web flashcards

1
Q

DirectAccess was introduced with which workstation/server pair?

A

Windows 7/Windows Server 2008 R2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of connectivity does DirectAccess establish between workstation and server?

A

bi-directional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of server is the network location server (NLS)?

A

web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the acronym ISATAP stand for?

A

Intra-Site Automatic Tunnel Addressing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What utility do you use to configure DirectAccess?

A

Remote Access Management Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Windows Server 2012 varies from the Windows Server 2008 R2 implementation in that it does not require which one of the following?

A

two consecutive public IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the most basic requirement for a DirectAccess implementation?

A

The DirectAccess server must be part of an Active Directory domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If the client cannot reach the DirectAccess server using 6to4 or Teredo tunneling, the client tries to connect using what protocol?

A

IP-HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the netsh namespace show policy command do?

A

determines the results of network location detection and the IPv6 addresses of the intranet DNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of connectivity does DirectAccess provide between client computers and network resources?

A

seamless and always on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DirectAccess is for clients connected to which network?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do the DirectAccess server and DirectAccess client authenticate each other?

A

computer and user credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which one of the following operating systems may not act as a DirectAccess client?

A

Windows Server 2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of RADIUS server is placed between the RADIUS server and RADIUS clients?

A

a RADIUS proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What process determines what a user is permitted to do on a computer or on a network?

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a RADIUS server known as in Microsoft parlance?

A

Network Policy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which ports do Microsoft RADIUS servers use officially?

A

1812 and 1813

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When an access client contacts a VPN server or wireless access point, a connection request is sent to what system?

A

the NPS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which system, in a RADIUS infrastructure, handles the switchboard duties of relaying requests to the RADIUS server and back to the client?

A

the access server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the final step in the authentication, authorization, and accounting scenario between an access client and the RADIUS server?

A

an Accounting-Response to the access server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

To configure RADIUS service load balancing, you must have more than one kind of what system per remote RADIUS server group?

A

RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which parameter specifies the order of importance of the RADIUS server to the NPS proxy server?

A

priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Using what feature can streamline the creation and setup of RADIUS servers?

A

templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What information does the Accounting-Start message contain?

A

the type of service and the user it’s delivered to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which system is the destination for Accounting-Start messages?

A

the RADIUS accounting server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What type of NPS authentication is recommended over password authentication?

A

certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Why is password-based authentication not recommended?

A

Usernames and passwords are sent in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Where do you get certificates for authentication purposes?

A

a certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity?

A

who, when, and how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which variable can be set to authorize or deny a remote connection?

A

group membership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The default connection request policy uses NPS as what kind of server?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Where is the default connection policy set to process all authentication requests?

A

locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the last setting in the Routing and Remote Access IP settings?

A

how IP addresses are assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What command-line utility is used to import and export NPS templates?

A

netsh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

To which type of file do you export an NPS configuration?

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

When should you not use the command-line method of exporting and importing the NPS configuration?

A

when the source NPS database has a higher version number than the version number of the destination NPS database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Network policies determine what two important connectivity constraints?

A

who is authorized to connect AND the connection circumstances for connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

When the Remote Access server finds an NPS network policy with conditions that match the incoming connection attempt, the server checks any _______________ that have been configured for the policy.

A

constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

If a remote connection attempt does not match any configured constraints, what does the Remote Access server do to the connection?

A

denies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Identify the correct NPS templates. Select all that apply.

A

Shared Secrets
Health Policies
RADIUS Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which two of the following are Routing and Remote Access IP settings?

A

Client May Request an IP Address

Server Must Supply an IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which Routing and Remote Access IP setting is the default setting?

A

Server Settings Determine IP Address Assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Network Access Protection (NAP) is Microsoft’s software for controlling network access of computers based on what?

A

a computer’s overall health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Because NAP is provided by _________, you need to install _________ to install NAP.

A

NPS

NPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

DHCP enforcement is not available for what kind of clients?

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Identify two remediation server types.

A

Anti-virus/anti-malware servers

Software update servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What type of Active Directory domain controller is recommended to minimize security risks for remediation servers?

A

read-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

When you fully engage NAP for remediation enforcement, what mode do you place the policy in?

A

isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

To verify a NAP client’s configuration, which command would you run?

A

> netsh nap client show state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which two components must a NAP client have enabled in order to use NAP?

A

Security Center

NAP Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Why do you need a web server as part of your NAP remediation infrastructure?

A

to provide user information in case of a compliance failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Where do you look to find out which computers are blocked and which are granted access via NAP?

A

the NAP Server Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Health policies are in pairs. What are the members of the pair? Select two.

A

NAP-compliant

NAP-noncompliant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

You should restrict access only for clients that don’t have all available security updates installed if what situation exists?

A

the computers are running Windows Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What happens to a computer that isn’t running Windows Firewall?

A

The computer is isolated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Health policies are connected to what two other policies?

A

network policies

connection request policies

57
Q

To use the NAP-compliant policy, the client must do what?

A

pass all SHV checks

58
Q

Which computers are not affected by VPN enforcement?

A

locally connected computers

59
Q

What is the default authentication protocol for non-domain computers?

A

NTLM

60
Q

What does the acronym NTLM stand for?

A

NT LAN Manager

61
Q

Role seizure is performed using the ________ command

A

NTDSUTIL

62
Q

FSMO role change process where the original role-holder DC is down

A

seizure

63
Q

FSMO role change process where the original role-holder DC is running

A

transfer

64
Q

Which of the FSMO roles ideally should not be on a Global Catalog server?

A

Infrastructure master

65
Q

Every additional domain in the forest adds how many domain-wide roles?

A

three (which)

66
Q

A forest with one domain has how many operations master roles?

A

five (which)

67
Q

True or False. Only one domain controller in the domain or forest performs each FSMO role.

A

true

68
Q

Which FSMO role updates group membership changes?

A

Infrastructure Master

69
Q

Which FSMO role tracks, moves, and renames objects and also updates references from objects in its domain to objects in other domains?

A

Infrastructure Master

70
Q

Which FSMO role is responsible for updating changes made to objects?

A

Infrastructure Master

71
Q

Which FSMO role acts as a focal point for all Group Policy changes to avoid Group Policy object conflicts?

A

PDC Emulator

72
Q

Which FMSO role acts as the domain master browser, creating browse lists of workgroups, domains, and servers?

A

PDC Emulator

73
Q

Which FSMO role replicates password changes within a domain?

A

PDC Emulator

74
Q

Which FSMO role acts like a Windows NT 4.0 Primary Domain Controller (PDC) and performs other tasks normally associated with NT domain controllers.

A

PDC Emulator

75
Q

True or False. RIDs (and SIDs) can be reused.

A

False

76
Q

This is created for a new security principal by combining the RID with the domain ID

A

Security Identifier SID

77
Q

What is RID?

A

Relative ID

78
Q

Which FSMO role allocates pools or blocks of numbers (called relative IDs or RIDs) that are used by the domain controller when creating new security principals (such as user, group, or computer accounts).

A

RID Master

79
Q

True or False. The domain naming master is essential in a single-domain environment.

A

False

80
Q

Which FSMO role adds new domains to and removes existing domains from the forest.

A

Domain Naming Master

81
Q

True or False. All other domain controllers hold read-only replicas of the schema.

A

True

82
Q

Only the _______ can perform write operations to the directory schema.

A

Schema Master

83
Q

Schema updates are replicated from the schema master to _________ in the forest.

A

Domain Controllers

84
Q

How many schema masters do you have in a forest?

A

one

85
Q

Which FSMO role maintains the Active Directory schema for the forest?

A

Schema Master

86
Q

True or False. Having a single operations master means that the master role owner does not have to be available to make directory changes associated with that specific operations master role.

A

False

87
Q

True or False. Having a single operations master means that the role owner must be available when dependent activities in the enterprise or domain take place.

A

True

88
Q

A domain controller that performs an operations master role is known as

A

Operations master

89
Q

Term for specialized domain controller tasks assigned to a domain controller in the domain or forest

A

FSMO Roles

90
Q

What does FSMO stand for?

A

Flexible Single Master Operation

91
Q

What does RADIUS stand for?

A

Remote authentication dial-in user service

92
Q

What limitations does NPS installation have?

A

Cant be installed on Failover Cluster or server core?

93
Q

What role or feature allows RADIUS?

A

Network Policy and Access Server

94
Q

What is considered a client of a RADIUS Server?

A

A VPN Server is a client because it uses the authorization and authentication services.

95
Q

What authentication protocol is used for smart card suppart?

A

Extensible Authentication Protocol(EAP)

96
Q

What authentication protocol uses your password as authentication?

A

MS-CHAPv2

97
Q

How do priority and weight work in RADIUS?

A

Low priority wins and higher weight is more likely to be used.

98
Q

What are the 4 RADIUS Accounting modes?

A

SQL Only
Text Logging
Parralel(SQL and Tex)
SQL with backup

99
Q

What certificates does a NPS server need?

A

Workstation authentication for the client computer and server authentication for the NPS server.

100
Q

Where in Group Policy would you auto enroll clients for the workstation authentication cert?

A

Computer Config\Policies\Windows Settings\Security Settings\Public Key Policies.

101
Q

What are connection request policies?

A

defines which connections are processed by the NPS Server and which are processed on a remote RADIUS Server.

102
Q

What are network policies?

A

define who is allowed to connect to the network, how they are authenticated, and what access is permitted.

103
Q

What happens to existing NPS templates when you import a new one?

A

It replaces any existing templates with those in the imported XML file.

104
Q

What must you do after you import a NPS configuration?

A

You must reconfigure SQL Server Logging.

105
Q

How can you Export/Import NPS Configuration?

A

The NPS console
or
Export-NPSConfiguration
Import-NPSConfiguration

106
Q

What group do you add RRAS to to activate in AD?

