5.6 Flashcards

1
Q

You are the network administrator for eastsim.com. The network consists of a single domain. All the servers
run Windows Server 2012 R2. All the clients run Windows 7 or Windows 8.
A server at the main office named NP1 runs the Network Access Policy (NPS) server role. You need to disable
IPv6 for all connections except for the tunnel interface and the IPv6 Loopback address.
What should you do?

Select Properties of the Local Area Connection and uncheck Internet Protocol Versions 6 (TCP/IPv6).

Run the netsh interface ipv6 delete command.

Run the IP6 rt command.

Run the IP6 if command.

A

Select Properties of the Local Area Connection and uncheck Internet Protocol Versions 6 (TCP/IPv6).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are the server administrator for the westsim.com domain. Your network has a main office in Tulsa, with
a branch office in Norman.
You want to provide a site-to-site VPN solution to connect the two sites that supports NAP health certificates.
Which protocol should you use?

Layer Two Tunneling Protocol (L2TP)

Secure Socket Tunneling Protocol (SSTP)

Point-to-Point Tunneling Protocol (PPTP)

Internet Protocol Security (IPsec)

A

Internet Protocol Security (IPsec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Several employees in your company have personal laptop computers that they bring to work and connect to
the company network. Because they often use these laptops while traveling or to help them do their jobs, you
can’t prevent them from connecting to the network. However, you are concerned that many of these
computers don’t have the latest security patches installed.
You want to implement a solution so that computers are checked for the latest security updates as they
connect to the network. If the required updates are missing, you want to prevent these computers from
having full access to the private network.
What should you do?

Implement Network Access Protection (NAP) with a quarantine network.

Configure Windows Server Update Services (WSUS) with Automatic Updates.

Configure a Software Installation policy in Group Policy.

Configure Software Restriction Policies in Group Policy.

A

Implement Network Access Protection (NAP) with a quarantine network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have decided to use Network Access Protection (NAP) with 802.1x authentication on your network. You
have already configured the necessary servers and services. Now you need to configure client computers to
connect to the network.
Which enforcement client should you enable on the client?

Remote Access Quarantine Enforcement Client

EAP Quarantine Enforcement Client

IPsec Relying Party

DHCP Quarantine Enforcement Client

RD Gateway Quarantine Enforcement Client

A

EAP Quarantine Enforcement Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have decided to implement Network Access Protection (NAP) with 802.1x authentication on your
network.
You have installed the Network Access and Policy Server role, configured the System Health Validator (SHV),
created health policies, and configured network policies.
Which additional steps will you need to perform to complete the configuration? (Select two. Each choice is a
possible action.)

Create a connection request policy that uses PEAP authentication and has quarantine checks enabled

Configure the enforcement point as a RADIUS client

Configure a Health Registration Authority (HRA)

In the network policy, configure VLAN memberships

Enable Network Access Protection on the scope of the DHCP server

A

Configure the enforcement point as a RADIUS client

In the network policy, configure VLAN memberships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have decided to implement Network Access Protection (NAP) with IPsec on your network.
You have installed the NPS role, configured the System Health Validator (SHV), created health policies, and
configured network policies.
Which additional steps will you need to perform to complete the configuration? (Select two. Each choice is a
possible action.)

Enable Network Access Protection on the scope of the DHCP server

Configure connection authorization policies

Define restricted, boundary, and secure networks

Configure a Health Registration Authority (HRA)

A

Define restricted, boundary, and secure networks

Configure a Health Registration Authority (HRA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have decided to implement Network Access Protection (NAP) with RD Gateway on your network.
You have installed the NPS role, configured the System Health Validator (SHV), created health policies, and
configured network policies.
Which additional step will you need to perform to complete the configuration?

Enable Network Access Protection on the scope of the DHCP server

Configure a Health Registration Authority (HRA)

Configure connection authorization policies

Define restricted, boundary, and secure networks

A

Configure connection authorization policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have decided to implement Network Access Protection (NAP) with a VPN on your network.
You have installed the NPS role, configured the System Health Validator (SHV), created health policies, and
configured network policies.
Which additional step will you need to perform to complete the configuration?

Configure connection authorization policies

Configure a Health Registration Authority (HRA)

Create a connection request policy that uses PEAP authentication and has quarantine checks enabled

Define restricted, boundary, and secure networks

A

Create a connection request policy that uses PEAP authentication and has quarantine checks enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have decided to implement Network Access Protection (NAP) on your network. You decide to create two
categories of computers:

Those that pass all health checks

Those that fail one or more health checks

Those that pass all checks should be granted full network access, while those that fail one or more should be granted access only to the quarantine network.
How should you configure NAP for this scenario? (Select two. Each choice is a required part of the solution.)

Configure two Network Policies

Configure one Network Policy

Configure two Health Policies

Configure one Health Policy

A

Configure two Network Policies

Configure two Health Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have decided to implement Network Access Protection (NAP) on your network. You want to impose the
following restrictions:

Computers without antivirus software should not be allowed to connect.
Computers without the latest security updates should not be allowed to connect.
No other health checks should be performed.

Which NAP component would you modify to enable the health checks that should be performed when clients
attempt to connect?

Health Policy for non-compliant computers
Network Policy for non-compliant computers
System Health Validator (SHV)
Health Policy for compliant computers
Network Policy for compliant computers

A

System Health Validator (SHV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have decided to implement Network Access Protection (NAP) on your network. You want to impose the
following restrictions:

Computers without antivirus software should not be allowed to connect.
Computers without the latest security updates should not be allowed to connect.
No other health checks should be performed.

You create two health policies and two network policies: one each for compliant computers, and one each for
non-compliant computers. Only computers that pass all health checks should be allowed to connect to the
unrestricted network.

You perform a check of the configuration and find that a computer with antivirus software, but without the
latest security patches is allowed to connect. Another computer that has no antivirus software, but with the
required security updates is also allowed to connect. Only computers missing both the antivirus software and
the security updates are prevented from connecting.
You need to modify the configuration so that any client failing one or more health checks is not allowed to
connect
Which NAP component would you modify?

System Health Validator (SHV)

Network Policy

Health Registration Authority (HRA)

Health Policy

A

Health Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have decided to implement Network Access Protection (NAP) on your network. You want to impose the
following restrictions:

Computers without antivirus software should not be allowed to connect.
Computers without the latest security updates should not be allowed to connect.
No other health checks should be performed.

You create two health policies and two network policies: one each for compliant computers, and one each for
non-compliant computers.
Which of the following settings would you choose when configuring the non-compliant health policy?

Client passes all SHV checks

Client passes one or more SHV checks

Client fails one or more SHV checks

Client fails all SHV checks

A

Client fails one or more SHV checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have decided to implement Network Access Protection (NAP) on your network. You want to impose the
following restrictions:

Computers without antivirus software should not be allowed to connect.
Computers without the latest security updates should not be allowed to connect.
No other health checks should be performed.

You create two health policies and two network policies: one each for compliant computers, and one each for
non-compliant computers. Only computers that pass all health checks should be allowed to connect to the
unrestricted network.
You are configuring the network policy for the non-compliant computers.
Which of the following will be part of the network policy configuration? (Select three.)

Enable health checks to verify antivirus software and security updates

For the client state, select Client fails one or more SHV checks

Identify remediation server groups that can be used

For NAP enforcement, select Allow limited access

Select the SHV used for validating client health

For authentication, choose Perform machine health check only

A

Identify remediation server groups that can be used

For NAP enforcement, select Allow limited access

For authentication, choose Perform machine health check only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly