test Flashcards

1
Q

An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity?

A

who, when, and how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which variable can be set to authorize or deny a remote connection?

A

group membership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The default connection request policy uses NPS as what kind of server?

A

Radius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where is the default connection policy set to process all authentication requests?

A

Locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the last setting in the Routing and Remote Access IP settings?

A

how IP addresses are assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What command-line utility is used to import and export NPS templates?

A

netsh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To which type of file do you export an NPS configuration?

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When should you not use the command-line method of exporting and importing the NPS configuration?

A

when the source NPS database has a higher version number than the version number of the destination NPS database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network policies determine what two important connectivity constraints?

A
  • who is authorized to connect

- the connection circumstances for connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When the Remote Access server finds an NPS network policy with conditions that match the incoming connection attempt, the server checks any _______________ that have been configured for the policy.

A

constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If a remote connection attempt does not match any configured constraints, what does the Remote Access server do to the connection?

A

Denies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Routing and Remote Access IP setting is the default setting?

A

Server Settings Determine IP Address Assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the strongest type of encryption?

A

MPPE 128-Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is there a No Encryption option for network connections?

A

to allow for third-party encryption programs that might be incompatible with native encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RADIUS Access-Request messages are processed or forwarded by NPS only if the settings of the incoming message match what on the NPS server?

A

one of the connection request policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Access Policy is part of which larger scope NPS policy?

A

Health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What character string makes up the telephone number of the network access server (NAS)?

A

Called Station ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What character string attribute designates the phone number used by the access client?

A

Calling Station ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is used to restrict the policy only to clients that can be identified through the special mechanism such as a NAP statement of health?

A

Identity Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the name of the RADIUS client computer that requests authentication?

A

Client Friendly Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network Access Protection (NAP) is Microsoft’s software for controlling network access of computers based on what?

A

a computer’s overall health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Because NAP is provided by _________, you need to install _________ to install NAP.

A

NPS, NPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DHCP enforcement is not available for what kind of clients?

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What type of Active Directory domain controller is recommended to minimize security risks for remediation servers?

A

Read-Only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When you fully engage NAP for remediation enforcement, what mode do you place the policy in?

A

Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

To verify a NAP client’s configuration, which command would you run?

A

netsh nap client show state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Why do you need a web server as part of your NAP remediation infrastructure?

A

to provide user information in case of a compliance failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Where do you look to find out which computers are blocked and which are granted access via NAP?

A

the NAP Server Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You should restrict access only for clients that don’t have all available security updates installed, if what situation exists?

A

the computers are running Windows Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What happens to a computer that isn’t running Windows Firewall?

A

The computer is isolated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

To use the NAP-compliant policy, the client must do what?

A

pass all SHV checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which computers are not affected by VPN enforcement?

A

locally connected computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When enabling NAP for DHCP scopes, how should you roll out the service?

A

for individual DHCP scopes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the purpose of the System Health Agent (SHA)?

A

Either
to provide feedback on the status of system protection and updates
OR
to provide feedback to the system for CPU, memory, and disk health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Why is monitoring system health so important?

A

to maintain a safe computing environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Why would you set up a monitor-only NAP policy on your network?

A

You are testing your NAP rollout before implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

These Windows computers don’t typically move much and are part of the domain. Because they are part of the domain, they are easier to manage with group policies, managed anti-virus/anti-malware systems, and administrative control.

A

desktop computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

These Windows computers are not usually connected directly to the network but connect through a VPN connection. Because they are usually personal computers, they are not part of the domain. Therefore, they usually do not get security updates and might not have an up-to-date anti-virus/anti-malware software package.

A

unmanaged home computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

These Windows computers are unmanaged computers often used by consultants or vendors who need to connect to your organization’s network. Because they are unmanaged, they might not have the newest up-to-date security patches and an up-to-date anti-virus/anti-malware software package.

A

visiting laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

These Windows computers move often and might not be connected to the organization’s network office. Because they are typically part of the domain, they can be managed but might not get the newest updates because they are not always connected to the network.

