Final Flashcards

1
Q

What kind of RADIUS server is placed between the RADIUS server and RADIUS clients?

a RADIUS client server
a RADIUS engine server
a RADIUS proxy server
a RADIUS relay server

A

a RADIUS proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a RADIUS server known as in Microsoft parlance?

Network Access Server
Network Policy Server
Network Authentication Server
Network Remote Access Server

A

Network Policy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When an access client contacts a VPN server or wireless access point, a connection request is sent to what system?

the NPS server
the 802.1X switch
an authorization relay
an access client

A

the NPS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the final step in the authentication, authorization, and accounting scenario between an access client and the RADIUS server?

a log entry that the connection is established
an Access-Reject message to the access server
a final credential check with the domain controller
an Accounting-Response to the access server

A

an Accounting-Response to the access server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which parameter specifies the order of importance of the RADIUS server to the NPS proxy server?

relay link number
weight
precedence
priority

A

priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What information does the Accounting-Start message contain?

the RADIUS server name and IP address
the type of service and the user it’s delivered to
the list of permissions granted to the user
the list of services provided to RADIUS access servers

A

the type of service and the user it’s delivered to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of NPS authentication is recommended over password authentication?

certificate
complex
biometric
PAP2

A

certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where do you get certificates for authentication purposes

Microsoft
the computer manufacturer
a certificate authority
a certificate broker

A

a certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What would be the biggest problem with configuring text files for accounting logging?

Space; filling up the C drive has catastrophic effects.
Logs are saved as plain text format.
Data isn’t sent to a SQL Server database.
Writing logs to disk requires disk I/O, which might impact performance.

A

Space; filling up the C drive has catastrophic effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity?

who, what, and where
who, when, and how
who, when, and where
who, how, and how long

A

who, when, and how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The default connection request policy uses NPS as what kind of server?

DNS
Active Domain controller
RRAS
RADIUS

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the last setting in the Routing and Remote Access IP settings?

the number of assigned IP addresses
which DHCP server will supply the requests
which NPS server to connect to
how IP addresses are assigned

A

how IP addresses are assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To which type of file do you export an NPS configuration?

TXT
DOC
XML
NPS

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network policies determine what two important connectivity constraints?

who is authorized to connect
the DHCP server for the connection
the DNS server for the connection
the connection circumstances for connectivity

A

who is authorized to connect

& the connection circumstances for connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If a remote connection attempt does not match any configured constraints, what does the Remote Access server do to the connection?

retries
accepts
denies
locks

A

denies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two of the following are Routing and Remote Access IP settings?

Server Must Request an IP Address
Client May Request an IP Address
Server Must Supply an IP Address
Client Must Supply an IP Address

A

Client May Request an IP Address

& Server Must Supply an IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is the strongest type of encryption?

MPPE 40-Bit
MPPE 56-Bit
MPPE 128-Bit
No Encryption

A

MPPE 128-Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RADIUS Access-Request messages are processed or forwarded by NPS only if the settings of the incoming message match what on the NPS server?

one of the connection request policies
the time zone of the requestor
the client type of the requestor
the TCP/IP port of the requestor

A

one of the connection request policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network Access Protection (NAP) is Microsoft’s software for controlling network access of computers based on what?

a computer’s IP address and VLAN
a computer’s overall health
a computer’s Windows version
a computer’s network functionality (role)

A

a computer’s overall health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DHCP enforcement is not available for what kind of clients?

mobile
remote dial-up
noncompliant
IPv6

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of Active Directory domain controller is recommended to minimize security risks for remediation servers?

Windows Server 2012
Windows Server 2008 R2
read-only
updated and compliant

A

read-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To verify a NAP client’s configuration, which command would you run?

netsh nap show state
netsh nap client show state
netsh nps nap show state
netsh nps nap agent state

A

netsh nap client show state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why do you need a web server as part of your NAP remediation infrastructure?

to provide user information in case of a compliance failure
to provide Internet access to users who fail compliance
to redirect user requests for restored network access
to further assess how far out of compliance a user system is

A

to provide user information in case of a compliance failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Health policies are in pairs. What are the members of the pair? Select two.

NAP-compliant
NAP-remedial
NAP-noncompliant
NAP-quarantined

A

NAP-compliant

& NAP-noncompliant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What happens to a computer that isn’t running Windows Firewall?

The computer is isolated.
The computer is powered off.
A server message is sent to the computer.
An event is logged.

A

The computer is isolated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

To use the NAP-compliant policy, the client must do what?

pass 75% of the SHV checks
fail no more than 10% of the SHV checks
pass one of the SHV checks
pass all SHV checks

A

pass all SHV checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When enabling NAP for DHCP scopes, how should you roll out the service?

all at once
on test systems only
for individual computers
for individual DHCP scopes

A

for individual DHCP scopes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the default authentication protocol for non-domain computers?

NTLM
PAP
CHAP
Kerberos

A

NTLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

NTLM uses a challenge-response mechanism for authentication without doing what?

revealing the client’s operating system to the server
revealing the protocol to the server
sending a password to the server
sending an encrypt/decrypt message to the server

A

sending a password to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Kerberos security and authentication are based on what type of technology?

secure transmission
secret key
challenge-response
legacy code

A

secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which three components make up a service principal name (SPN)?

service name, IP address, and port number
service name, URL, and host name
service name, host name, and IP address
service class, host name, and port number

A

service class, host name, and port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which tool can you use to add SPNs to an account?

Notepad
LDAP
Microsoft Word
ADSI Edit

A

ADSI Edit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Identify another utility that you can use to add SPNs to an account.

dnscmd
spnedit
setspn
netsh

A

setspn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

When creating accounts for operating systems, processes, and services, you should always configure them with what two things in mind?

using strong passwords
using cryptic user names
granting the least rights possible
using built-in accounts

A

using strong passwords

& granting the least rights possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

By default, which service accounts will the Windows PowerShell cmdlets manage?

standalone MSAs
standard local service accounts
group MSAs
domain user accounts designated as service accounts

A

group MSAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the default authentication protocol for contemporary domain computers?

NTLM
PAP
CHAP
Kerberos

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The domain controllers are the computers that store and run the _______________.

user database
services database
Managed Service Accounts database
Active Directory database

A

Active Directory database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

You do not place the infrastructure master on a global catalog server unless what situation exists?

You have a single domain.
You have Windows NT 4.0 systems to support.
You have multiple schemas.
Your AD DS is Windows 2008 or higher.

A

You have a single domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly?

Schema Master
Forest
RODC
Operations Master

A

Operations Master

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What utility must you run on a cloned system to ensure that the clone receives its own SID?

adprep /renew
sysprep
dcpromo
ntconfig

A

sysprep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following commands issued at the fsmo maintenance prompt would successfully seize the role of an Operations Master Holder?
Select all that apply.

seize schema master
seize global master
seize PDC
seize domain control

A

seize schema master

& seize PDC

42
Q

What utility must you run on a cloned system to ensure that the clone receives its own SID?

adprep /renew
sysprep
dcpromo
ntconfig

A

sysprep

43
Q

Which version of Windows Server introduced incremental universal group membership replication?

Windows Server 2000
Windows Server 2003
Windows Server 2008
Windows Server 2012

A

Windows Server 2003

44
Q

The global catalog stores a partial copy of all objects in the forest. What are the reasons for keeping that partial copy? Select all that apply.

logon
object searches
universal group membership
schema integrity

A

logon, object searches, &

universal group membership

45
Q

Where in the forest is a global catalog automatically created?

the PDC Emulator
the most powerful system
the first domain controller
the schema master

A

the first domain controller

46
Q

What function does the CSVDE tool perform?

It decrypts and encrypts Active Directory information.
It exports/imports Active Directory information.
It exports/imports data from Event Viewer.
It extracts Event Viewer information into CSV files.

A

It exports/imports Active Directory information.

47
Q

To perform an authoritative restore, into what mode must you reboot the domain controller?

Repair
Safe
Command line with networking
DSRM

A

DSRM

48
Q

What utility first appeared in Windows Server 2008 R2 that allows you to undelete Active Directory containers and objects?

the Active Directory Lost and Found folder
the Active Directory Recycle Bin
the Active Directory Undelete utility
Active Directory Snapshots

A

the Active Directory Recycle Bin

49
Q

After you undelete a user account with the LDP utility, what action do you need to perform?

Remove the old identifier.
Re-establish user to domain trust.
Reset the user’s password.
Restore the user-owned objects from a backup.

A

Reset the user’s password.

50
Q

What is the proper procedure for removing a domain controller from Active Directory?

Shut down the domain controller and manually remove it from AD.
Use dcdemo to demote the domain controller.
Uninstall Active Directory Domain Services.
Enter the DSRM and delete Active Directory.

A

Uninstall Active Directory Domain Services.

51
Q

To perform an authoritative restore of an object or subtree, what bit of information do you need to know about the object?

its formal name
its exact location
its OU and proper name
its distinguished name

A

its distinguished name

52
Q

Before you can use the Active Directory Recycle Bin, what two actions do you have to perform?

You have to remove the System Recycle Bin.
You have to enable the AD Recycle Bin.
You have to set the AD forest to Windows Server 2003 or higher.
You have to set the AD forest to Windows Server 2008 R2 or higher.

A

You have to enable the AD Recycle Bin.

& You have to set the AD forest to Windows Server 2008 R2 or higher.

53
Q

Which utility do you use to defragment Active Directory?

CSVDE
LDIFDE
ntdsutil
defrag

A

ntdsutil

54
Q

Why is backup of the Active Directory database so important?

Backup of all data is a good idea.
Backup is a standard practice in large companies.
Backup is needed in case of corruption, deletion, or other failure.
Backup is an insurance policy for data and should be performed regularly.

A

Backup is needed in case of corruption, deletion, or other failure.

55
Q

What are examples of password policies? Select all that apply.

history
length
complexity
age

A

ALL OF THEM

56
Q

What is the default setting for password history?

6
10
16
24

A

24

57
Q

What setting can you give for account lockout duration that requires an administrator to manually unlock the account?

0
10
99
99,999

A

0

58
Q

How should you assign Password Settings objects (PSOs) to users?

Assign the PSOs directly to individual users.
Assign the PSOs to a new group and add the users to the new group.
Assign the PSOs to a global security group and add users to the group.
Assign the PSOs to various Active Directory groups as needed.

A

Assign the PSOs to a global security group and add users to the group.

59
Q

What is the secpol.msc utility used for?

editing group policies
editing local security policies
editing global security policies
editing domain-level policies

A

editing local security policies

60
Q

Why should administrator passwords change more often than user passwords?

because administrator passwords are usually simpler than user passwords
because administrator accounts carry more security sensitivity than users do
because administrators are paranoid about security
because administrator accounts are watched by management in large companies

A

because administrator accounts carry more security sensitivity than users do

61
Q

What is an easy method of creating a strong password?

Use your username and add numbers and special characters.
Use your favorite football team’s name with numbers and special characters.
Ask a friend for some ideas for good passwords and then add your own number and characters.
Start with a sentence and then add numbers and special characters.

A

Start with a sentence and then add numbers and special characters.

62
Q

Account policies contain various subsets. Which of the following are legitimate subsets of account policies? Check all that apply.

Password Policy
Account Lockout Policy
Kerberos Policy
Username Policy

A

Password Policy
Account Lockout Policy
Kerberos Policy

63
Q

Which of the following passwords is considered complex?

M!croS0ft
candybar01
bobj
fred@local

A

M!croS0ft

64
Q

Which feature affects all users in the domain, including domain controllers?

Global Group Policy
Default Domain Policy
Default Group Policy
Default Global Domain Policy

A

Default Domain Policy

65
Q

What is the default timeout value for GPOs to process on system startup?

60 seconds
120 seconds
300 seconds
600 seconds

A

600 seconds

66
Q

What is the first step in the GPO processing order?

The user initiates interactive logon.
The computer obtains a list of GPOs from the domain controller.
The computer establishes a secure link to the domain controller.
The GPOs are applied to the computer and to the user.

A

The computer establishes a secure link to the domain controller.

67
Q

If a site, domain, or OU has multiple GPOs, how are the group policies processed?

by precedence
by importance
by administrative control
by GPO controller policy

A

by precedence

68
Q

For users to receive GPO settings, they must have which two permissions to the GPO?

Allow Read
Allow Write
Allow Modify
Allow Apply

A

Allow Read

Allow Apply

69
Q

At what point are WMI filters evaluated?

when the filter is created
when the policy is applied
when the filter is applied
when the policy is processed

A

when the policy is processed

70
Q

How many WMI filters can be configured for a GPO?

one
two
four
eight

A

one

71
Q

What is the primary purpose of running the Group Policy Results Wizard? Check all that apply.

to guarantee that GPOs are enforced in full
to analyze the cumulative effect of GPOs
for GPO troubleshooting
to ensure that you have administrative rights to the client computer

A

to analyze the cumulative effect of GPOs

for GPO troubleshooting

72
Q

Which of the following Windows 8.1 and Windows Server 2012 R2 features can speed up the performance of processing synchronous policy settings?

GPO Turbo Mode
GPO Enhanced Mode
Group Policy Update
Group Policy Caching

A

Group Policy Caching

73
Q

Which of the following operating systems can have its security settings managed by using security templates? Select all that apply.

Windows XP
Windows Vista
Windows 7
Windows 8

A

Windows 7

Windows 8

74
Q

What is an ADMX file?

an ADM file translator
the ADM format for newer operating systems
a template buffer
the protocol that deploys ADM files across networks

A

the ADM format for newer operating systems

75
Q

Which of the following are legitimate Administrative Template Property Filters? Select all that apply.

Keyword Filters
Requirements Filters
Security Filters
Operating System Filters

A

Keyword Filters

Requirements Filters

76
Q

What is the filename extension for the files in which installation information is stored?

.txt
.xml
.ini
.msi

A

.msi

77
Q

Windows Installer cannot install .exe files. To distribute a software package that installs with an .exe file, what must you do to it?

Convert it to a ZIP file
Convert it to an MSI file
Convert it to an MSP file
Convert it to an MST file

A

Convert it to an MSI file

78
Q

Where is the default location for ADMX files?

C:\Windows\SYSVOL\ADMX
C:\Windows\System32\XML\ADMX
C:\Windows\Inf
C:\Windows\PolicyDefinitions

A

C:\Windows\PolicyDefinitions

79
Q

What language are ADMX files based on?

HTML
XML
SGML
Java

A

XML

80
Q

Where is the Central Store located?

in the SYSVOL directory
Microsoft Online
TechNet
on a domain controller public share

A

in the SYSVOL directory

81
Q

When configuring Group Policy to deploy applications, the applications must be mapped to where?

UNC path
drive letter
shared folder
full install path

A

UNC path

82
Q

Which domain users are automatically granted permissions to perform Group Policy Management tasks?

local administrators
power users
domain administrators
domain users

A

domain administrators

83
Q

Why would you ever want or need to reset the domain policy and the domain controller policy to the default settings? Select all that apply.

if they’ve become corrupted
to refresh policy settings
as a regular part of domain maintenance and housekeeping
if someone deleted one of the policies

A

if they’ve become corrupted

& if someone deleted one of the policies

84
Q

A user must have which two existing permissions for new permissions to be applied to their accounts for GPO delegation?

Allow Read
Allow Write
Allow Apply
Allow Modify

A

Allow Read

& Allow Apply

85
Q

If you don’t want a GPO to apply, which group policy permission do you apply to a user or group?

Disallow Read
Disallow Write
Disallow Modify
Disallow Apply

A

Disallow Apply

86
Q

When you’re about to reset domain policy and domain controllers policy back to default with the dcgpofix.exe command, what final warning are you given before you accept the change?

that you’re about to reset policies to their defaults
that all User Rights Assignments will be replaced
that all security for the domain will be overwritten
that you’re about to restore all security to the default

A

that all User Rights Assignments will be replaced

87
Q

To give someone permission to manage a particular GPO, you use the __________ tab of the individual GPO.

Permissions
Security
Delegate
Settings

A

Delegate

88
Q

What is a collection of files stored in the SYSVOL (%SystemRoot%\SYSVOL\Policies) of each domain controller?

Group Policy Container (GPC)
Group Policy Template (GPT)
migration table
delegation

A

Group Policy Template (GPT)

89
Q

What is a file that maps references to users, groups, computers, and UNC paths in the source GPO to new values in the destination GPO?

Group Policy Container (GPC)
Group Policy Template (GPT)
migration table
delegation

A

migration table

90
Q

What is an Active Directory object stored in the Group Policy Objects container with the domain naming content of the directory that defines basic attributes of the GPO but does not contain any of the settings?

Group Policy Container (GPC)
Group Policy Template (GPT)
migration table
delegation

A

Group Policy Container (GPC)

91
Q

What process grants permissions to other users to manage group policies?

Group Policy Container (GPC)
Group Policy Template (GPT)
migration table
delegation

A

delegation

92
Q

Which utility do you use to create GPO preferences?

Group Policy Management Editor
Group Policy Preference Editor
Group Policy Editor
Group Policy Wizard

A

Group Policy Management Editor

93
Q

How do you stop processing a preference if an error occurs?

Select the Stop processing items option on the Common tab.
Select the Remove this item option on the Common tab.
Select the Stop on any error option in the GPP Wizard.
Select the Stop on all errors option in the GPP Wizard.

A

Select the Stop processing items option on the Common tab.

94
Q

Which Windows extension allows you to add, replace, or delete sections or properties in configuration settings or setup information files?

.ini files
files
folders
environment

A

.ini files

95
Q

If you need to provide users access to a common network location, which GPP would you use? Select all that apply.

Shortcut
File
Drive Maps
Folders

A

Shortcut & Drive Maps

96
Q

Which component allows you to create multiple Registry preference items based on registry settings that you select?

the Registry Scope
the Registry Extension
the Registry Configurator
the Registry Wizard

A

the Registry Wizard

97
Q

Which term describes changing the scope of individual preference items so that the preference items apply only to selected users or computers?

individual targeting
user-specific targeting
item-level targeting
focused targeting

A

item-level targeting

98
Q

Windows Settings has multiple preference extensions. Identify all that apply.

Registry
Shortcuts
Folders
Storage

A

Registry, Shortcuts, & Folders

99
Q

GPP can be configured on domain controllers running which version of Windows Server? Select all that apply.

2003
2008
2008 R2
2012

A

2008, 2008 R2, & 2012

100
Q

GPPs are divided into which two sections?

Windows and Registry
Applications and Registry
Applications and Control Panel
Windows and Control Panel

A

Windows and Control Panel