CHAPTER 14-c22

CHAPTER 14-c22

University

26 Qs

quiz-placeholder

Similar activities

Networking Revision

Networking Revision

University

21 Qs

Infra IT

Infra IT

University

25 Qs

UTS Workshop Administrasi Jaringan

UTS Workshop Administrasi Jaringan

University

25 Qs

Window 2012 R2 20201018

Window 2012 R2 20201018

University

24 Qs

UTS Jarkom S1

UTS Jarkom S1

University

23 Qs

Pelatihan VoIP 2

Pelatihan VoIP 2

1st Grade - University

25 Qs

IT-WS05 Midterm Exam

IT-WS05 Midterm Exam

University

22 Qs

PHP dan MySQL

PHP dan MySQL

University

25 Qs

CHAPTER 14-c22

CHAPTER 14-c22

Assessment

Quiz

Computers

University

Medium

Created by

Vanna J

Used 1+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which NAP enforcement method is considered the weakest due to its vulnerability to being bypassed by using static IP addresses?

IPsec enforcement

DHCP enforcement

VPN enforcement

RD Gateway enforcement

Answer explanation

DHCP enforcement can be bypassed if a client uses a static IP, making it the weakest method.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of health certificates in IPsec enforcement?

They grant static IP addresses to compliant clients

They identify RD Gateway users

They validate client compliance to allow IPsec-secured communication

They configure DHCP scopes for clients

Answer explanation

Health certificates are used to verify that clients meet health requirements before they can use IPsec-secured communication.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which NAP enforcement method is most appropriate for restricting access from remote devices via the Internet?

DHCP enforcement

802.1x enforcement

IPsec enforcement

RD Gateway enforcement

Answer explanation

RD Gateway enforcement restricts access to internal resources for remote users connecting over the Internet.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are configuring NAP for remote VPN users. Which enforcement method should you apply to ensure noncompliant clients have limited access upon connection?

802.1x enforcement

VPN enforcement

DHCP enforcement

IPsec enforcement

Answer explanation

VPN enforcement limits access based on health information presented during VPN connection attempts.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure that only clients with health certificates can access sensitive internal servers using secure tunnels. What enforcement method should they implement?

DHCP enforcement

802.1x enforcement

IPsec enforcement

RD Gateway enforcement

Answer explanation

IPsec enforcement uses health certificates to allow access only to compliant clients.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are asked to apply a NAP method that works with network switches and wireless access points to enforce compliance. Which one should you choose?

VPN enforcement

RD Gateway enforcement

802.1x enforcement

DHCP enforcement

Answer explanation

802.1x enforcement integrates with network infrastructure to control access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a System Statement of Health (SSoH) in the NAP connection process?

It defines the health policies required by the NAP server

It contains the combined output from SHVs

It aggregates individual SoHs from SHAs for the NAP client

It grants access to the remediation network

Answer explanation

The NAP client compiles multiple SoHs into a single SSoH before sending it to the health policy server.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?