Import Settings:

advertisement
Lesson 5: Configuring Routing and Remote Access (RRAS) and Wireless Networking
Multiple Choice
1. Routers are considered components of which layer?
a) layer 1
b) layer 2
c) layer 3
d) layer 4
2. For best results, the internetwork should be limited to fewer than how many subnets with an
easily predicted traffic pattern (such as arranged consecutively in a straight line)?
a) 5
b) 7
c) 10
d) 12
3. Windows Server 2008 includes all of the following routing protocols that can be added to the
Routing and Remote Access service with the exception of __________.
a) OSPF
b) IGMP Router & Proxy
c) DHCP Relay Agent
d) RIPv2
4. How can you view the IP routing table?
a) Routing and Remote Access console
b) command prompt
c) both B & C
d) none of the above
5. Which entries refer to a separate multicast route?
a) 0.0.0.0
b) 127.0.0.0
c) 224.0.0.0
d) 255.255.255.255
6. Which of the following is the limited broadcast address that is general for all networks and
routers?
a) 0.0.0.0
b) 127.0.0.0
c) 224.0.0.0
d) 255.255.255.255
7. Which column of the IP Routing Table indicates the gateway value for each routing table
entry?
a) first
b) second
c) third
d) fourth
8. Of the four types of routes that can be found in a routing table, which of the following cannot
be found?
a) directly attached network routes
b) remote network routes
c) client routes
d) host routes
9. Which option enables internal clients to connect to the Internet using a single, external IP
address?
a) remote access
b) network address translation
c) virtual private network
d) custom configuration
10. What type of connectivity creates a secure point-to-point connection across either a private
network or a public network, such as the Internet?
a) remote access
b) dial-up networking
c) virtual private network
d) custom configuration
11. An NPS Network Policy, which is a rule for evaluating remote connections, consists of
which of the following items?
a) conditions
b) constraints
c) settings
d) all of the above
12. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit
key?
a) basic encryption
b) strong encryption
c) strongest encryption
d) no encryption
13. Which mutual authentication method offers encryption of both authentication data and
connection data?
a) EAP.TLS
b) MS-CHAPv2
c) MS-CHAPv1
d) Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication
Protocol (EAP-MD5 CHAP)
14. Which generic authentication method offers encryption of authentication data through the
MD5 hashing scheme?
a) Password Authentication Protocol (PAP)
b) Shiva Password Authentication Protocol (SPAP)
c) Challenge Handshake Authentication Protocol (CHAP)
d) Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication
Protocol (EAP-MD5 CHAP)
15. Which generic authentication method does not encrypt authentication data?
a) Password Authentication Protocol (PAP)
b) Shiva Password Authentication Protocol (SPAP)
c) Challenge Handshake Authentication Protocol (CHAP)
d) Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication
Protocol (EAP-MD5 CHAP)
16. 802.1X provides port-based security through the use of all of the following components with
the exception of a(n) __________.
a) authenticator
b) supplicant
c) verifier
d) Authentication Server
17. What term refers to the device that is seeking access to the network, such as a laptop
attempting to access a wireless access point?
a) authenticator
b) supplicant
c) verifier
d) Authentication Server
18. Which one-way authentication method offers encryption of both authentication data and
connection data (the same cryptographic key is used in all connections; this method supports
older Windows clients, such as Windows 95 and Windows 98)?
a) EAP.TLS
b) MS-CHAPv2
c) MS-CHAPv1
d) Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication
Protocol (EAP-MD5 CHAP)
19. One example of an NPS Policy Setting includes IP properties that specify IP address
assignment behavior. Which of the following is not an option?
a) Server Must Supply an IP Address
b) Client Must Supply an IP Address
c) Client May Request an IP Address
d) Server Settings Determine IP Address Assignment
20. By default, the Callback Options setting is configured as __________.
a) Always Callback To
b) Set by Caller
c) No Callback
d) None of the above
True/False
21. When most traffic is synchronous, as in voice and video transmissions, VPN is your best
option.
22. By default, the Callback Options setting is configured as No Callback.
23. By using the Routing and Remote Access service, Windows Server 2008 can be configured
as a router and remote access server.
24. A hub examines the destination and source address of an incoming data frame and forwards
the frame to the appropriate destination port according to the destination address.
25. A static-routed IP environment is best suited to small, single-path, static IP internetworks.
Fill-in-the-Blank
26. Open __________ Path First was designed to address the scalability limitations of RIP to
create a routing protocol that could be used on significantly larger networks.
27. The first column in the routing table indicates the network __________.
28. The final column in the routing table corresponds to the routing table entry’s __________.
29. For remote network routes, the __________-Hop field is a local router’s IP address.
30. The __________ protocol translates internal, private IP addresses to external, public IP
addresses and vice versa.
31. After a user submits credentials to create a remote access connection, the remote access
connection must be authorized by a Windows Server 2008 server running the Network
__________ Server RRAS role service.
32. __________ is the process of verifying that an entity or object is who or what it claims to be.
33. As a final step in configuring the Network Policy Server to provide authentication,
authorization, and accounting for your remote access clients, you will also need to configure
__________.
34. __________ addresses include specific subnet broadcast addresses, such as 192.168.0.255.
35. You can view the IP routing table by using the Routing and Remote Access console or the
__________ prompt.
Short Answer
36. 802.1X provides port-based security through the use of an Authentication Server and what
two other components?
37. What are the four encryption options available in the Encryption tab?
38. 802.1X can allow or deny access on the basis of a physical port (such as someone plugging
into a single wall jack using an Ethernet cable) or a logical port (such as one or more people
connecting to a wireless access point using the WiFi cards in one or more laptops or handheld
devices). This occurs because 802.1x is based on what?
39. What is a rule for evaluating remote connections?
40. What type of server can be used to centralize remote access authentication, authorization, and
logging?
41. What protocol enables private networks to connect to the Internet?
42. What was designed to address the scalability limitations of RIP to create a routing protocol
that could be used on significantly larger networks?
43. What is a route to a specific IP address?
Download