Lesson 5: Configuring Routing and Remote Access (RRAS) and Wireless Networking Multiple Choice 1. Routers are considered components of which layer? a) layer 1 b) layer 2 c) layer 3 d) layer 4 2. For best results, the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)? a) 5 b) 7 c) 10 d) 12 3. Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________. a) OSPF b) IGMP Router & Proxy c) DHCP Relay Agent d) RIPv2 4. How can you view the IP routing table? a) Routing and Remote Access console b) command prompt c) both B & C d) none of the above 5. Which entries refer to a separate multicast route? a) 0.0.0.0 b) 127.0.0.0 c) 224.0.0.0 d) 255.255.255.255 6. Which of the following is the limited broadcast address that is general for all networks and routers? a) 0.0.0.0 b) 127.0.0.0 c) 224.0.0.0 d) 255.255.255.255 7. Which column of the IP Routing Table indicates the gateway value for each routing table entry? a) first b) second c) third d) fourth 8. Of the four types of routes that can be found in a routing table, which of the following cannot be found? a) directly attached network routes b) remote network routes c) client routes d) host routes 9. Which option enables internal clients to connect to the Internet using a single, external IP address? a) remote access b) network address translation c) virtual private network d) custom configuration 10. What type of connectivity creates a secure point-to-point connection across either a private network or a public network, such as the Internet? a) remote access b) dial-up networking c) virtual private network d) custom configuration 11. An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the following items? a) conditions b) constraints c) settings d) all of the above 12. What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key? a) basic encryption b) strong encryption c) strongest encryption d) no encryption 13. Which mutual authentication method offers encryption of both authentication data and connection data? a) EAP.TLS b) MS-CHAPv2 c) MS-CHAPv1 d) Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP) 14. Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme? a) Password Authentication Protocol (PAP) b) Shiva Password Authentication Protocol (SPAP) c) Challenge Handshake Authentication Protocol (CHAP) d) Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP) 15. Which generic authentication method does not encrypt authentication data? a) Password Authentication Protocol (PAP) b) Shiva Password Authentication Protocol (SPAP) c) Challenge Handshake Authentication Protocol (CHAP) d) Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP) 16. 802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________. a) authenticator b) supplicant c) verifier d) Authentication Server 17. What term refers to the device that is seeking access to the network, such as a laptop attempting to access a wireless access point? a) authenticator b) supplicant c) verifier d) Authentication Server 18. Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients, such as Windows 95 and Windows 98)? a) EAP.TLS b) MS-CHAPv2 c) MS-CHAPv1 d) Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP) 19. One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which of the following is not an option? a) Server Must Supply an IP Address b) Client Must Supply an IP Address c) Client May Request an IP Address d) Server Settings Determine IP Address Assignment 20. By default, the Callback Options setting is configured as __________. a) Always Callback To b) Set by Caller c) No Callback d) None of the above True/False 21. When most traffic is synchronous, as in voice and video transmissions, VPN is your best option. 22. By default, the Callback Options setting is configured as No Callback. 23. By using the Routing and Remote Access service, Windows Server 2008 can be configured as a router and remote access server. 24. A hub examines the destination and source address of an incoming data frame and forwards the frame to the appropriate destination port according to the destination address. 25. A static-routed IP environment is best suited to small, single-path, static IP internetworks. Fill-in-the-Blank 26. Open __________ Path First was designed to address the scalability limitations of RIP to create a routing protocol that could be used on significantly larger networks. 27. The first column in the routing table indicates the network __________. 28. The final column in the routing table corresponds to the routing table entry’s __________. 29. For remote network routes, the __________-Hop field is a local router’s IP address. 30. The __________ protocol translates internal, private IP addresses to external, public IP addresses and vice versa. 31. After a user submits credentials to create a remote access connection, the remote access connection must be authorized by a Windows Server 2008 server running the Network __________ Server RRAS role service. 32. __________ is the process of verifying that an entity or object is who or what it claims to be. 33. As a final step in configuring the Network Policy Server to provide authentication, authorization, and accounting for your remote access clients, you will also need to configure __________. 34. __________ addresses include specific subnet broadcast addresses, such as 192.168.0.255. 35. You can view the IP routing table by using the Routing and Remote Access console or the __________ prompt. Short Answer 36. 802.1X provides port-based security through the use of an Authentication Server and what two other components? 37. What are the four encryption options available in the Encryption tab? 38. 802.1X can allow or deny access on the basis of a physical port (such as someone plugging into a single wall jack using an Ethernet cable) or a logical port (such as one or more people connecting to a wireless access point using the WiFi cards in one or more laptops or handheld devices). This occurs because 802.1x is based on what? 39. What is a rule for evaluating remote connections? 40. What type of server can be used to centralize remote access authentication, authorization, and logging? 41. What protocol enables private networks to connect to the Internet? 42. What was designed to address the scalability limitations of RIP to create a routing protocol that could be used on significantly larger networks? 43. What is a route to a specific IP address?