A

roaming laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the default authentication protocol for non-domain computers?

A

NTLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does the acronym NTLM stand for?

A

NT LAN Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

NTLM uses a challenge-response mechanism for authentication without doing what?

A

sending a password to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What type of protocol is Kerberos?

A

a secure network authentication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Kerberos security and authentication are based on what type of technology?

A

secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly?

A

5 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which three components make up a service principal name (SPN)?

A

service class, host name, and port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What happens if a client submits a service ticket request for an SPN that does not exist in the identity store?

A

The client receives an access denied error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which tool can you use to add SPNs to an account?

A

ADSI Edit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Identify another utility that you can use to add SPNs to an account.

A

setspn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What type of account is an account under which an operating system, process, or service runs?

A

Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

By default, which service accounts will the Windows PowerShell cmdlets manage?

A

group MSAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the default authentication protocol for contemporary domain computers?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is the name by which a client uniquely identifies an instance of a service?

A

service principal name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Before you can create an MSA object type, you must create what?

A

a key distribution services root key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What service right does an MSA account automatically receive upon creation?

A

log on as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which Kerberos setting defines the maximum time skew that can be tolerated between a ticket’s timestamp and the current time at the KDC?

A

maximum tolerance for computer clock synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which Kerberos setting defines the maximum lifetime ticket for a Kerberos TGT ticket?

A

maximum lifetime for user ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which Kerberos setting defines the maximum lifetime of a Kerberos ticket?

A

maximum lifetime for service ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which Kerberos setting defines how long a service or user ticket can be renewed?

A

maximum lifetime for user ticket renewal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

The domain controllers are the computers that store and run the _______________.

A

Active Directory database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How many PDC Emulators are required, if needed, in a domain?

A

One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

You do not place the infrastructure master on a global catalog server unless what situation exists?

A

You have a single domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

When you add attributes to an Active Directory object, what part of the domain database are you actually changing?

A

schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly?

A

Operations Master

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

How many global catalogs are recommended for every organization?

A

at least two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Where are you most likely to see a Read-Only Domain Controller (RODC)?

A

in a remote site

68
Q

Beginning with which server version can you safely deploy domain controllers in a virtual machine?

A

Windows Server 2012

69
Q

What utility must you run on a cloned system to ensure that the clone receives its own SID?

A

sysprep

70
Q

Which type of system must you connect to and use to make changes to Active Directory?

A

writable domain controller

71
Q

Which version of Windows Server introduced incremental universal group membership replication?

A

Windows Server 2003

72
Q

3 group in Domain

A

domain local, global, universal

73
Q

Although the changes are easy to make, why is changing the AD Schema such a big deal?

A

The changes could corrupt the database

74
Q

Where in the forest is a global catalog automatically created?

A

the first domain controller

75
Q

Which utility do you use to manage Active Directory from the command line?

A

ntdsutil

76
Q

Which command-line command do you use to allow Windows Server 2003 domain controllers to replicate to RODCs?

A

adprep

77
Q

Which term describes a collection of domains grouped together in hierarchical structures that share a common root domain?

A

Domain trees

78
Q

Which term describes an administrative boundary for users and computers, which are stored in a common directory database?

A

domains

79
Q

Which term describes a collection of domain trees that share a common Active Directory Domain Services (AD DS)?

A

forests

80
Q

Which term describes containers in a domain that allow you to organize and group resources for easier administration, including providing for delegating administrative rights?

A

organizational units

81
Q

Which of the following ntdsutil commands cleans up metadata?

A

metadata cleanup

82
Q

Why is backing up the Windows system state necessary?

A

It’s needed to perform a full system restore

83
Q

In interactive mode, what aspect of AD can you check with the ntdsutil integrity command?

A

low-level database corruption

84
Q

What is the range of password history settings?

A

0 to 24

85
Q

What is the primary advantage of using Group Policies in a domain environment?

A

centralized management

86
Q

How should you assign Password Settings objects (PSOs) to users?

