- Home
- Server Administration
- Windows
- Installing and Configuring Windows server 2012 (70-410)
41.
Which of the following mechanisms is used most often in firewall rules to allow traffic
onto the network?
- A.Hardware addresses
- B.IP addresses
- C.Protocol numbers
- D.Port numbers
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
A. Incorrect: Firewalls can conceivably use hardware addresses to filter network
traffic, but this is rarely a practical solution. B. Incorrect: Firewalls typically filter specific types of network traffic, not entire IP addresses. C. Incorrect: Filtering by protocol number typically does not provide the granularity needed to create an efficient firewall configuration. D. Correct: Firewalls typically use port numbers to allow traffic onto the network. |
42.
Connection security rules require that network traffic allowed through the firewall use
which of the following security mechanisms?
- A.EFS
- B.IPsec
- C.UAC
- D.Kerberos
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A. Incorrect: Encrypting File System only provides security for the storage medium, not for network traffic. B. Correct: Connection security rules require that network traffic allowed through the firewall use IPsec for security. C. Incorrect: User Account Control cannot restrict network traffic. D. Incorrect: Kerberos is an authentication protocol. It cannot restrict network traffic. |
43.
Which of the following actions cannot be performed from the Windows Firewall
control panel?
- A.Allowing an application through the firewall in all three profiles
- B.Blocking all incoming connections for any of the three profiles
- C.Creating firewall exceptions based on port numbers for all three profiles
- D.Turning Windows Firewall off for all three profiles
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
A. Incorrect: You can allow an application through the firewall for all three profiles by using the Windows Firewall control panel. B. Incorrect: You can use the Windows Firewall control panel to block all incoming connections for all three profiles. C. Correct: You cannot block traffic based on port numbers for all three profiles by using the Windows Firewall control panel. D. Incorrect: You can use the Windows Firewall control panel to turn the firewall on and off for any of the three profiles. |
44.
Which of the following tools cannot enable and disable the Network Discovery firewall
rules?
- A.File Explorer
- B.Network and Sharing Center
- C.Action Center
- D.Allowed Apps dialog box
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
A. Incorrect: File Explorer displays a link that enables the Network Discovery rules. B. Incorrect: The Network and Sharing Center control panel contains a link that provides access to controls for the Network Discovery tools. C. Correct: The Action Center control panel does not contain Network Discovery controls. D. Incorrect: The Allowed Apps dialog box contains controls for the Network Discovery rules. |
45.
Which of the following statements about Windows Firewall are true? (Choose all that
apply.)
- A.Applying firewall rules by using Group Policy overwrites all the firewall rules on the target computer.
- B.Applying firewall rules by using Group Policy combines the newly deployed rules with the ones already there.
- C.Importing firewall rules saved from another computer overwrites all the rules on the target system.
- D.Importing firewall rules saved from another computer combines both sets of settings.
- Answer & Explanation
- Report
Answer : [B, C]
Explanation :
Explanation :
A. Incorrect: Firewall rules applied with Group Policy combine with the existing rules. B. Correct: Firewall rules applied with Group Policy combine with the existing rules. C. Correct: Importing Windows Firewall rules from another system overwrites all the existing rules. D. Incorrect: Importing rules overwrites the existing rules; it does not combine them. |