A

RAS and IAS Servers security group.

107
Q

How can you export NPS templates?

A

You Rclick on Templates Management - it exports ALL the templates

108
Q

Where in NPS can you specify whether the server is going to be a Radius Server vs a Radius Proxy?

A

When you configure New Connection Request Policy on the Authentication settings.

For a Radius server you ‘authenticate requests on this server’

For a proxy you ‘Forward requests to the following remote RADIUS server group for authentication’

109
Q

Should you Grant or Deny access a network policy for remediation?

A

Grant. Deny would prevent access to the remediation server. You are Granting/Denying access to the Remediation server NOT to the network.

110
Q

Where on the NPS Console can you force accounting requests to a specific NPS/RADIUS Server?

A

Under Settings of a Connection Request Policy

111
Q

What are the possible common Framed Protocols?

A

PPP

SLIP

112
Q

Which servers of an NPS configuration are available on the restricted network?

A

Remediation

113
Q

Where must the certificate be located if it was issued by a 3rd Party?

A

Personal under Certificates(Local) on the NPS Server

114
Q

What PS Command will add a new RADIUS Server?

A

> Add-RemoteAccessRadius

115
Q

What command will disconnect a specific VPN connection by a user or computer?

A

Disconnect-VPNUser

116
Q

What role must be installed to deploy a VPN?

A

Remote Access

117
Q

To enable HRA automatic discovery, what registry key must be created and /or set on the clients that are domain members?

A

EnableDiscovery at HKLM/SOFTWARE/Policies/Microsoft\NetworkAccessProtection\ClientConfig\Enroll\HcsGroups

118
Q

What PS Command disconnect a site-to-site interface that is connected?

A

> Disconnect-VpnS2SInterface

119
Q

What three settings can you export and import to a new NPS server when you need to deploy a second NPS server that will be configured the same as the first?

A
  • Network Policies
  • Connection Request Policies
  • Radius Clients
120
Q

PS command to set VPN Authentication type

A

> Set-VPNAuthType

121
Q

To what two destinations can a RADIUS proxy forward connection attempts from RADIUS clients for further routing?

A

to Another Radius Proxy or to a Radius Server

122
Q

Which component of NPS defines configuration requirements for computers that attempt to connect to your network?

A

System Health Validators(SHVs)

123
Q

When a VPN server does not perform authentication and uses a RADIUS server, how should the VPN server be configured?

A

Solely as a RADIUS Proxy

124
Q

What PowerShell cmdlet is used to set the authentication method for incoming site-to-site (S2S) VPN interfaces?

A

> Set-VPNAuthProtocol

125
Q

What is a reason you would NOT automatically generate a shared secret in a Shared Secrets NPS template?

A

Not all clients support long Shared Secrets

126
Q

What is the only server that requires a certificate when using PEAP-MS-CHAP v2?

A

The server that performs authentication(Either RADIUS or Network Access Server)

127
Q

Which sections(s) in the NPS console will you use to create policies used with Network Access Protection (NAP) that designate the requirements of computers with regard to their health (such as security patches) before they are allowed to connect to the network?

A

Health Policies

128
Q

Which sections(s) in the NPS console will you use to define conditions under which computers can connect to the network and in which scenarios those policies apply?

A

Network Policies

129
Q

For which authentication methods does the NAP enforcement for 802.1x require you to deploy a PKI?

A

PEAP-TLS

130
Q

Which sections(s) in the NPS console will you use to define network access servers, wireless access points, or any other 802.1x compatible device that controls access to the network that needs to have its authentication requests processed by the RADIUS server?

A

Radius Clients

131
Q

Which NAP enforcement method does not require a certificate on the NPS server?

A

NAP for DHCP

132
Q

What PowerShell cmdlet modifies the configuration that is common to both DirectAccess (DA) and VPN, such as SSL certificate, internal interface, and Internet interface?

A

> Set-RemoteAccess

133
Q

Which four different types of network access servers can be RADIUS clients?

A
Wireless Access Points
802.1x authenticating Switches
Dial-in Servers
VPN Servers
Terminal Services Gateway server
134
Q

When an NPS server has a certificate issue by a third party, where must that certificate be located?

A

In the Personal store of the Certicates(Local) on the NPS server itself.

135
Q

What is exported when you export the entire NPS Configuration?

A
Radius Clients
Radius Servers
Network Policies
Connection Request Policies,
Registry,
Logging Info(But not SQL Logging info)
136
Q

Where do templates apply to?

A

Any server with the template assigned. If a template is changed on one NPS, it applies to all NPSs with that template.

137
Q

What configuration elements use templates?

A
Radius Shared Secret
Radius Clients
Remote Radius servers
IP Filters
Health Policies
Remediation Server Groups
138
Q

What are the 3 NPS migration picadilos?

A
  • 2003 SP2 or >
  • No cross languages
  • You can migrate 32 to 64bit.
139
Q

What is the name of the IAS/NPS Migration tool?

A

IASMIGREADER.exe