Chapter 7 - Implement Network Connectivity and Remote Access Solutions Flashcards
You are the administrator for your company network. You have a Windows Server 2016 server named Server1 that will be used as a virtual private network (VPN) server. What VPN protocol should you use if you need to configure Server1 to support VPN Reconnect?
A. Internet Key Exchange Protocol Version 2 (IKEv2)
B. Layer 2 Tunneling Protocol (L2TP)
C. Point-to-Point Tunneling Protocol (PPTP)
D. Secure Socket Tunneling Protocol (SSTP)
A. VPN Reconnect uses the Internet Key Exchange v2 (IKEv2) tunneling protocol. VPN Reconnect can be used in conjunction with DirectAccess.
You are the administrator for your company network. You have a Windows Server 2016 server named Server1 that is located on the perimeter network and only uses inbound TCP port 443 to connect from the Internet. You install the Remote Access server role on Server1. You need to configure Server1 to accept VPN connections over port 443. Which VPN protocol should you use?
A. Internet Key Exchange Protocol Version 2 (IKEv2)
B. Layer 2 Tunneling Protocol (L2TP)
C. Point-to-Point Tunneling Protocol (PPTP)
D. Secure Socket Tunneling Protocol (SSTP)
D. Secure Socket Tunneling Protocol (SSTP) is a form of VPN tunnel that provides a mech- anism to transport Point-to-Point Protocol (PPP) traffic through a Secure Sockets Layer/ Transport Layer Security (SSL/TLS) channel. SSL/TLS provides transport-level security with key negotiation, encryption, and traffic integrity checking. The use of SSL/TLS over TCP port 443 allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.
You are the administrator for your company network. You create a VPN connection that has the VPN type set to Automatic. What VPN protocol will be used first when attempting to establish a VPN connection?
A. Internet Key Exchange Protocol Version 2 (IKEv2)
B. Layer 2 Tunneling Protocol (L2TP)
C. Point-to-Point Tunneling Protocol (PPTP)
D. Secure Socket Tunneling Protocol (SSTP)
A. Routing and Remote Access Service (RRAS) supports Internet Key Exchange version 2 (IKEv2), a VPN tunneling protocol. The primary advantage of IKEv2 is that it tolerates inter- ruptions in the underlying network connection. If the connection is temporarily lost, or if a user moves a client computer from one network to another, IKEv2 automatically restores the VPN after the network connection is reestablished without intervention on the part of the user.
You are the administrator for your company network. You have an Active Directory domain. The domain contains Windows Server 2016 servers named Server1 and Server2. On Server1, you install the Remote Access server role. On Server2, you install the Network Policy and Access Services server role. What should you do if you need
to configure Server1 to use Server2 as a Remote Authentication Dial-In User Service (RADIUS) server?
A. Configure the authentication provider from Routing and Remote Access.
B. Create a Connection Manager profile from the Connection Manager Administration
Kit.
C. Create an Access Policy from Server Manager.
D. Modify the Delegation settings of the Server1 computer account from Active Directory Users and Computers.
A. When you select the RADIUS Authentication option from the Authentication Provider drop-down menu, you are enabling a RADIUS client that passes authentication duties to a RADIUS server.
To configure a RADIUS server to be the authentication provider:
1. Open the Routing and Remote Access MMC snap-in.
2. Right-click the server name for which you want to configure RADIUS authentication and then click Properties.
3. On the Security tab, in Authentication Provider, click RADIUS Authentication and then click Configure.
4. In the RADIUS Authentication dialog box, click Add.
5. In the Add RADIUS Server dialog box, configure the settings for your RADIUS authen-
tication server and then click OK.
You are the administrator for your company network. The network contains one Active Directory domain named abc.com. You deploy DirectAccess on the network. During the deployment, you enable DirectAccess only for a group called ABC\Test Computers. What should you do if you need to enable DirectAccess for all the client computers in the domain after the initial installation?
A. Modify the membership of the Windows Authorization Access Group from Active Directory Users and Computers.
B. Modify the security filtering of an object named DirectAccess Client Setting Group Policy from Group Policy Management.
C. Run the Set-DAClient cmdlet using PowerShell.
D. Run the Set-DirectAccess cmdlet using PowerShell.
B. Deploying Remote Access requires a minimum of two Group Policy Objects: one Group Policy Object contains settings for the Remote Access server and one contains settings for DirectAccess client computers. When you configure Remote Access, the wizard automati- cally creates the required Group Policy Object. However, if your organization enforces a naming convention, or you do not have the required permissions to create or edit Group Policy Objects, they must be created prior to configuring Remote Access.
You are the administrator for your company network. Your network contains an Active Directory forest. The forest contains two domains named abc.com and xyz.com. The com- pany recently deployed DirectAccess for the members of a group named DA_Computers. All client computers are members of DA_Computers. You discover that DirectAccess clients can access the resources located in the abc.com domain only. The clients can access the resources in the xyz.com domain by using an L2TP VPN connection to the network. What should you do if you need to ensure that the DirectAccess clients can access the resources in the xyz.com domain?
A. Configure the Delegation settings from the properties of the servers in xyz.com.
B. Create a zone delegation for xyz.com on an external DNS server.
C. Modify the Name Resolution Policy Table (NRPT) from a Group Policy Object (GPO).
D. Add the servers in xyz.com to the RAS and IAS Servers group.
C. The Name Resolution Policy Table (NRPT) contains rules configured by an administra- tor for either names or namespaces and the settings for the required special handling. When performing a DNS name resolution, the DNS Client service compares the requested name against each rule in the NRPT before sending a DNS name query. Queries and responses that match an NRPT rule get the specified special handling applied. You can configure the NRPT with Group Policy.
You are the administrator for your company network. You have a Windows Server 2016 Remote Access server named Server1 that has DirectAccess enabled. You have a proxy server named Server2. All computers on the internal network connect to the Internet by using the proxy. You run the cmdlet Set-DAClient -forceTunnel Enabled on Server1. Which cmdlet should you run on Server1 if you need to ensure that when a DirectAccess client connects to the network the client accesses all the Internet resources through the proxy? A. Set-DAEntryPoint B. Set-DnsClientGlobalSetting C. Set-DnsClientNrptGlobal D. Set-DnsClientNrptRule
A. The Set-DAEntryPoint cmdlet configures entry point settings, including the name of the server in the entry point, the name of the entry point, and the IP address used for global load balancing on the specified entry point.
You are the administrator for your company network. You are discussing Remote Access Service (RAS) Gateway modes with a colleague. Which mode are you describing here? Deploy the RAS Gateway as an edge VPN server, an edge DirectAccess server, or both simultaneously. In this configuration, RAS Gateway provides remote employees with con- nectivity to your network by using either VPN or DirectAccess connections. A. Multitenant mode B. Single tenant mode C. Unattached tenant mode D. Remote tenant mode
B. In the single tenant mode, administrators can deploy RAS Gateways as an edge VPN server, an edge DirectAccess server, or both simultaneously. Using RAS Gateways this
way provides remote users with connectivity to your network by using either VPN or DirectAccess connections. Also, single tenant mode allows administrators to connect offices at different physical locations through the Internet.
You are the administrator for your company network. Your company has a main office
and has 1,000 users who are located in other countries. You plan to deploy a large Remote Access solution for the company. The main office has three Windows Server 2016 servers named Server1, Server2, and Server3. You plan to use Server1 as a VPN server, Server2 as
a RADIUS proxy, and Server3 as a RADIUS server. What actions should you perform on Server2 if you need to configure Server2 to support the planned deployment? (Choose three.)
A. Add a RADIUS client.
B. Create a connection request policy.
C. Create a network policy.
D. Create a remote RADIUS server group.
E. Deploy a Windows container.
A, B, D. To set up a RADIUS server, the components needed on the RADIUS server include the RADIUS client and a RADIUS group. Microsoft recommends that you set up RADIUS connection policies as well.
You are the administrator for your company network. Your network contains an Active Directory forest that has a functional level of Windows Server 2012. The forest contains five domain controllers and five VPN servers that run Windows Server 2016. The VPN server has 500 users who connect daily. What should you do first if you need to configure a new RADIUS server named Server1?
A. Deploy the Remote Access server role on Server1.
B. Set the forest functional level to Windows Server 2016 on a domain controller.
C. Deploy the Network Policy and Access Services role on Server1.
D. Run the New-NpsRadiusClient cmdlet on each VPN server.
C. Network Policy Server (NPS) is Microsoft’s solution for enforcing company-wide access policies, including remote authentication. NPS is a role service of the Network Policy
and Access Services (NPAS) server role. Other role services of NPAS are the Routing and Remote Access Service, Health Registration Authority, and Host Credential. These help you safeguard the health and security of a network.
You are the administrator for your company network. Your company has 5,000 remote users. You have 40 VPN servers that host the remote connections. You plan to deploy a RADIUS solution that contains five RADIUS servers. What should you do if you need to ensure that client authentication requests are distributed evenly among the RADIUS servers?
A. Install the Network Load Balancing (NLB) role service on all of the RADIUS servers and configure all of the RADIUS clients to connect to a virtual IP address.
B. Deploy a RADIUS proxy to a new server and configure all of the RADIUS clients to connect to the RADIUS proxy.
C. Deploy a RAS Gateway to a new server and configure all of the RADIUS clients to connect to the RAS Gateway.
D. Install the Failover Clustering role service on all of the RADIUS servers and configure all of the RADIUS clients to connect to the IP address of the cluster.
B. Use Network Policy Server (NPS) configured as a RADIUS proxy to load balance con- nection requests between multiple NPS servers or other RADIUS servers. On the NPS proxy, configure load balancing so that the proxy evenly distributes the connection requests among the RADIUS servers. This method of load balancing is best for medium and large organizations that have many RADIUS clients and servers.
You are the administrator for your company network. You have multiple servers that run Windows Server 2016 and are configured as VPN servers. You deploy a Network Policy Server (NPS) server named NPS1. What should you configure on NPS1 so that it will accept authentication requests from the VPN servers?
A. Add a connection request policy from Policies.
B. Add a remote RADIUS server group from RADIUS Clients and Servers.
C. Add RADIUS clients from RADIUS Clients and Servers.
D. Add a network policy from Policies.
C. When you add a new network access server (VPN server, wireless access point, authen- ticating switch, or dial-up server) to your network, you must add the server as a RADIUS client in NPS so that NPS is aware of and can communicate with the network access server. On the NPS server, in the NPS console, double-click RADIUS Clients and Servers.
You are the administrator for your company network. Your company has a Sales depart- ment. The network contains an Active Directory domain. The domain contains two top- level organizational units (OUs) named Sales_Computers, which contains the computer accounts, and Sales_Users, which contains the user accounts. You link a new Group Policy Object (GPO) named GPO1 to Sales_Computers. You need to deploy a VPN connection to all of the users who sign in to the Sales department computers. The users must be placed where?
A. Computer Configuration/Policies/Administrative Templates/Network/Network Connections
B. Computer Configuration/Preferences/Control Panel Settings/Network Options
C. User Configuration/Preferences/Control Panel Settings/Network Options
D. User Configuration/Policies/Administrative Templates/Network/Network Connections
C. Create a VPN connection for the users by following User Configuration/Preferences/ Control Panel Settings/Network Options.
You are the administrator for your company network. The company has employees who work remotely by using a VPN connection from their computers. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application using a public cloud. Some users report that every time they try to download the application by using Internet Explorer they receive a warning message that indicates the application could harm their computer. What should you do if you need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers?
A. Use the intranet website to publish the application.
B. Use the Windows Store to publish the application.
C. Use a public File Transfer Protocol (FTP) site to publish the application.
D. Using the Internet Explorer settings, instruct the employees to disable the SmartScreen Filter.
A. Intranet is the generic term for a collection of private computer networks within an organization. The intranet uses network technologies as a tool to facilitate communication between people or work groups to improve the data-sharing capability and overall knowl- edge base of an organization’s employees. The Internet utilizes standard network hardware and software technologies like Ethernet, Wi-Fi, TCP/IP, web browsers, and web servers. An organization’s intranet typically includes Internet access but is firewalled so that its comput- ers cannot be reached directly from the outside. Because all the users can connect via VPN, this would allow access to the intranet website and the published application.
