new server and configure all of the RADIUS clients to connect to the RAS Gateway.
D. Install the Failover Clustering role service on all of the RADIUS servers and configure all of the RADIUS clients to connect to the IP address of the cluster.
B. Use Network Policy Server (NPS) configured as a RADIUS proxy to load balance con- nection requests between multiple NPS servers or other RADIUS servers. On the NPS proxy, configure load balancing so that the proxy evenly distributes the connection requests among the RADIUS servers. This method of load balancing is best for medium and large organizations that have many RADIUS clients and servers.
You are the administrator for your company network. You have multiple servers that run Windows Server 2016 and are configured as VPN servers. You deploy a Network Policy Server (NPS) server named NPS1. What should you configure on NPS1 so that it will accept authentication requests from the VPN servers?
A. Add a connection request policy from Policies.
B. Add a remote RADIUS server group from RADIUS Clients and Servers.
C. Add RADIUS clients from RADIUS Clients and Servers.
D. Add a network policy from Policies.
C. When you add a new network access server (VPN server, wireless access point, authen- ticating switch, or dial-up server) to your network, you must add the server as a RADIUS client in NPS so that NPS is aware of and can communicate with the network access server. On the NPS server, in the NPS console, double-click RADIUS Clients and Servers.
You are the administrator for your company network. Your company has a Sales depart- ment. The network contains an Active Directory domain. The domain contains two top- level organizational units (OUs) named Sales_Computers, which contains the computer accounts, and Sales_Users, which contains the user accounts. You link a new Group Policy Object (GPO) named GPO1 to Sales_Computers. You need to deploy a VPN connection to all of the users who sign in to the Sales department computers. The users must be placed where?
A. Computer Configuration/Policies/Administrative Templates/Network/Network Connections
B. Computer Configuration/Preferences/Control Panel Settings/Network Options
C. User Configuration/Preferences/Control Panel Settings/Network Options
D. User Configuration/Policies/Administrative Templates/Network/Network Connections
C. Create a VPN connection for the users by following User Configuration/Preferences/ Control Panel Settings/Network Options.
You are the administrator for your company network. The company has employees who work remotely by using a VPN connection from their computers. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application using a public cloud. Some users report that every time they try to download the application by using Internet Explorer they receive a warning message that indicates the application could harm their computer. What should you do if you need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers?
A. Use the intranet website to publish the application.
B. Use the Windows Store to publish the application.
C. Use a public File Transfer Protocol (FTP) site to publish the application.
D. Using the Internet Explorer settings, instruct the employees to disable the SmartScreen Filter.
A. Intranet is the generic term for a collection of private computer networks within an organization. The intranet uses network technologies as a tool to facilitate communication between people or work groups to improve the data-sharing capability and overall knowl- edge base of an organization’s employees. The Internet utilizes standard network hardware and software technologies like Ethernet, Wi-Fi, TCP/IP, web browsers, and web servers. An organization’s intranet typically includes Internet access but is firewalled so that its comput- ers cannot be reached directly from the outside. Because all the users can connect via VPN, this would allow access to the intranet website and the published application.
You are the administrator for your company network. Which Control Panel application should you use if you need to change the password used for an L2TP VPN connection? A. Credential Manager B. System C. Network and Sharing Center D. Phone and Modem E. Power Options F. RemoteApp and Desktop Connections G. Sync Center H. Work Folders
C. The Control Panel application from which most of the networking settings and tasks can be launched is the Network and Sharing Center. The Network and Sharing Center is one of the most important Control Panel apps for managing your network connections.
You are the administrator for your company network. Your company has 100 client com- puters. The client computers are connected to a corporate private network. You deploy
a Remote Desktop Gateway, DirectAccess, and a VPN server at the main office. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop. You need to ensure that users can remotely connect to their office computers by using Remote Desktop. What should you configure if the users must not be able to access any other corporate network resource from their home computers?
