Final Flashcards

(100 cards)

1
Q

What kind of RADIUS server is placed between the RADIUS server and RADIUS clients?

a RADIUS client server
a RADIUS engine server
a RADIUS proxy server
a RADIUS relay server

A

a RADIUS proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a RADIUS server known as in Microsoft parlance?

Network Access Server
Network Policy Server
Network Authentication Server
Network Remote Access Server

A

Network Policy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When an access client contacts a VPN server or wireless access point, a connection request is sent to what system?

the NPS server
the 802.1X switch
an authorization relay
an access client

A

the NPS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the final step in the authentication, authorization, and accounting scenario between an access client and the RADIUS server?

a log entry that the connection is established
an Access-Reject message to the access server
a final credential check with the domain controller
an Accounting-Response to the access server

A

an Accounting-Response to the access server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which parameter specifies the order of importance of the RADIUS server to the NPS proxy server?

relay link number
weight
precedence
priority

A

priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What information does the Accounting-Start message contain?

the RADIUS server name and IP address
the type of service and the user it’s delivered to
the list of permissions granted to the user
the list of services provided to RADIUS access servers

A

the type of service and the user it’s delivered to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of NPS authentication is recommended over password authentication?

certificate
complex
biometric
PAP2

A

certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where do you get certificates for authentication purposes

Microsoft
the computer manufacturer
a certificate authority
a certificate broker

A

a certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What would be the biggest problem with configuring text files for accounting logging?

Space; filling up the C drive has catastrophic effects.
Logs are saved as plain text format.
Data isn’t sent to a SQL Server database.
Writing logs to disk requires disk I/O, which might impact performance.

A

Space; filling up the C drive has catastrophic effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity?

who, what, and where
who, when, and how
who, when, and where
who, how, and how long

A

who, when, and how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The default connection request policy uses NPS as what kind of server?

DNS
Active Domain controller
RRAS
RADIUS

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the last setting in the Routing and Remote Access IP settings?

the number of assigned IP addresses
which DHCP server will supply the requests
which NPS server to connect to
how IP addresses are assigned

A

how IP addresses are assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To which type of file do you export an NPS configuration?

TXT
DOC
XML
NPS

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network policies determine what two important connectivity constraints?

who is authorized to connect
the DHCP server for the connection
the DNS server for the connection
the connection circumstances for connectivity

A

who is authorized to connect

& the connection circumstances for connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If a remote connection attempt does not match any configured constraints, what does the Remote Access server do to the connection?

retries
accepts
denies
locks

A

denies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two of the following are Routing and Remote Access IP settings?

Server Must Request an IP Address
Client May Request an IP Address
Server Must Supply an IP Address
Client Must Supply an IP Address

A

Client May Request an IP Address

& Server Must Supply an IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is the strongest type of encryption?

MPPE 40-Bit
MPPE 56-Bit
MPPE 128-Bit
No Encryption

A

MPPE 128-Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RADIUS Access-Request messages are processed or forwarded by NPS only if the settings of the incoming message match what on the NPS server?

one of the connection request policies
the time zone of the requestor
the client type of the requestor
the TCP/IP port of the requestor

A

one of the connection request policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network Access Protection (NAP) is Microsoft’s software for controlling network access of computers based on what?

a computer’s IP address and VLAN
a computer’s overall health
a computer’s Windows version
a computer’s network functionality (role)

A

a computer’s overall health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DHCP enforcement is not available for what kind of clients?

mobile
remote dial-up
noncompliant
IPv6

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of Active Directory domain controller is recommended to minimize security risks for remediation servers?

Windows Server 2012
Windows Server 2008 R2
read-only
updated and compliant

A

read-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To verify a NAP client’s configuration, which command would you run?

netsh nap show state
netsh nap client show state
netsh nps nap show state
netsh nps nap agent state

A

netsh nap client show state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why do you need a web server as part of your NAP remediation infrastructure?

to provide user information in case of a compliance failure
to provide Internet access to users who fail compliance
to redirect user requests for restored network access
to further assess how far out of compliance a user system is

A

to provide user information in case of a compliance failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Health policies are in pairs. What are the members of the pair? Select two.

