LAB 6 REVIEW QUESTIONS 1. In Exercise 6-2, which tunneling protocol did the VPN client on Computeryy use to establish a connection to the remote access server? How can you tell? The client uses PPTP to establish the VPN connection. You can tell by looking at the Ports listing in the Routing and Remote Access console and noting that one of the WAN Miniport (PPTP) ports is active. 2. In Exercise 6-3, what would be the result if you also selected the Use Extensible Authentication Protocol (EAP) in the Advanced Security Settings dialog box on the client computer? There would be no change in the result because the server is not configured to use EAP. 3. In Exercise 6-4, what would be the result if you used the Administrator account to connect to the remote access server instead of the George Benwell account? The Administrator account would not be able to connect to the server either, because it also lacks the permissions needed. LAB 7 LAB REVIEW QUESTIONS 1. In light of the modifications you made to the default domain policy settings in Lab 1, what would be the result if, in Exercise 7-3, you modified the Password Policy settings in the Maximum DC Security template and then proceeded to deploy the template in the manner described in Exercise 7-4? The Password Policy settings applied to the Domain Controllers container object would take effect unless there was a define password policy in the Default Domain Policy. 2. In Exercise 7-3, why was it necessary to delete all of the entries in the Registry and File System nodes of the Maximum DC Security template? Because you later deployed that template by importing it into a GPO, and the large number of registry and file system settings existing would be added to the template settings and would also generate a great deal of Active Directory traffic on the network. 3. What would be the result if, in Exercise 7-4, you imported the Maximum DC Security template into the Default Domain Controllers Policy GPO instead of creating a new GPO (assuming that you left the Clear This Database Before Importing check box unselected)? The settings in the template would overwrite any existing settings for the same policies in the Default Domain Controllers Policy GPO. The end result to the computers would be exactly the same as when the two GPOs were applied in succession. 4. What Secedit.exe command would you use in Exercise 7-5 to apply only the Account Lockout Policy settings from the Workstation.inf template to the computer? Secedit /configure /db workstation.sdb /cfg workstation.inf /areas SECURITYPOLICY /log workstation.log 5. What would be the result if, in Exercise 7-4, you imported the Maximum DC Security template into the Default Domain Policy GPO instead of the Default Domain Controllers Policy GPO? The settings in the template would be applied to all of the computers in the domain. LAB 8 LAB REVIEW QUESTIONS 1. In Exercise 8-1, why was it necessary to move the Computeryy object to an OU before you could apply software restriction policies to it? Because the default Computers container is not an OU and cannot have GPOs applied to it. 2. Assuming that you do not have the permissions needed to create a new OU and move the Computeryy object, what other method could you use to test your software restriction policies on Computeryy? You could configure the security restriction policies directly in the computer’s Local Security Settings console. 3. In Exercise 8-4, why was Computerxx unable to connect to the Web server running on the local computer? Because you did not add the IP address of Computerxx to the list of granted addresses in the IP Address And Domain Name Restrictions dialog box. LAB 9 LAB REVIEW QUESTIONS 1. In Exercise 9-4, why is it preferable to clear the Network Authentication (Shared Mode) check box? Because using the WEP secret key for authentication makes it easier for intruders to gather information about the key and eventually penetrate it. 2. In Exercises 9-3 and 9-4, what capability does the Enable Fast Reconnect check box provide to wireless network users? With Fast Reconnect enabled, a wireless client can roam from one access point to another without having to re-authenticate each time. 3. In Exercise 9-3, you selected Protected EAP as the authentication method for the wireless network. What would you need before you could use a different authentication method? Certificates and (optionally) smart cards and card readers on the client computers. 4. In Exercise 9-4, how does selecting Access Point (Infrastructure) Networks Only in the Networks To Access drop-down list enhance the security of the network? Limiting access to infrastructure networks only prevents users from creating their own ad hoc wireless connections. 5. In Exercise 9-4, how does clearing the Automatically Connect to Non-Preferred Networks check box enhance the security of the network? Denying connections to non-preferred networks prevents users from connecting to any wireless networks other than those specifically listed in the policy. LAB 10 LAB REVIEW QUESTIONS 1. In Exercise 10-2, what would be the result if you typed computerxx in the Common Name text box instead of computerxx.domainxxyy.contoso.com? Users would have to connect to the Web site using the URL https://computerxx to avoid receiving a certificate mismatch error message, instead of https://computerxx.domainxxyy.contoso.com. 2. In Exercise 10-3 and Exercise 10-4, why is it necessary to submit the request for the server certificate through the Web enrolment home page and manually issue the certificate using the Certification Authority console? Because the certification authority that is issuing the certificate is a standalone CA and does not support auto enrolment. 3. How could the process of obtaining a certificate for the Web server be streamlined if the certification authority was an enterprise CA instead of a stand-alone CA. With an enterprise CA, it would be possible to submit the certificate request immediately through the Web Server Certificate Wizard, instead of saving it to a file and submitting it manually. The enterprise CA would also be able to automatically issue the certificate with no manual intervention from an administrator. NOTE: To overcome the problems with generating the request for a certificate from Computeryy, you must either: 1) Uninstall certificate services from Computerxx 2) Change the type of certificate on Computerxx from Enterprise CA to either Enterprise Subordinate CA or Stand-Alone CA Since Computeryy is member server of Computerxx’s domain and Computerxx is running Enterprise CA services, Computerxx (as the domain controller) was unable to request a certificate from an untrusted source (Computeryy).