A. A VPN connection
B. The Remote Desktop Gateway IP address in the advanced Remote Desktop Connection
settings on each client
C. The local resource settings of the Remote Desktop connection
D. A DirectAccess connection
B. The solution is to deploy Remote Desktop Gateway in the office. Remote users can then connect to their computers on the office network by using Remote Desktop client on their home computers configured with the IP address of the Remote Desktop Gateway. Remote Desktop Gateway (RD Gateway) is a role service that enables authorized remote users to con- nect to resources on an internal corporate or private network, from any Internet-connected device that can run the Remote Desktop Connection (RDC) client. VPN connections would enable remote access to the office network, but this solution would not prevent users from accessing other corporate network resources. Remote Desktop local resources determine which local resources (printers, drives, etc.) are available in a Remote Desktop connection. However, this solution makes no provision for actually connecting to the office network. DirectAccess connections would enable remote access to the office network, but this solution would not prevent users from accessing other corporate network resources.
You are the administrator for your company network. Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols. A user named Sue works from home and has a desktop computer. She has an application named App1 that requires access to a server on the corporate network. She creates a VPN connection on the computer. What should you do if you need to ensure that, when Sue opens App1, she can access the required data?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnectionTriggerApplication cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
D. The Add-VpnConnectionTriggerApplication cmdlet adds applications to a VPN con- nection object. The applications automatically trigger a VPN connection when launched. This setting allows App1 to automatically request the VPN connection to ensure it can access the required data.
You are the administrator for your company network. Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols. A user named User1 creates an SSTP VPN connection to a network named VPN1. User1 successfully connects to the VPN server. When the user roams between dif- ferent Wi-Fi access points, the user loses the connection to the corporate network and must manually reestablish the VPN connection. What should you do if you need to ensure that VPN1 automatically maintains the connection while the user roams between Wi-Fi access points?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnection Trigger Application cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
H. The Set-VpnConnection cmdlet changes the configuration settings of an existing VPN connection profile. If the VPN profile specified does not exist, you see an error. If errors occur when you modify the VPN profile, the cmdlet returns the error information.
You are the administrator for your company network. Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols. You have mobile devices and have a VPN connection to the VPN server. What should you do if you need to ensure that when users work remotely they can connect to the VPN, and that only traffic for the corporate network is sent through the VPN server?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnection Trigger Application cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
E. The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer. The -Direction parameter specifies that matching firewall rules of the indicated direction are created. This parameter specifies which direc- tion of traffic to match with this rule. The acceptable values for this parameter are Inbound or Outbound. The default value is Inbound.
You are the administrator for your company network. A user connects to a wireless net- work and receives the following message: “Do you want to allow your PC to be discover- able by other PCs and devices on this network?” The user clicks No. The user is unable
to browse to the shared folders of other computers on the network by using File Explorer. What should you do if you need to ensure that the user can browse to the other computers?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnection Trigger Application cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
D. The Add-VpnConnectionTriggerApplication cmdlet adds applications to a VPN con- nection object. The applications automatically trigger a VPN connection when launched. This setting allows App1 to automatically request the VPN connection to ensure it can access the required data.
You are the administrator for your company network. Your network contains a single Active Directory domain. What should you do if you need to prevent computers from connecting to hosts on subnet 131.107.0.0/24?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnection Trigger Application cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
E. The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer. The -Direction parameter specifies that matching firewall rules of the indicated direction are created. This parameter specifies which direc- tion of traffic to match with this rule. The acceptable values for this parameter are Inbound or Outbound. The default value is Inbound.
You are the administrator for your company network. You have a Windows Server 2016 server named Server1. What should you install on Server1 if you need to configure Server1 as a multitenant RAS Gateway?