NAP-compliant
NAP-remedial
NAP-noncompliant
NAP-quarantined

A

NAP-compliant

& NAP-noncompliant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What happens to a computer that isn’t running Windows Firewall? The computer is isolated. The computer is powered off. A server message is sent to the computer. An event is logged.
The computer is isolated.
26
To use the NAP-compliant policy, the client must do what? pass 75% of the SHV checks fail no more than 10% of the SHV checks pass one of the SHV checks pass all SHV checks
pass all SHV checks
27
When enabling NAP for DHCP scopes, how should you roll out the service? all at once on test systems only for individual computers for individual DHCP scopes
for individual DHCP scopes
28
What is the default authentication protocol for non-domain computers? NTLM PAP CHAP Kerberos
NTLM
29
NTLM uses a challenge-response mechanism for authentication without doing what? revealing the client’s operating system to the server revealing the protocol to the server sending a password to the server sending an encrypt/decrypt message to the server
sending a password to the server
30
Kerberos security and authentication are based on what type of technology? secure transmission secret key challenge-response legacy code
secret key
31
Which three components make up a service principal name (SPN)? service name, IP address, and port number service name, URL, and host name service name, host name, and IP address service class, host name, and port number
service class, host name, and port number
32
Which tool can you use to add SPNs to an account? Notepad LDAP Microsoft Word ADSI Edit
ADSI Edit
33
Identify another utility that you can use to add SPNs to an account. dnscmd spnedit setspn netsh
setspn
34
When creating accounts for operating systems, processes, and services, you should always configure them with what two things in mind? using strong passwords using cryptic user names granting the least rights possible using built-in accounts
using strong passwords | & granting the least rights possible
35
By default, which service accounts will the Windows PowerShell cmdlets manage? standalone MSAs standard local service accounts group MSAs domain user accounts designated as service accounts
group MSAs
36
What is the default authentication protocol for contemporary domain computers? NTLM PAP CHAP Kerberos
Kerberos
37
The domain controllers are the computers that store and run the _______________. user database services database Managed Service Accounts database Active Directory database
Active Directory database
38
You do not place the infrastructure master on a global catalog server unless what situation exists? You have a single domain. You have Windows NT 4.0 systems to support. You have multiple schemas. Your AD DS is Windows 2008 or higher.
You have a single domain.
39
Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly? Schema Master Forest RODC Operations Master
Operations Master
40
What utility must you run on a cloned system to ensure that the clone receives its own SID? adprep /renew sysprep dcpromo ntconfig
sysprep
41
Which of the following commands issued at the fsmo maintenance prompt would successfully seize the role of an Operations Master Holder? Select all that apply. seize schema master seize global master seize PDC seize domain control
seize schema master | & seize PDC
42
What utility must you run on a cloned system to ensure that the clone receives its own SID? adprep /renew sysprep dcpromo ntconfig
sysprep
43
Which version of Windows Server introduced incremental universal group membership replication? Windows Server 2000 Windows Server 2003 Windows Server 2008 Windows Server 2012
Windows Server 2003
44
The global catalog stores a partial copy of all objects in the forest. What are the reasons for keeping that partial copy? Select all that apply. logon object searches universal group membership schema integrity
logon, object searches, & | universal group membership
45
Where in the forest is a global catalog automatically created? the PDC Emulator the most powerful system the first domain controller the schema master
the first domain controller
46
What function does the CSVDE tool perform? It decrypts and encrypts Active Directory information. It exports/imports Active Directory information. It exports/imports data from Event Viewer. It extracts Event Viewer information into CSV files.
It exports/imports Active Directory information.
47
To perform an authoritative restore, into what mode must you reboot the domain controller? Repair Safe Command line with networking DSRM
DSRM
48
What utility first appeared in Windows Server 2008 R2 that allows you to undelete Active Directory containers and objects? the Active Directory Lost and Found folder the Active Directory Recycle Bin the Active Directory Undelete utility Active Directory Snapshots
the Active Directory Recycle Bin
49
After you undelete a user account with the LDP utility, what action do you need to perform? Remove the old identifier. Re-establish user to domain trust. Reset the user’s password. Restore the user-owned objects from a backup.
Reset the user’s password.
50
What is the proper procedure for removing a domain controller from Active Directory? Shut down the domain controller and manually remove it from AD. Use dcdemo to demote the domain controller. Uninstall Active Directory Domain Services. Enter the DSRM and delete Active Directory.
Uninstall Active Directory Domain Services.
