1. Win 7 - Win Vista - Win Server 2008 - Win Server 2008 R2 - and Win XP SP3 include an ______ that monitors Windows Security Center settings.
2. Use the ______ subnode to configure cryptographic settings for NAP clients (the default settings are typically fine).
3. Windows Firewall ______ identifies connections that Windows Firewall allows or blocks.
4. Win Server 2008 and Win Server 2008 R2 include an SHV that corresponds to the SHA built into Windows ______.
5. NAP health validation takes place between two components:
6. A health requirement policy is a combination of the following:
7. A ______ determines whether a request should be processed by NPS.
8. ______ allows you to verify that computers meet specific health requirements before granting them unlimited access to your internal network.
9. With 802.1X - compliant computers are granted full network access - and noncompliant computers are connected to a ______ network or completely prevented from connecting to the network.
10. The ______ enforcement type uses Ethernet switches or wireless access points that support 802.1X authentication.
11. ______ define which health checks a client must meet to be considered compliant.
12. The NAP health policy server uses the ______ to determine the level of access the client computer should have and whether any remediation is necessary.
13. The ______ are the client components that create a Statement of Health (SoH) containing a description of the health of the client computer.
14. If a computer falls out of compliance after connecting to the 802.1X network - the 802.1X network access device can change the computer's ______.
15. With the DHCP servers enforcement type - only ______ computers receive an IP address that grants full network access; ______computers are granted an IP address with a subnet mask of 255.255.255.255 and no default gateway.
16. The ______ enforcement type uses a computer running Win Server 2008 or Win Server 2008 R2 and the DHCP Server service that provides IP addresses to intranet clients.
17. Installing the HRA role service configures the following:
18. The ______ type enforces NAP for remote access connections using a VPN server running Win Server 2008 or Win Server 2008 R2 and Routing and Remote Access.
19. Typically - a NAP deployment occurs in three phases:
20. VLANs are identified using a VLAN identifier - which must be configured on the switch itself. You can then use NAP to specify in which VLAN the ______ computers are placed.
21. You can also use IPsec connection security to allow healthy computers to ______ healthy computers.
22. The 802.1X access point applies the ACL to the connection and ______ all packets that are not allowed by the ACL.
23. Which versions of Windows can act as NAP clients?
24. Health ______ determine which clients must meet health requirements - what those health requirements are - and what happens if a client cannot comply.
25. You need to create outbound firewall rules only when you configure outbound connections to be ______.
26. After configuring the NPS server - you must configure client computers for NAP. The easiest way to do this is to use ______ node.
27. Configure the ______ policy to provide customized text (and - optionally - an image) that users will see as part of the NAP client interface.
28. If you use Remote Desktop to allow users to control their desktops from remote computers across the Internet - you can use the ______ enforcement type to block access unless the client computer passes a health check.
29. You can quickly verify a client's configuration by running the following command at a command prompt:
30. In networking - ______ analyze communications and drop packets that haven't been specifically allowed.