A. The Network Controller server role
B. The Network Policy and Access Services server role C. The Data Center Bridging feature
D. The Remote Access server role
D. Remote Access is a server role that provides administrators with a dashboard for man- aging, configuring, and monitoring network access. The Remote Access server role is a logi- cal grouping of Remote Access Service (RAS), Routing, and Web Application Proxy. These technologies are the role services of the Remote Access server role. When you install the Remote Access server role with the Add Roles and Features Wizard or with Windows Pow- erShell, you can install one or more of these role services.
You are the administrator for your company network. You are planning to implement a VPN. You currently have the following servers:
DC1 – Domain Controller and DNS Server
FS1 – DHCP Server and File Server
RA1 – Remote Access Server
RS1 – Network Policy Server (NPS) Server RP1 – Network Policy Server (NPS) Server
RA1 will use the RADIUS proxy for authentication. You need to ensure that VPN clients can be authenticated and can access internal resources. What actions should you perform if you need to ensure that RS1 is used as a RADIUS server and RP1 is used as a RADIUS proxy? (Choose two.)
A. On RS1, create a connection request policy.
B. On RP1, create a connection request policy.
C. On FS1, create a network policy.
D. On RS1, delete the default connection request policy.
E. On RP1, create a network policy.
B, D. Connection request policies are sets of conditions and settings that allow admin- istrators to designate which RADIUS servers authenticate and authorize the connection requests that the server running Network Policy Server (NPS) receives from the RADIUS clients. The default connection request policy uses NPS as a RADIUS server and processes all authentication requests locally. If you do not want the NPS server to act as a RADIUS server and process connection requests locally, you can delete the default connection request policy.
You are the administrator for your company network. You support desktop computers and tablets that run an older version of Windows. All of the computers are able to connect to your company network from the Internet by using DirectAccess. Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:
- The application is isolated from other applications.
- The application uses the least amount of disk space on the tablet.
- The application can access files stored on an internal Solid State Drive (SSD) on the tablets.
What should you do if you need to deploy the new application to the tablets? A. Install the application in a Windows To Go workspace.
B. Install Hyper-V on a tablet and then install the application on a virtual machine.
C. Deploy the application as an Application Virtualization (App-V) package and install
the App-V 4.6 client on the tablets.
D. Install the application on a local drive on the tablets.
E. Publish the application to Windows Store.
F. Install the application within a separate installation in a virtual hard disk (VHD) file and then configure the tablets with dual boot.
G. Deploy the application as a published application on the Remote Desktop server and create a Remote Desktop connection on the tablets.
H. Install the application within a separate installation in a VHDX file and then configure tablets with dual boot.
G. Deploying the application as a published application on the Remote Desktop server will use no disk space on the tablets. Users will be able to access the application by using Remote Desktop Connections. This will also ensure that the application is isolated from other applications on the tablets. You can use Remote Desktop Connection “redirection” to ensure that the application can access files stored on an internal SSD on the tablets. The redirection enables access to local resources such as drives and printers in a Remote Desk- top Connection.
You are the administrator for your company network. You have a Windows Server 2016 server named Server1 that is configured as a VPN server. Server1 is configured to allow domain users to establish VPN connections from 6:00 a.m. to 6:00 p.m. every day of the week. What should you do if you need to ensure that domain users can establish VPN connections Monday through Friday only?
A. Configure the Properties of Server1 from Routing and Remote Access.
B. Modify the Access Policies on Server1 from Server Manager.
C. Modify the Dial-in Properties of the computer accounts from Active Directory Users and Computers.
D. Modify the Network Policy on Server1 from Network Policy Server.
B. Access policies are a list of roles and the resources with which roles are to be provi- sioned or deprovisioned. Access policies are used to automate the provisioning of target systems to users.
You are the administrator for your company network. You have a DirectAccess server that is accessible by using the name directaccess.abc.com. On the DirectAccess server you install a new server certificate that has the same subject name. You then configure the DNS records for directaccess.abc.com. What cmdlet should you run if you need to change the endpoint name for DirectAccess to directaccess.abc.com?