51
To perform an authoritative restore of an object or subtree, what bit of information do you need to know about the object? its formal name its exact location its OU and proper name its distinguished name
its distinguished name
52
Before you can use the Active Directory Recycle Bin, what two actions do you have to perform? You have to remove the System Recycle Bin. You have to enable the AD Recycle Bin. You have to set the AD forest to Windows Server 2003 or higher. You have to set the AD forest to Windows Server 2008 R2 or higher.
You have to enable the AD Recycle Bin. | & You have to set the AD forest to Windows Server 2008 R2 or higher.
53
Which utility do you use to defragment Active Directory? CSVDE LDIFDE ntdsutil defrag
ntdsutil
54
Why is backup of the Active Directory database so important? Backup of all data is a good idea. Backup is a standard practice in large companies. Backup is needed in case of corruption, deletion, or other failure. Backup is an insurance policy for data and should be performed regularly.
Backup is needed in case of corruption, deletion, or other failure.
55
What are examples of password policies? Select all that apply. history length complexity age
ALL OF THEM
56
What is the default setting for password history? 6 10 16 24
24
57
What setting can you give for account lockout duration that requires an administrator to manually unlock the account? 0 10 99 99,999
0
58
How should you assign Password Settings objects (PSOs) to users? Assign the PSOs directly to individual users. Assign the PSOs to a new group and add the users to the new group. Assign the PSOs to a global security group and add users to the group. Assign the PSOs to various Active Directory groups as needed.
Assign the PSOs to a global security group and add users to the group.
59
What is the secpol.msc utility used for? editing group policies editing local security policies editing global security policies editing domain-level policies
editing local security policies
60
Why should administrator passwords change more often than user passwords? because administrator passwords are usually simpler than user passwords because administrator accounts carry more security sensitivity than users do because administrators are paranoid about security because administrator accounts are watched by management in large companies
because administrator accounts carry more security sensitivity than users do
61
What is an easy method of creating a strong password? Use your username and add numbers and special characters. Use your favorite football team’s name with numbers and special characters. Ask a friend for some ideas for good passwords and then add your own number and characters. Start with a sentence and then add numbers and special characters.
Start with a sentence and then add numbers and special characters.
62
Account policies contain various subsets. Which of the following are legitimate subsets of account policies? Check all that apply. Password Policy Account Lockout Policy Kerberos Policy Username Policy
Password Policy Account Lockout Policy Kerberos Policy
63
Which of the following passwords is considered complex? M!croS0ft candybar01 bobj fred@local
M!croS0ft
64
Which feature affects all users in the domain, including domain controllers? Global Group Policy Default Domain Policy Default Group Policy Default Global Domain Policy
Default Domain Policy
65
What is the default timeout value for GPOs to process on system startup? 60 seconds 120 seconds 300 seconds 600 seconds
600 seconds
66
What is the first step in the GPO processing order? The user initiates interactive logon. The computer obtains a list of GPOs from the domain controller. The computer establishes a secure link to the domain controller. The GPOs are applied to the computer and to the user.
The computer establishes a secure link to the domain controller.
67
If a site, domain, or OU has multiple GPOs, how are the group policies processed? by precedence by importance by administrative control by GPO controller policy
by precedence
68
For users to receive GPO settings, they must have which two permissions to the GPO? Allow Read Allow Write Allow Modify Allow Apply
Allow Read | Allow Apply
69
At what point are WMI filters evaluated? when the filter is created when the policy is applied when the filter is applied when the policy is processed
when the policy is processed
70
How many WMI filters can be configured for a GPO? one two four eight
one
71
What is the primary purpose of running the Group Policy Results Wizard? Check all that apply. to guarantee that GPOs are enforced in full to analyze the cumulative effect of GPOs for GPO troubleshooting to ensure that you have administrative rights to the client computer
to analyze the cumulative effect of GPOs | for GPO troubleshooting
72
Which of the following Windows 8.1 and Windows Server 2012 R2 features can speed up the performance of processing synchronous policy settings? GPO Turbo Mode GPO Enhanced Mode Group Policy Update Group Policy Caching
Group Policy Caching
73
Which of the following operating systems can have its security settings managed by using security templates? Select all that apply. Windows XP Windows Vista Windows 7 Windows 8
Windows 7 | Windows 8
74
What is an ADMX file? an ADM file translator the ADM format for newer operating systems a template buffer the protocol that deploys ADM files across networks
the ADM format for newer operating systems
75