You are the administrator for your company network. Which Control Panel application should you use if you need to change the password used for an L2TP VPN connection? A. Credential Manager B. System C. Network and Sharing Center D. Phone and Modem E. Power Options F. RemoteApp and Desktop Connections G. Sync Center H. Work Folders
C. The Control Panel application from which most of the networking settings and tasks can be launched is the Network and Sharing Center. The Network and Sharing Center is one of the most important Control Panel apps for managing your network connections.
You are the administrator for your company network. Your company has 100 client com- puters. The client computers are connected to a corporate private network. You deploy
a Remote Desktop Gateway, DirectAccess, and a VPN server at the main office. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop. You need to ensure that users can remotely connect to their office computers by using Remote Desktop. What should you configure if the users must not be able to access any other corporate network resource from their home computers?
A. A VPN connection
B. The Remote Desktop Gateway IP address in the advanced Remote Desktop Connection
settings on each client
C. The local resource settings of the Remote Desktop connection
D. A DirectAccess connection
B. The solution is to deploy Remote Desktop Gateway in the office. Remote users can then connect to their computers on the office network by using Remote Desktop client on their home computers configured with the IP address of the Remote Desktop Gateway. Remote Desktop Gateway (RD Gateway) is a role service that enables authorized remote users to con- nect to resources on an internal corporate or private network, from any Internet-connected device that can run the Remote Desktop Connection (RDC) client. VPN connections would enable remote access to the office network, but this solution would not prevent users from accessing other corporate network resources. Remote Desktop local resources determine which local resources (printers, drives, etc.) are available in a Remote Desktop connection. However, this solution makes no provision for actually connecting to the office network. DirectAccess connections would enable remote access to the office network, but this solution would not prevent users from accessing other corporate network resources.
You are the administrator for your company network. Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols. A user named Sue works from home and has a desktop computer. She has an application named App1 that requires access to a server on the corporate network. She creates a VPN connection on the computer. What should you do if you need to ensure that, when Sue opens App1, she can access the required data?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnectionTriggerApplication cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
D. The Add-VpnConnectionTriggerApplication cmdlet adds applications to a VPN con- nection object. The applications automatically trigger a VPN connection when launched. This setting allows App1 to automatically request the VPN connection to ensure it can access the required data.
You are the administrator for your company network. Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols. A user named User1 creates an SSTP VPN connection to a network named VPN1. User1 successfully connects to the VPN server. When the user roams between dif- ferent Wi-Fi access points, the user loses the connection to the corporate network and must manually reestablish the VPN connection. What should you do if you need to ensure that VPN1 automatically maintains the connection while the user roams between Wi-Fi access points?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnection Trigger Application cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
H. The Set-VpnConnection cmdlet changes the configuration settings of an existing VPN connection profile. If the VPN profile specified does not exist, you see an error. If errors occur when you modify the VPN profile, the cmdlet returns the error information.
You are the administrator for your company network. Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols. You have mobile devices and have a VPN connection to the VPN server. What should you do if you need to ensure that when users work remotely they can connect to the VPN, and that only traffic for the corporate network is sent through the VPN server?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnection Trigger Application cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
E. The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer. The -Direction parameter specifies that matching firewall rules of the indicated direction are created. This parameter specifies which direc- tion of traffic to match with this rule. The acceptable values for this parameter are Inbound or Outbound. The default value is Inbound.
You are the administrator for your company network. A user connects to a wireless net- work and receives the following message: “Do you want to allow your PC to be discover- able by other PCs and devices on this network?” The user clicks No. The user is unable
to browse to the shared folders of other computers on the network by using File Explorer. What should you do if you need to ensure that the user can browse to the other computers?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnection Trigger Application cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
D. The Add-VpnConnectionTriggerApplication cmdlet adds applications to a VPN con- nection object. The applications automatically trigger a VPN connection when launched. This setting allows App1 to automatically request the VPN connection to ensure it can access the required data.