A

Assign the PSOs to a global security group and add users to the group

87
Q

By default, how often does Active Directory “garbage collection” occur?

A

every 12 hours

88
Q

What is the proper procedure for removing a domain controller from Active Directory?

A

Uninstall Active Directory Domain Services.

89
Q

To perform an authoritative restore, into what mode must you reboot the domain controller?

A

DSRM

90
Q

If a single domain controller’s AD database becomes corrupt, which type of restore should you perform on it?

A

nonauthoritative

91
Q

Why can you not modify snapshots?

A

They are read-only.

92
Q

What is the default minimum password length in characters?

A

7

93
Q

Which aspect of passwords is a key component of their strength?

A

number of characters

94
Q

Why primarily are account lockout policies put into place?

A

security

95
Q

Why should administrator passwords change more often than user passwords?

A

because administrator accounts carry more security sensitivity than users do

96
Q

An Active Directory snapshot is actually what kind of backup?

A

a shadow copy

97
Q

What is a GUID?

A

a unique identifier for a snapshot

98
Q

When you do an authoritative restore process, a back-links file is created. What is a back-links file?

A

a reference to an attribute within another object

99
Q

Which utility do you use to defragment Active Directory?

A

ntdsutil

100
Q

To perform an authoritative restore of an object or subtree, what bit of information do you need to know about the object?

A

its distinguished name

101
Q

What utility first appeared in Windows Server 2000 R2 that allows you to undelete Active Directory containers and objects?

A

the Active Directory Recycle Bin

102
Q

What is the default setting for password history?

A

24

103
Q

By default, who has read/write capability to the Default Domain Policy?

A

domain administrators

104
Q

By default, which of the following represents the maximum amount of time by which a computer’s internal clock can be inaccurate yet still be able to use Kerberos authentication?

A

5 minutes

105
Q

What setting can you give for account lockout duration that requires an administrator to manually unlock the account?

A

0

106
Q

What function does the CSVDE tool perform?

A

It exports/imports Active Directory information

107
Q

What is an easy method of creating a strong password?

A

Start with a sentence then add numbers and special characters.

108
Q

The default maximum password age is how long?

A

42 days

109
Q

what character length for a password is generally accepted as minimum?

A

eight

110
Q

After you undelete a user account with the LDP utility, what action do you need to perform?

A

Reset the user’s password

111
Q

Why is backup of the Active Directory database so important?

A

Backup is needed in case of corruption, deletion, or other failure.

112
Q

What does the minimum password age setting control?

A

how many days a user must wait before a password reset

113
Q

What is the secpol.msc utility used for?

A

editing local security policies

114
Q

Which of the following passwords is considered complex?

A

M!croS0ft

115
Q

Windows Server 2012 introduces a new time-saving feature when performing tasks such as AD defragmentation. What is that feature?

A

Restartable Active Directory Domain Services

116
Q

Which utilities do you use to set up loopback policies?

A

Group Policy Management Editor

117
Q

Which of the following Windows 8.1 and Windows Server 2012 R2 features can speed up the performance of processing synchronous policy settings

A

Group Policy Caching

118
Q

What happens when an application deployed via group policies becomes damaged or corrupt?

A

The installer will detect and reinstall or repair the application

119
Q

Where is the default location for ADMX files?

A

C:\Windows\PolicyDefinitions

120
Q

GPOs are processed on computer startup and after logon. Why is the user never aware of the processing ?

A

processing is hidden from the user

121
Q

In which order are Group Policy objects (GPOs) processed?

A

Local group policy, site, domain, OU

122
Q

To use WMI filters, you must have one domain controller running which version of Windows Server or higher?

A

2003

123
Q

By default which GPO permissions are all authenticated users given?

A

Apply Group

124
Q

How many WMI filters can be configured for a GPO?

A

one

125
Q

What is an ADMX file?

A

the ADM format for newer operating systems

126
Q

Windows installer cannot install .exe files. To distribute a software package that installs with an .exe file, what must you do to do it?

A

convert it to an MSI file

127
Q

Which feature affects all users in the domain, including domain controllers?

A

Default Domain Policy

128
Q

Where would using Replace mode GPOs be appropriate?

A

in a classroom

129
Q

What language are ADMX files based on?

A

XML

130
Q

When configuring Group policy to deploy applications, the applications must be mapped to where?

A

UNC path

131
Q

If you, as administrator, change an installed application, how do you update your users?

A

by redeploying the application via the GPO

132
Q

What is the filename extension for the files in which installation information is stored?

A

.msi

133
Q

What is the name of the software component used for installation, maintenance, and removal of software on Windows?

A

Windows Installer

134
Q

What is the default timeout value for GPOs to process on system startup?

A

600 seconds

135
Q

The downward flow of group policies is known as what feature of GPOs?

A

inheritance

136
Q

How are client-side extensions applied?

A

to the local computer or currently logged-on user

137
Q

Unlike ADM files, ADMX files are not stored where?

A

in individual GPOs

138
Q

Where is the Central store located?

A

in the SYSVOL directory

139
Q

At what point are WMI filters evaluated?

A

when the policy is processed

140
Q

What is the best method of dealing with slow-link processing?

A

changing the slow-link policy processing behavior

141
Q

What kind of group policies should you enable for student computers?

A

loopback

142
Q

What is the first step in the GPO processing order?

A

The computer establishes a secure link to the domain controller

143
Q

What are MST files used for?

A

They deploy customized software installation files

144
Q

An application cannot be published to a ___________

A

computer

145
Q

When you’re about to reset domain policy and domain controllers policy back to default with the dcgpofix.exe command, what final warning are you given before you accept the change?

A

that all users Rights Assignments will be replaced

146
Q

What process grants permission to other users to manage group policies?

A

delegation

147
Q

What is a collection of files store in the SYSVOL (%SystemRoot%\SYSVOL\,\Policies) of each domain controller?

A

Group Policy template (GPT)

148
Q

If you don’t want a GPO to apply, which group policy permission do you apply to a user or group?

A

Disallow apply

149
Q

Which utility do you use to create GPO preferences?

A

Group Policy Management Editor

150
Q

What object can you create to organize Registry preference items?

A

a Collection

151
Q

Which Windows extension allows you to add, replace or delete sections or properties in configuration settings or setup information files?

A

.ini files

152
Q

Which domain users are automatically granted permissions to preform Group Policy Management task?

A

domain administrators

153
Q

For GPP editing states, which key do you use to toggle Enable Current?

A

F6

154
Q

Which term describes changing the scope of individual preferences items so that the preference items apply only to selected users or computers?

A

item-level targeting

155
Q

To give someone permission to manage a particular GPO, you use the ______________ tab of the individual GPO.

A

Delegate

156
Q

Which Windows extension allows you to copy registry settings and apply them to other computers’ create, replace, or delete registry settings?

A

Registry

157
Q

What is the key difference between preferences and policy settings?

A

enforcement

158
Q

Windows Settings are common configuration settings used in Windows but not used where?

A

The Control Panel

159
Q

Which components allows you to create multiple Registry preference items based on registry settings that you select?

A

The Registry Wizard

160
Q

What is a file that maps references to users, groups, computers and UNC paths in the source GPO to new values in the destination GPO?

A

migration table

161
Q

What is an Active Directory object store in the Group Policy Objects container with the domain naming content of the directory basic attributes of the GPO but does not contain any of the settings?

A

Group Policy Container (GPC)

162
Q

To support GPPs on older Windows versions (Server and Workstation), you have to install what component from Microsoft?

A

GPP client-Side Extensions

163
Q

GPPs are divided into which two sections?

A

Windows and Control Panel

164
Q

How do you stop processing a preference if an error occurs?

A

Select the Stop processing items option on the Common tab

165
Q

By default, this option runs as the System account. If this option is selected, the logged-on user context is used.

A

Run in logged-on user’s security context.