Final Flashcards
What kind of RADIUS server is placed between the RADIUS server and RADIUS clients?
a RADIUS client server
a RADIUS engine server
a RADIUS proxy server
a RADIUS relay server
a RADIUS proxy server
What is a RADIUS server known as in Microsoft parlance?
Network Access Server
Network Policy Server
Network Authentication Server
Network Remote Access Server
Network Policy Server
When an access client contacts a VPN server or wireless access point, a connection request is sent to what system?
the NPS server
the 802.1X switch
an authorization relay
an access client
the NPS server
What is the final step in the authentication, authorization, and accounting scenario between an access client and the RADIUS server?
a log entry that the connection is established
an Access-Reject message to the access server
a final credential check with the domain controller
an Accounting-Response to the access server
an Accounting-Response to the access server
Which parameter specifies the order of importance of the RADIUS server to the NPS proxy server?
relay link number
weight
precedence
priority
priority
What information does the Accounting-Start message contain?
the RADIUS server name and IP address
the type of service and the user it’s delivered to
the list of permissions granted to the user
the list of services provided to RADIUS access servers
the type of service and the user it’s delivered to
What type of NPS authentication is recommended over password authentication?
certificate
complex
biometric
PAP2
certificate
Where do you get certificates for authentication purposes
Microsoft
the computer manufacturer
a certificate authority
a certificate broker
a certificate authority
What would be the biggest problem with configuring text files for accounting logging?
Space; filling up the C drive has catastrophic effects.
Logs are saved as plain text format.
Data isn’t sent to a SQL Server database.
Writing logs to disk requires disk I/O, which might impact performance.
Space; filling up the C drive has catastrophic effects.
An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity?
who, what, and where
who, when, and how
who, when, and where
who, how, and how long
who, when, and how
The default connection request policy uses NPS as what kind of server?
DNS
Active Domain controller
RRAS
RADIUS
RADIUS
What is the last setting in the Routing and Remote Access IP settings?
the number of assigned IP addresses
which DHCP server will supply the requests
which NPS server to connect to
how IP addresses are assigned
how IP addresses are assigned
To which type of file do you export an NPS configuration?
TXT
DOC
XML
NPS
XML
Network policies determine what two important connectivity constraints?
who is authorized to connect
the DHCP server for the connection
the DNS server for the connection
the connection circumstances for connectivity
who is authorized to connect
& the connection circumstances for connectivity
If a remote connection attempt does not match any configured constraints, what does the Remote Access server do to the connection?
retries
accepts
denies
locks
denies
Which two of the following are Routing and Remote Access IP settings?
Server Must Request an IP Address
Client May Request an IP Address
Server Must Supply an IP Address
Client Must Supply an IP Address
Client May Request an IP Address
& Server Must Supply an IP Address
Which of the following is the strongest type of encryption?
MPPE 40-Bit
MPPE 56-Bit
MPPE 128-Bit
No Encryption
MPPE 128-Bit
RADIUS Access-Request messages are processed or forwarded by NPS only if the settings of the incoming message match what on the NPS server?
one of the connection request policies
the time zone of the requestor
the client type of the requestor
the TCP/IP port of the requestor
one of the connection request policies
Network Access Protection (NAP) is Microsoft’s software for controlling network access of computers based on what?
a computer’s IP address and VLAN
a computer’s overall health
a computer’s Windows version
a computer’s network functionality (role)
a computer’s overall health
DHCP enforcement is not available for what kind of clients?
mobile
remote dial-up
noncompliant
IPv6
IPv6
What type of Active Directory domain controller is recommended to minimize security risks for remediation servers?
Windows Server 2012
Windows Server 2008 R2
read-only
updated and compliant
read-only
To verify a NAP client’s configuration, which command would you run?
netsh nap show state
netsh nap client show state
netsh nps nap show state
netsh nps nap agent state
netsh nap client show state
Why do you need a web server as part of your NAP remediation infrastructure?
to provide user information in case of a compliance failure
to provide Internet access to users who fail compliance
to redirect user requests for restored network access
to further assess how far out of compliance a user system is
to provide user information in case of a compliance failure
Health policies are in pairs. What are the members of the pair? Select two.
NAP-compliant
NAP-remedial
NAP-noncompliant
NAP-quarantined
NAP-compliant
& NAP-noncompliant
What happens to a computer that isn’t running Windows Firewall?
The computer is isolated.
The computer is powered off.
A server message is sent to the computer.
An event is logged.
The computer is isolated.
To use the NAP-compliant policy, the client must do what?
pass 75% of the SHV checks
fail no more than 10% of the SHV checks
pass one of the SHV checks
pass all SHV checks
pass all SHV checks
When enabling NAP for DHCP scopes, how should you roll out the service?
all at once
on test systems only
for individual computers
for individual DHCP scopes
for individual DHCP scopes
What is the default authentication protocol for non-domain computers?
NTLM
PAP
CHAP
Kerberos
NTLM
NTLM uses a challenge-response mechanism for authentication without doing what?
revealing the client’s operating system to the server
revealing the protocol to the server
sending a password to the server
sending an encrypt/decrypt message to the server
sending a password to the server
Kerberos security and authentication are based on what type of technology?
secure transmission
secret key
challenge-response
legacy code
secret key
Which three components make up a service principal name (SPN)?
service name, IP address, and port number
service name, URL, and host name
service name, host name, and IP address
service class, host name, and port number
service class, host name, and port number
Which tool can you use to add SPNs to an account?
Notepad
LDAP
Microsoft Word
ADSI Edit
ADSI Edit
Identify another utility that you can use to add SPNs to an account.
dnscmd
spnedit
setspn
netsh
setspn
When creating accounts for operating systems, processes, and services, you should always configure them with what two things in mind?
using strong passwords
using cryptic user names
granting the least rights possible
using built-in accounts
using strong passwords
& granting the least rights possible
By default, which service accounts will the Windows PowerShell cmdlets manage?
standalone MSAs
standard local service accounts
group MSAs
domain user accounts designated as service accounts
group MSAs
What is the default authentication protocol for contemporary domain computers?
NTLM
PAP
CHAP
Kerberos
Kerberos
The domain controllers are the computers that store and run the _______________.
user database
services database
Managed Service Accounts database
Active Directory database
Active Directory database
You do not place the infrastructure master on a global catalog server unless what situation exists?
You have a single domain.
You have Windows NT 4.0 systems to support.
You have multiple schemas.
Your AD DS is Windows 2008 or higher.
You have a single domain.
Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly?
Schema Master
Forest
RODC
Operations Master
Operations Master
What utility must you run on a cloned system to ensure that the clone receives its own SID?
adprep /renew
sysprep
dcpromo
ntconfig
sysprep