You are the administrator for your company network. Your network contains a single Active Directory domain. What should you do if you need to prevent computers from connecting to hosts on subnet 131.107.0.0/24?
A. Click Turn on Password Protected Sharing.
B. Disable Network Discovery.
C. Modify the Profile settings of an incoming firewall rule.
D. Run the Add-VpnConnection Trigger Application cmdlet.
E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.
F. Run the New-VpnConnection cmdlet.
G. Run the Set-NetConnectionProfile cmdlet.
H. Run the Set-VpnConnection cmdlet.
E. The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer. The -Direction parameter specifies that matching firewall rules of the indicated direction are created. This parameter specifies which direc- tion of traffic to match with this rule. The acceptable values for this parameter are Inbound or Outbound. The default value is Inbound.
You are the administrator for your company network. You have a Windows Server 2016 server named Server1. What should you install on Server1 if you need to configure Server1 as a multitenant RAS Gateway?
A. The Network Controller server role
B. The Network Policy and Access Services server role C. The Data Center Bridging feature
D. The Remote Access server role
D. Remote Access is a server role that provides administrators with a dashboard for man- aging, configuring, and monitoring network access. The Remote Access server role is a logi- cal grouping of Remote Access Service (RAS), Routing, and Web Application Proxy. These technologies are the role services of the Remote Access server role. When you install the Remote Access server role with the Add Roles and Features Wizard or with Windows Pow- erShell, you can install one or more of these role services.
You are the administrator for your company network. You are planning to implement a VPN. You currently have the following servers:
DC1 – Domain Controller and DNS Server
FS1 – DHCP Server and File Server
RA1 – Remote Access Server
RS1 – Network Policy Server (NPS) Server RP1 – Network Policy Server (NPS) Server
RA1 will use the RADIUS proxy for authentication. You need to ensure that VPN clients can be authenticated and can access internal resources. What actions should you perform if you need to ensure that RS1 is used as a RADIUS server and RP1 is used as a RADIUS proxy? (Choose two.)
A. On RS1, create a connection request policy.
B. On RP1, create a connection request policy.
C. On FS1, create a network policy.
D. On RS1, delete the default connection request policy.
E. On RP1, create a network policy.
B, D. Connection request policies are sets of conditions and settings that allow admin- istrators to designate which RADIUS servers authenticate and authorize the connection requests that the server running Network Policy Server (NPS) receives from the RADIUS clients. The default connection request policy uses NPS as a RADIUS server and processes all authentication requests locally. If you do not want the NPS server to act as a RADIUS server and process connection requests locally, you can delete the default connection request policy.
You are the administrator for your company network. You support desktop computers and tablets that run an older version of Windows. All of the computers are able to connect to your company network from the Internet by using DirectAccess. Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:
- The application is isolated from other applications.
- The application uses the least amount of disk space on the tablet.
- The application can access files stored on an internal Solid State Drive (SSD) on the tablets.
What should you do if you need to deploy the new application to the tablets? A. Install the application in a Windows To Go workspace.
B. Install Hyper-V on a tablet and then install the application on a virtual machine.
C. Deploy the application as an Application Virtualization (App-V) package and install
the App-V 4.6 client on the tablets.
D. Install the application on a local drive on the tablets.
E. Publish the application to Windows Store.
F. Install the application within a separate installation in a virtual hard disk (VHD) file and then configure the tablets with dual boot.
G. Deploy the application as a published application on the Remote Desktop server and create a Remote Desktop connection on the tablets.
H. Install the application within a separate installation in a VHDX file and then configure tablets with dual boot.
G. Deploying the application as a published application on the Remote Desktop server will use no disk space on the tablets. Users will be able to access the application by using Remote Desktop Connections. This will also ensure that the application is isolated from other applications on the tablets. You can use Remote Desktop Connection “redirection” to ensure that the application can access files stored on an internal SSD on the tablets. The redirection enables access to local resources such as drives and printers in a Remote Desk- top Connection.