Module 9 Review Quiz Flashcards
Which of the following is not considered a remote access technology?
a. DirectAccess b. L2TP c. PPPoE d. Remote Desktop
c. PPPoE
Split tunneling is used to ensure that all network traffic generated by a remote access client passes through a VPN to a remote access server.
a. True
b. False
b. False
Which of the following VPN protocols uses IPSec to encrypt network traffic? (Choose all that apply.)
a. IKEv2
b. PPTP
c. SSTP
d. L2TP
a. IKEv2
d. L2TP
What can you configure on a router to protect traffic destined for another network in the organization as it passes over the Internet?
a. Port forwarding b. Demand-dial interface c. Reverse proxy d. DirectAccess
b. Demand-dial interface
The Remote Access role service in Windows Server 2019 provides for DirectAccess and VPN remote access, as well as RADIUS.
a. True
b. False
b. False
You have configured a remote access server in your DMZ for IKEv2 VPN access. Which ports on your NAT router must you configure for port forwarding to this remote access server? (Choose all that apply.)
a. TCP port 1723
b. TCP port 1701
c. UDP port 500
d. UDP port 4500
b. TCP port 1701
c. UDP port 500
d. UDP port 4500
Which of the following VPN authentication methods is considered the most secure?
a. EAP b. CHAP c. MS-CHAPv2 d. PAP
a. EAP
Remote access servers can be configured as RADIUS clients.
a. True
b. False
a. True
What features does RADIUS provide for remote access connections?
a. Centralized logging
b. Remote access policies
c. Centralized authentication
d. Centralized encryption
a. Centralized logging
b. Remote access policies
c. Centralized authentication
The user permission necessary for VPN remote access can be granted in the properties of a user account or remote access policy.
a. True
b. False
a. True
What section of a remote access policy contains characteristics that must be met for remote access, such as Session Timeout?
a. Conditions b. Criteria c. Constraints d. Settings
c. Constraints
DirectAccess uses HTTPS to authenticate remote access users, and IPSec to create an encrypted tunnel for network traffic between the remote access client and server.
a. True
b. False
a. True
Which of the following network topologies should you choose if your DirectAccess remote access server is connected directly to the demarc, as well as to the DMZ?
a. Edge
b. Connection Broker
c. Behind an edge device (with two network adapters)
d. Behind an edge device (with a single network adapter)
a. Edge
DirectAccess supports Windows 7 and later remote access clients by default.
a. True
b. False
b. False
Which of the following Remote Desktop Services role services uses HTTPS to provide encryption for all RDP packets?
a. Remote Desktop Connection Broker
b. Remote Desktop Gateway
c. Remote Desktop Session Host
d. Remote Desktop Virtualization Host
b. Remote Desktop Gateway