Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Test Bank, Lesson 13 Configuring NPS Policies Multiple Choice 1) An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity? a

Test Bank, Lesson 13 Configuring NPS Policies Multiple Choice 1) An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity? a

Business

Test Bank, Lesson 13 Configuring NPS Policies

Multiple Choice

1) An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity?

a. who, what, and where

b. who, when, and how

c. who, when, and where

d. who, how, and how long

 

2. Which variable can be set to authorize or deny a remote connection?

a. group membership

b. bandwidth limitations

c. corporate status

d. job role

 

3. The default connection request policy uses NPS as what kind of server?

a. DNS

b. Active Domain controller

c. RRAS

d. RADIUS

 

 

4. Where is the default connection policy set to process all authentication requests?

a. on the domain controller

b. at the RADIUS proxy server

c. locally

d. in a separate database

 

5. What is the last setting in the Routing and Remote Access IP settings?

a. the number of assigned IP addresses

b. which DHCP server will supply the requests

c. which NPS server to connect to

d. how IP addresses are assigned

 

6. What command-line utility is used to import and export NPS templates?

a. dnscmd

b. netsh

c. msconfig

d. net

 

 

7. To which type of file do you export an NPS configuration?

a. TXT

b. DOC

c. XML

d. NPS

 

8. When should you not use the command-line method of exporting and importing the NPS configuration?

a. when the source NPS server and target NPS servers are on different IP subnets

b. when the source NPS database has a higher version number than the version number of the destination NPS database

c. when the source NPS server and target NPS servers are different revisions of Windows Server

d. when your network policy forbids the export of the NPS configuration

 

9. Network policies determine what two important connectivity constraints?

a. who is authorized to connect

b. the DHCP server for the connection

c. the DNS server for the connection

d. the connection circumstances for connectivity

 

10. When the Remote Access server finds an NPS network policy with conditions that match the incoming connection attempt, the server checks any _______________ that have been configured for the policy.

a. realms

b. constraints

c. options

d. permissions

 

 

11. If a remote connection attempt does not match any configured constraints, what does the Remote Access server do to the connection?

a. retries

b. accepts

c. denies

d. locks

 

 

12. Identify the correct NPS templates. Select all that apply.

a. Shared Secrets

b. NPS Filters

c. Health Policies

d. RADIUS Clients

 

13. Which two of the following are Routing and Remote Access IP settings?

a. Server Must Request an IP Address

b. Client May Request an IP Address

c. Server Must Supply an IP Address

d. Client Must Supply an IP Address

 

14. Which Routing and Remote Access IP setting is the default setting?

a. Assign a Static IP Address

b. Server Settings Determine IP Address Assignment

c. Server Must Connect to the Assigned Realm

d. Client May Request a Specific DNS Server

 

15. Which of the following is the strongest type of encryption?

a. MPPE 40-Bit

b. MPPE 56-Bit

c. MPPE 128-Bit

d. No Encryption

 

 

Short Answer

 

16. List any three variables that can be set to either authorize or deny remote access.

 

 

17. What three types of policies does NPS provide?

 

18. NPS network policy evaluates remote connections based on what three components?

 

19. Where should specific NPS network policies be placed in the policies list?

 

 

20. What is Bandwidth Allocation Protocol (BAP) used for?

21. What do IP filters allow you to control?

 

Best Answer

 

22. Why is there a No Encryption option for network connections?

a. to accommodate devices (clients) that don’t support encryption

b. to test connectivity before applying an encryption scheme

c. to allow for third-party encryption programs that might be incompatible with native encryption

d. to allow certain trusted connections to remain unencrypted

 

23. RADIUS Access-Request messages are processed or forwarded by NPS only if the settings of the incoming message match what on the NPS server?

a. one of the connection request policies

b. the time zone of the requestor

c. the client type of the requestor

d. the TCP/IP port of the requestor

 

 

24. Network Access Policy is part of which larger scope NPS policy?

a. Connection request

b. Network

c. Health

d. Realm

 

 

Build List

 

25. Order the following actions that take place when a user attempts to connect to a remote access server.

a. The Remote Access server checks any constraints that have been configured for the policy.

b. The user initiates a remote access connection.

c. The Remote Access server accepts or denies the connection based on Access Permissions configured for the policy.

d. The Remote Access server checks the configured NPS network policies.

e. Remote Access server checks the conditions in the first configured NPS network policy.

 

26. Order the following steps required to create a connection request policy.

a. Specify the Realm name or RADIUS attribute.

b. Select the authentication method.

c. Select the type of network access server.

d. Right-click Connection Request Policies, and then click New Connection Request Policy.

e. Name the Policy.

f. Open Server Manager > Tools > Network Policy Server.

g. Specify conditions (such as Tunnel Type).

 

27. Order the steps to export and import the NPS configuration using the netsh command.

a. At the netsh prompt, enter nps.

b. Enter import filename=”path\file.xml”.

c. At the netsh nps prompt, type export filename=”path\file.xml” exportPSK=YES.

d. Open a command prompt on the target server and start an interactive netsh nps session.

e. When the export is complete, copy the file.xml file to the target server.

f. Open a command prompt on the source server and start an netsh interactive session.

 

Repeated Answer

 

28. What character string makes up the telephone number of the network access server (NAS)?

a. Identity Type

b. Calling Station ID

c. Client Friendly Name

d. Called Station ID

 

29. What character string attribute designates the phone number used by the access client?

a. Identity Type

b. Calling Station ID

c. Client Friendly Name

d. Called Station ID

 

30. What is used to restrict the policy only to clients that can be identified through the special mechanism such as a NAP statement of health?

a. Identity Type

b. Calling Station ID

c. Client Friendly Name

d. Called Station ID

 

31. What is the name of the RADIUS client computer that requests authentication?

a. Identity Type

b. Calling Station ID

c. Client Friendly Name

d. Called Station ID

Option 1

Low Cost Option
Download this past answer in few clicks

8.87 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE