Final Network

Is this your test? Login to manage it. If not, you can make a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which is used to make a computer NAP compliant
when you have quarantined computers that are not compliant?
2.
1 point
What is the minimum forest functional level for RODC?
3.
1 point
Which of the following is typically a
remediation server when using NAP? (Choose all that apply.)
4.
1 point
Which policy establishes sets of conditions,
constraints, and settings that specify who is authorized to connect to the
network?
5.
1 point
To use EAP-TSL, each client must have which of
the following?
6.
1 point
By default, what is the maximum amount time that
a clock can be off in order for Kerberos to work?
7.
1 point
Which fallback authentication is used when
Kerberos does not work?
8.
1 point
With NAP, what defines the requirements for
client computers to connect to a network that is connected?
9.
1 point
Which of the following tracks network usage for
auditing and billing purposes?
10.
1 point
Which act confirms the identity of a user or
system?
11.
1 point
Which component used with NAP maintains
information and reports on the health of a NAP client?
12.
1 point
What allows a Kerberos ticket to be created for
another service on the originating user’s behalf?
13.
1 point
Which of the following are access clients? (Choose all that apply.)
14.
1 point
What do you use to transfer the holder of the
Schema Master?
15.
1 point
What technology allows you to decrease allocated
bandwidth when using multilink?
16.
1 point
Microsoft’s RADIUS server is known as which of
the following?
17.
1 point
Which name uniquely identifies an instance of a service for a client?
18.
1 point
Which of the following are remote connections
based on when creating network policies? (Choose all that apply.)
19.
1 point
What do you use to seize the role of the Domain Naming Operations Master?
20.
1 point
Which of the following is used as a Windows
Security Health Validator? (Choose apply all that apply.)
21.
1 point
Which of the following are used with NPS
templates? (Choose all that apply.)
22.
1 point
Which account runs a service on multiple computers that belong to a cluster and that automatically have the password changed on a regular basis?
23.
1 point
What is the cause of the problem if account
lockout is not working?
24.
1 point
Which of the following is not an Operations
Master?
25.
1 point
How do you specify which RADIUS server handles
authentication for a VPN server?
26.
1 point
If you use an ISDN line, which of the following
allows you to use multiple connections to allow for higher bandwidth?
27.
1 point
Which policy would you use if you want to limit
when a user can log in through the VPN?
28.
1 point
You are creating a self-serve kiosk console at a
local mall. At the mall, the kiosk will need to access a domain controller.
What should you use?
29.
1 point
Which of the following NAP enforcement mechanisms is considered the strongest?
30.
1 point
Which ports does NPS use for authentication and
accounting? (Choose four answers.)
31.
1 point
Which two locations can NPS log to? (Choose two
answers.)
32.
1 point
Which of the following is found on a domain
controller? (Choose all that apply.)
33.
1 point
Which is the most common System Health Agent used in Windows?
34.
1 point
You have several VPN servers configured using
RRAS. What is the best way to collect information on when and how long someoneis connected through the VPN?
35.
1 point
By default, how often do passwords change for
Managed Service accounts?
36.
1 point
How can you make an NPS server stop acting as a
RADIUS server and stop process connections requests locally?
37.
1 point
You deployed a read-only domain controller
(RODC) running Windows Server 2008 to a branch office. You need to ensure that
users at the branch office are able to log on to the domain by using the RODC.
What should you do?
38.
1 point
Which of the following NAP enforcement mechanisms is considered the weakest?
39.
1 point
Which of the following is the format for
Kerberos?
40.
1 point
Which authentication protocol uses the Key
Distribution Center that maintains a database of secret keys and is more secure
than NTLM?
41.
1 point
Which of the following are remote connections
based on when creating a connection request policy? (Choose all that apply.)
42.
1 point
What are you cloning when you use the New-ADDCCloneConfigFile?
43.
1 point
You just implemented NAP. How can you ensure that domain computers are up to date?
44.
1 point
Which three types of policies are available on
the Network Policy Server (NPS)? (Choose all that apply.)
45.
1 point
Which do you use to provide central
authentication of VPN and wireless connections on the network?
46.
1 point
Which command do you use to configure an SPN for
a user account?
47.
1 point
Which of the following is used to save a
configuration so that it can be reused on other NPS servers?
48.
1 point
Which server is used as the NAP health policy
server?
49.
1 point
Which policy is used to establish sets of
conditions and settings that specify which RADIUS servers perform the
authentication, authorization, and accounting of connection requests received
by the NPS server from RADIUS clients?
50.
1 point
What do you use to transfer the holder of the
RID Master?