1. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.
2. You can quickly verify a client's configuration by running the following command at a command prompt:
3. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
4. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
5. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
6. You need to create outbound firewall rules only when you configure outbound connections to be ______.
7. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
8. Which versions of Windows can act as NAP clients?
9. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
10. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
11. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
12. Typically - a NAP deployment occurs in three phases:
13. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
14. Installing the HRA role service configures the following:
15. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
16. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
17. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
18. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
19. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
20. ______ define which health checks a client must meet to be considered compliant.
21. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
22. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
23. ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.
24. A ______ determines whether a request should be processed by NPS.
25. A health requirement policy is a combination of the following:
26. NAP health validation takes place between two components:
27. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
28. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
29. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
30. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
MCTS: Connecting To Networks
MCTS: Creating A DHCP Infrastructure
MCTS: Managing Files
Data Communication & Network
Windows XP Networking
5G
Related MCQ's