Deck 9: Network Policy and Access Services in Windows Server 2008
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 9: Network Policy and Access Services in Windows Server 2008
1
The ____ is a role service that provides you with a framework for creating and enforcing network access policies for client health, along with policies for authentication and authorization of connection requests.
A) IGMP router
C) network access server
B) DHCP relay agent
D) Network Policy Server
A) IGMP router
C) network access server
B) DHCP relay agent
D) Network Policy Server
D
2
As a software-based router, RRAS is recommended for use in small networks that require simple routing directions but is not recommended for large and complex environments.
True
3
____ supports securing VPNs using 128-bit RC4 encryption.
A) NAT
C) NIC
B) PPTP
D) RADIUS
A) NAT
C) NIC
B) PPTP
D) RADIUS
B
4
____ is a role service used to configure and manage network routing in Windows Server 2008.
A) DHCP
C) RADIUS
B) IGMP
D) Routing and Remote Access Services
A) DHCP
C) RADIUS
B) IGMP
D) Routing and Remote Access Services
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ is an industry-standard protocol that provides centralized authentication, authorization, and accounting for network access devices such as wireless access points and remote access servers.
A) DHCP
C) RADIUS
B) UDP
D) TCP/IP
A) DHCP
C) RADIUS
B) UDP
D) TCP/IP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
With RRAS, network adapters are added and configured to listen for UDP broadcast messages.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ is the central utility for managing RADIUS clients and remote RADIUS servers, network health and access policies, NAP settings for NAP scenarios, and logging settings.
A) NPS console
C) supplicant
B) UDP
D) VPN
A) NPS console
C) supplicant
B) UDP
D) VPN
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ provides Dynamic Host Configuration Protocol (DHCP) relay agent functionality for networks.
A) Layer 2 Tunneling Protocol
C) RADIUS
B) RRAS
D) Network access control
A) Layer 2 Tunneling Protocol
C) RADIUS
B) RRAS
D) Network access control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Routing tables can be managed in the RRAS console or from the command line using the route command.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ works by encapsulating PPP frames before they are transmitted across a network.
A) Demand-dial routing
C) Layer 2 Tunneling Protocol
B) Network access control
D) Network Access Protection
A) Demand-dial routing
C) Layer 2 Tunneling Protocol
B) Network access control
D) Network Access Protection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
RIPv2 uses ____ in determining the dynamic routes it can use for forwarding packets of data.
A) root hints
C) SIDs
B) RIP neighbors
D) RADIUS clients
A) root hints
C) SIDs
B) RIP neighbors
D) RADIUS clients
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ are composed of routes.
A) Relay agents
C) Supplicants
B) Routing tables
D) RADIUS servers
A) Relay agents
C) Supplicants
B) Routing tables
D) RADIUS servers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ uses PPP to encapsulate traffic for transmission across network using a secure socket layer (SSL) connection.
A) Secure Socket Tunneling Protocol
C) TCP/IP
B) Dial-up networking
D) A header
A) Secure Socket Tunneling Protocol
C) TCP/IP
B) Dial-up networking
D) A header
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ are responsible for forwarding packets between subnets, or networks with differing IP addressing schemes.
A) Routers
C) Databases
B) VPNs
D) DHCP relay agent
A) Routers
C) Databases
B) VPNs
D) DHCP relay agent
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A(n) ____ forwards DHCPDiscover messages for subnets that do not have a DHCP server and that are not connected to a router that supports passing DHCP broadcast messages.
A) DHCP relay agent
C) authenticator
B) BitLocker
D) IGMP router
A) DHCP relay agent
C) authenticator
B) BitLocker
D) IGMP router
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The ____ component of RRAS provides support for multicast network traffic by routing multicast traffic to networks that host these services.
A) root hint
C) IGMP router and proxy
B) stub zone
D) client
A) root hint
C) IGMP router and proxy
B) stub zone
D) client
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
In situations where you do not have a RFC 1542-compliant router, you can create a DHCP relay agent using ____.
A) XML
C) TCP/IP
B) UDP
D) RRAS
A) XML
C) TCP/IP
B) UDP
D) RRAS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
A RADIUS client can be an NPS, which replaces the IAS from previous versions of Windows Server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ route traffic based on information they discover about remote networks from other routers.
A) Authentication servers
C) Dynamic protocols
B) Supplicants
D) Stub zones
A) Authentication servers
C) Dynamic protocols
B) Supplicants
D) Stub zones
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A UDP relay agent manages the communication between a network's DHCP server and clients on subnets without a DHCP server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
A(n) ____ is the database used by a RADIUS server to authenticate users.
A) dynamic database
C) user account database
B) supplicant
D) client database
A) dynamic database
C) user account database
B) supplicant
D) client database
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
_________________________ allows a server to initiate a connection only when it receives data traffic bound for a remote network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Prior to the proliferation of broadband Internet connections, _________________________ was common for connecting remote users to their networks using a standard phone line.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) ____ is a setting used to route RADIUS messages between the access client and the appropriate RADIUS server.
A) RADIUS proxy
C) VPN
B) RADIUS client
D) network access server
A) RADIUS proxy
C) VPN
B) RADIUS client
D) network access server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
_________________________ protocols encapsulate data packets inside a new packet header.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What is the purpose of the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
What information is displayed in the following columns of a routing table: Network Destination and Netmask?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A ____ is any device such as a remote access server, wireless access point, or VPN concentrator, that accepts remote connections from remote access clients.
A) supplicant
C) routing table
B) RADIUS client
D) VPN
A) supplicant
C) routing table
B) RADIUS client
D) VPN
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
____ is the first component of the RADIUS process in which the identity of a user connecting to a resource is verified.
A) Authorization
C) Accounting
B) Authentication
D) Routing
A) Authorization
C) Accounting
B) Authentication
D) Routing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
What is the purpose of the Protected Extensible Authentication Protocol-Transport Layer Security PEAP-TLS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ are used on networks to perform authentication, authorization, and accounting for RADIUS clients, or convey authentication requests to other centralized authenticating systems.
A) RADIUS servers
C) Dynamic protocols
B) Routers
D) Sockets
A) RADIUS servers
C) Dynamic protocols
B) Routers
D) Sockets
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Give three reasons why static routing is limited.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
A ____ is responsible for providing network access to remote access clients such as users needing VPN or dial-in network access.
A) RADIUS proxy
C) RADIUS server
B) RADIUS client
D) network access server
A) RADIUS proxy
C) RADIUS server
B) RADIUS client
D) network access server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
_____________________________________________ allows you to shield internal IP address ranges from public networks by allowing internal clients to access the Internet through a shared IP address.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What tasks does the Network Policy Server allow you to perform in Windows Server 2008?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What is the difference between a supplicant and authenticator?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
___________________________________ provide secure network access for remote clients over the Internet through the use of tunneling protocols.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What information is displayed in the following columns of a routing table: Gateway and Interface?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
What is the purpose of the Protected PEAP-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What is the difference between EAP over local area network and EAP over wireless?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What is an authentication server?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck