test Flashcards
An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity?
who, when, and how
Which variable can be set to authorize or deny a remote connection?
group membership
The default connection request policy uses NPS as what kind of server?
Radius
Where is the default connection policy set to process all authentication requests?
Locally
What is the last setting in the Routing and Remote Access IP settings?
how IP addresses are assigned
What command-line utility is used to import and export NPS templates?
netsh
To which type of file do you export an NPS configuration?
XML
When should you not use the command-line method of exporting and importing the NPS configuration?
when the source NPS database has a higher version number than the version number of the destination NPS database
Network policies determine what two important connectivity constraints?
- who is authorized to connect
- the connection circumstances for connectivity
When the Remote Access server finds an NPS network policy with conditions that match the incoming connection attempt, the server checks any _______________ that have been configured for the policy.
constraints
If a remote connection attempt does not match any configured constraints, what does the Remote Access server do to the connection?
Denies
Which Routing and Remote Access IP setting is the default setting?
Server Settings Determine IP Address Assignment
Which of the following is the strongest type of encryption?
MPPE 128-Bit
Why is there a No Encryption option for network connections?
to allow for third-party encryption programs that might be incompatible with native encryption
RADIUS Access-Request messages are processed or forwarded by NPS only if the settings of the incoming message match what on the NPS server?
one of the connection request policies
Network Access Policy is part of which larger scope NPS policy?
Health
What character string makes up the telephone number of the network access server (NAS)?
Called Station ID
What character string attribute designates the phone number used by the access client?
Calling Station ID
What is used to restrict the policy only to clients that can be identified through the special mechanism such as a NAP statement of health?
Identity Type
What is the name of the RADIUS client computer that requests authentication?
Client Friendly Name
Network Access Protection (NAP) is Microsoft’s software for controlling network access of computers based on what?
a computer’s overall health
Because NAP is provided by _________, you need to install _________ to install NAP.
NPS, NPS
DHCP enforcement is not available for what kind of clients?
IPv6
What type of Active Directory domain controller is recommended to minimize security risks for remediation servers?
Read-Only
When you fully engage NAP for remediation enforcement, what mode do you place the policy in?
Isolation
To verify a NAP client’s configuration, which command would you run?
netsh nap client show state
Why do you need a web server as part of your NAP remediation infrastructure?
to provide user information in case of a compliance failure
Where do you look to find out which computers are blocked and which are granted access via NAP?
the NAP Server Event Viewer
You should restrict access only for clients that don’t have all available security updates installed, if what situation exists?
the computers are running Windows Update
What happens to a computer that isn’t running Windows Firewall?
The computer is isolated
To use the NAP-compliant policy, the client must do what?
pass all SHV checks
Which computers are not affected by VPN enforcement?
locally connected computers
When enabling NAP for DHCP scopes, how should you roll out the service?
for individual DHCP scopes
What is the purpose of the System Health Agent (SHA)?
Either
to provide feedback on the status of system protection and updates
OR
to provide feedback to the system for CPU, memory, and disk health
Why is monitoring system health so important?
to maintain a safe computing environment
Why would you set up a monitor-only NAP policy on your network?
You are testing your NAP rollout before implementation
These Windows computers don’t typically move much and are part of the domain. Because they are part of the domain, they are easier to manage with group policies, managed anti-virus/anti-malware systems, and administrative control.
desktop computers
These Windows computers are not usually connected directly to the network but connect through a VPN connection. Because they are usually personal computers, they are not part of the domain. Therefore, they usually do not get security updates and might not have an up-to-date anti-virus/anti-malware software package.
unmanaged home computers
These Windows computers are unmanaged computers often used by consultants or vendors who need to connect to your organization’s network. Because they are unmanaged, they might not have the newest up-to-date security patches and an up-to-date anti-virus/anti-malware software package.
visiting laptops
These Windows computers move often and might not be connected to the organization’s network office. Because they are typically part of the domain, they can be managed but might not get the newest updates because they are not always connected to the network.
roaming laptops
What is the default authentication protocol for non-domain computers?
NTLM
What does the acronym NTLM stand for?
NT LAN Manager
NTLM uses a challenge-response mechanism for authentication without doing what?
sending a password to the server
What type of protocol is Kerberos?
a secure network authentication protocol
Kerberos security and authentication are based on what type of technology?
secret key
What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly?
5 minutes
Which three components make up a service principal name (SPN)?
service class, host name, and port number
What happens if a client submits a service ticket request for an SPN that does not exist in the identity store?
The client receives an access denied error
Which tool can you use to add SPNs to an account?
ADSI Edit
Identify another utility that you can use to add SPNs to an account.
setspn
What type of account is an account under which an operating system, process, or service runs?
Service
By default, which service accounts will the Windows PowerShell cmdlets manage?
group MSAs
What is the default authentication protocol for contemporary domain computers?
Kerberos
What is the name by which a client uniquely identifies an instance of a service?
service principal name
Before you can create an MSA object type, you must create what?
a key distribution services root key
What service right does an MSA account automatically receive upon creation?
log on as a service
Which Kerberos setting defines the maximum time skew that can be tolerated between a ticket’s timestamp and the current time at the KDC?
maximum tolerance for computer clock synchronization
Which Kerberos setting defines the maximum lifetime ticket for a Kerberos TGT ticket?
maximum lifetime for user ticket
Which Kerberos setting defines the maximum lifetime of a Kerberos ticket?
maximum lifetime for service ticket
Which Kerberos setting defines how long a service or user ticket can be renewed?
maximum lifetime for user ticket renewal
The domain controllers are the computers that store and run the _______________.
Active Directory database
How many PDC Emulators are required, if needed, in a domain?
One
You do not place the infrastructure master on a global catalog server unless what situation exists?
You have a single domain
When you add attributes to an Active Directory object, what part of the domain database are you actually changing?
schema
Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly?
Operations Master
How many global catalogs are recommended for every organization?
at least two