A. Set-DaServer -ConnectToAddress directaccess.abc.com
B. Set-DaEntryPoint -EntrypointName directaccess.abc.com
C. Set-DaEntryPoint -ComputerName directaccess.abc.com
D. Set-DaClient -ComputerName directaccess.abc.com
D. The Set-DAClient cmdlet configures the properties related to a DirectAccess (DA) cli- ent. The -ComputerName parameter specifies the IPv4 or IPv6 address, or host name, of the computer on which the Remote Access server computer–specific tasks should be run.
You are the administrator for your company network. You are deploying DirectAccess to a server named DirectAccess1. DirectAccess1 will be located behind a firewall and will have a single network adapter. The network will be IPv4. To support DirectAccess, what proto- col and port would you assign to Teredo traffic?
A. Internet Protocol (IP) ID 1
B. Internet Protocol (IP) ID 41
C. Transmission Control Protocol (TCP) 443 D. User Datagram Protocol (UDP) 3544
D. Teredo traffic uses UDP port 3544. UDP Port 3544 must be open to ensure that Teredo clients can successfully communicate with the Teredo server.
You are the administrator for your company network. You are deploying DirectAccess to a server named DirectAccess1. DirectAccess1 will be located behind a firewall and will have a single network adapter. The network will be IPv4. To support DirectAccess, what proto- col and port would you assign to 6to4 traffic?
A. Internet Protocol (IP) ID 1
B. Internet Protocol (IP) ID 41
C. Transmission Control Protocol (TCP) 443
D. User Datagram Protocol (UDP) 3544
Y B. 6to4 traffic uses Internet Protocol (IP) ID 41. 6to4 is a special usage of protocol 41. A 6to4 address starts with the digits 2002, followed by the IPv4 address of its router. Here’s an example of a 6to4 address: 2002:CB00:71FF:0:fe64:3486:d398:3346.
You are the administrator for your company network. You are deploying DirectAccess to a server named DirectAccess1. DirectAccess1 will be located behind a firewall and will have a single network adapter. The network will be IPv4. To support DirectAccess, what proto- col and port would you assign to IP-HTTPS traffic?
A. Internet Protocol (IP) ID 1
B. Internet Protocol (IP) ID 41
C. Transmission Control Protocol (TCP) 443
D. User Datagram Protocol (UDP) 3544
C. Internet Protocol - Hypertext Transfer Protocol Secure (IP-HTTPS) traffic uses Trans- mission Control Protocol (TCP) 443. HTTPS URLs begin with https:// and use port 443. HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network and is widely used on the Internet.
You are the administrator for your company network. You are configuring the network for a small branch office. Currently, the branch office does not connect directly to the Internet. You deploy a new server named Server1, in the branch office, that has a Server Core installation of Windows Server 2016. Server1 has two network adapters configured as:
Network Adapter Name IP Address Connects To
NIC1 192.168.1.1/24 The branch office network
NIC2 131.107.10.1/29 The Internet
You plan to use Server1 to provide Internet connectivity for the branch office. Routing and Remote Access Service (RRAS) is installed and configured for VPN remote access on Server1. What command or cmdlet should you use first if you need to configure RRAS on Server1 to provide Network Address Translation (NAT)?
A. New-NetNat NAT1 –ExternalIPInterfaceAddressPrefix 131.107.10.1/29
B. Route.exe add 192.168.1.1 255.255.255.0 131.107.10.1 metric 1
C. Enable-NetNatTransitionConfiguration
D. Netsh.exe routing ip nat install
B. The route.exe command is an MS-DOS executable for Windows. It is used to block IP connections to the system by adding IP addresses to a routing table. The syntax is
Route [command] [destination] [subnet mask] [gateway] [metric].
add: Adds a route. destination: Specifies the host.
subnet mask: Specifies the subnet mask value for the route entry. The default is 255.255.255.255.
gateway: Specifies the gateway.
metric: Specifies the metric (the cost for the destination). Metrics are cost values used by
routers to determine the best path to a destination network.
You are the administrator for your company network. You have an internal network that contains multiple subnets. You have a Microsoft Azure subscription that contains multiple virtual networks. You need to deploy a hybrid routing solution between the network and the Azure subscription. The solution must ensure that the computers on all of the networks can connect to each other. You install RAS Gateway and enable Border Gateway Protocol (BGP) routing on the network and in Azure. What three actions should you perform next?
A. Create a new route for each network.
B. Deploy a site-to-site VPN.
C. Advertise all of the routes on all of the BGP routers.
D. Deploy a point-to-site VPN.
E. Install the Routing Information Protocol (RIP).
F. Configure BGP Peering.
B, C, F. In order, you would want to deploy a site-to-site VPN, configure BGP Peering, and then advertise all of the routes on all of the BGP routers. A site-to-site VPN connec- tion lets branch offices use the Internet as a means for accessing the main office’s intranet. BGP is the standard routing protocol commonly used on the Internet to exchange routing and reachability information between two or more networks. BGP enables the Azure VPN gateways and your on-premises VPN devices, called BGP peers or neighbors, to exchange “routes” that will inform both gateways on the availability and reachability of those pre- fixes to go through the gateways or routers. For each prefix in the routing table, the routing protocol process selects a single best path, called the active path. Unless you configure BGP to advertise multiple paths to the same destination, BGP advertises only the active path. Peering is a process by which two Internet networks connect and exchange traffic. It allows them to directly hand off traffic between each other’s customers, without having to pay a third party to carry that traffic across the Internet for them.
You are the administrator for your company network. Your client computers use DirectAccess. What should you implement on the client computers if you need to ensure that the client computers can communicate to IPv4 resources by name?
are the administrator for your company network. Your client computers use
A. AAAA (Quad A) resource records
B. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
C. NAT64/DNS64
D. Teredo relays
E. Teredo tunnels
C. NAT64 is an IPv6 transition mechanism that facilitates communication between IPv6 and IPv4 hosts by using a form of Network Address Translation (NAT). The NAT64 gate- way is a translator between IPv4 and IPv6 protocols. It needs at least one IPv4 address and an IPv6 network segment comprising a 32-bit address space. DNS64 describes a DNS server that synthesizes the AAAA records from the A records. The first part of the synthe- sized IPv6 address points to an IPv6/IPv4 translator, and the second part embeds the IPv4 address from the A record. The translator in question is usually a NAT64 server.
You are the administrator for your company network. You and a colleague are discussing Border Gateway Protocol (BGP). What PowerShell cmdlet would you use to see the configu- ration information for your BGP routers?
A. Add-BgpClient
B. Get-BgpRouter
C. Get-Router
D. Set-RouterClient
B. The Get-BgpRouter PowerShell cmdlet allows you to see the configuration information
for BGP routers.
You are the administrator for your company network. What PowerShell cmdlet would you use if you need to see a list of client security groups that are a part of the DirectAccess deployment? A. Get-Client B. Get-DAClient C. Get-VpnClient D. Get-RASClient
B. The Get-DAClient cmdlet allows you to see the list of client security groups that are part of the DirectAccess deployment and the client properties.
You are the administrator for your company network. Your network contains an Active Directory domain. Network Access Protection (NAP) is deployed to the domain. What should you run if you need to create NAP event trace log files on a client computer? A. Logman B. Register-EngineEvent C. Register-ObjectEvent D. Tracert
A. The logman.exe utility can be used to create and manage Event Trace Session and Per- formance logs and allows an administrator to monitor many different applications through the use of the command line.
You are the administrator for your company network. You and a colleague are discussing DirectAccess and VPN servers. What PowerShell cmdlet would you use to view the configu- ration of a DirectAccess or VPN server? A. Get-RASAccess B. Get-RemoteAccess C. Get-Server D. View-Server
B. The Get-RemoteAccess cmdlet shows the configuration of a DirectAccess and VPN server.