Which of the following are legitimate Administrative Template Property Filters? Select all that apply. Keyword Filters Requirements Filters Security Filters Operating System Filters
Keyword Filters | Requirements Filters
76
What is the filename extension for the files in which installation information is stored? .txt .xml .ini .msi
.msi
77
Windows Installer cannot install .exe files. To distribute a software package that installs with an .exe file, what must you do to it? Convert it to a ZIP file Convert it to an MSI file Convert it to an MSP file Convert it to an MST file
Convert it to an MSI file
78
Where is the default location for ADMX files? C:\Windows\SYSVOL\ADMX C:\Windows\System32\XML\ADMX C:\Windows\Inf C:\Windows\PolicyDefinitions
C:\Windows\PolicyDefinitions
79
What language are ADMX files based on? HTML XML SGML Java
XML
80
Where is the Central Store located? in the SYSVOL directory Microsoft Online TechNet on a domain controller public share
in the SYSVOL directory
81
When configuring Group Policy to deploy applications, the applications must be mapped to where? UNC path drive letter shared folder full install path
UNC path
82
Which domain users are automatically granted permissions to perform Group Policy Management tasks? local administrators power users domain administrators domain users
domain administrators
83
Why would you ever want or need to reset the domain policy and the domain controller policy to the default settings? Select all that apply. if they’ve become corrupted to refresh policy settings as a regular part of domain maintenance and housekeeping if someone deleted one of the policies
if they’ve become corrupted | & if someone deleted one of the policies
84
A user must have which two existing permissions for new permissions to be applied to their accounts for GPO delegation? Allow Read Allow Write Allow Apply Allow Modify
Allow Read | & Allow Apply
85
If you don’t want a GPO to apply, which group policy permission do you apply to a user or group? Disallow Read Disallow Write Disallow Modify Disallow Apply
Disallow Apply
86
When you’re about to reset domain policy and domain controllers policy back to default with the dcgpofix.exe command, what final warning are you given before you accept the change? that you’re about to reset policies to their defaults that all User Rights Assignments will be replaced that all security for the domain will be overwritten that you’re about to restore all security to the default
that all User Rights Assignments will be replaced
87
To give someone permission to manage a particular GPO, you use the __________ tab of the individual GPO. Permissions Security Delegate Settings
Delegate
88
What is a collection of files stored in the SYSVOL (%SystemRoot%\SYSVOL\\Policies\) of each domain controller? Group Policy Container (GPC) Group Policy Template (GPT) migration table delegation
Group Policy Template (GPT)
89
What is a file that maps references to users, groups, computers, and UNC paths in the source GPO to new values in the destination GPO? Group Policy Container (GPC) Group Policy Template (GPT) migration table delegation
migration table
90
What is an Active Directory object stored in the Group Policy Objects container with the domain naming content of the directory that defines basic attributes of the GPO but does not contain any of the settings? Group Policy Container (GPC) Group Policy Template (GPT) migration table delegation
Group Policy Container (GPC)
91
What process grants permissions to other users to manage group policies? Group Policy Container (GPC) Group Policy Template (GPT) migration table delegation
delegation
92
Which utility do you use to create GPO preferences? Group Policy Management Editor Group Policy Preference Editor Group Policy Editor Group Policy Wizard
Group Policy Management Editor
93
How do you stop processing a preference if an error occurs? Select the Stop processing items option on the Common tab. Select the Remove this item option on the Common tab. Select the Stop on any error option in the GPP Wizard. Select the Stop on all errors option in the GPP Wizard.
Select the Stop processing items option on the Common tab.
94
Which Windows extension allows you to add, replace, or delete sections or properties in configuration settings or setup information files? .ini files files folders environment
.ini files
95
If you need to provide users access to a common network location, which GPP would you use? Select all that apply. Shortcut File Drive Maps Folders
Shortcut & Drive Maps
96
Which component allows you to create multiple Registry preference items based on registry settings that you select? the Registry Scope the Registry Extension the Registry Configurator the Registry Wizard
the Registry Wizard
97
Which term describes changing the scope of individual preference items so that the preference items apply only to selected users or computers? individual targeting user-specific targeting item-level targeting focused targeting
item-level targeting
98
Windows Settings has multiple preference extensions. Identify all that apply. Registry Shortcuts Folders Storage
Registry, Shortcuts, & Folders
99
GPP can be configured on domain controllers running which version of Windows Server? Select all that apply. 2003 2008 2008 R2 2012
2008, 2008 R2, & 2012
100
GPPs are divided into which two sections? Windows and Registry Applications and Registry Applications and Control Panel Windows and Control Panel
Windows and Control Panel