Exam 9: Network Policy and Access Services in Windows Server 2008
Exam 1: Introduction to Windows Server 200842 Questions
Exam 2: Installing Windows Server 200842 Questions
Exam 3: Networking with Windows Server 200842 Questions
Exam 4: Installing and Configuring the Dynamic Host Configuration Protocol42 Questions
Exam 5: Introduction to DNS in Windows Server 200842 Questions
Exam 6: Managing and Administering DNS in Windows Server 200842 Questions
Exam 7: Configuring File Services in Windows Server 200842 Questions
Exam 8: Introduction to Printers in a Windows Server 2008 Network42 Questions
Exam 9: Network Policy and Access Services in Windows Server 200842 Questions
Exam 10: Securing Windows Server 200843 Questions
Exam 11: Managing and Monitoring a Windows Server 2008 Network41 Questions
Select questions type
What is the difference between EAP over local area network and EAP over wireless?
Free
(Essay)
4.7/5
(36)
Correct Answer:
EAP over local area network (LAN) - Known by the acronym EAPOL, EAP over LAN refers to 802.1x implementations in which clients make physical Ethernet connections over Ethernet cable.
EAP over wireless - Known by the acronym EAPOW, EAP over wireless refers to 802.1x implementations in which clients make wireless Ethernet connections.
_____________________________________________ allows you to shield internal IP address ranges from public networks by allowing internal clients to access the Internet through a shared IP address.
Free
(Short Answer)
4.8/5
(40)
Correct Answer:
NAT (Network address translation)
Network address translation (NAT)
Network address translation
NAT
____ is the first component of the RADIUS process in which the identity of a user connecting to a resource is verified.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
B
A ____ is any device such as a remote access server, wireless access point, or VPN concentrator, that accepts remote connections from remote access clients.
(Multiple Choice)
4.8/5
(30)
____ are used on networks to perform authentication, authorization, and accounting for RADIUS clients, or convey authentication requests to other centralized authenticating systems.
(Multiple Choice)
4.9/5
(34)
What is the purpose of the Protected PEAP-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP
(Essay)
4.9/5
(27)
Routing tables can be managed in the RRAS console or from the command line using the route command.
(True/False)
4.8/5
(34)
Match each item with a statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(36)
The ____ component of RRAS provides support for multicast network traffic by routing multicast traffic to networks that host these services.
(Multiple Choice)
4.8/5
(39)
____ works by encapsulating PPP frames before they are transmitted across a network.
(Multiple Choice)
4.9/5
(38)
A(n) ____ is a setting used to route RADIUS messages between the access client and the appropriate RADIUS server.
(Multiple Choice)
4.7/5
(28)
What information is displayed in the following columns of a routing table: Network Destination and Netmask?
(Essay)
4.8/5
(37)
RIPv2 uses ____ in determining the dynamic routes it can use for forwarding packets of data.
(Multiple Choice)
4.9/5
(35)
What tasks does the Network Policy Server allow you to perform in Windows Server 2008?
(Essay)
4.9/5
(41)
_________________________ protocols encapsulate data packets inside a new packet header.
(Short Answer)
4.8/5
(39)
____ route traffic based on information they discover about remote networks from other routers.
(Multiple Choice)
5.0/5
(36)
____ uses PPP to encapsulate traffic for transmission across network using a secure socket layer (SSL) connection.
(Multiple Choice)
4.8/5
(32)
A ____ is responsible for providing network access to remote access clients such as users needing VPN or dial-in network access.
(Multiple Choice)
5.0/5
(36)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)