- Home
- Server Administration
- Windows
- Administering Windows server 2012 (70-411)
46.
Your network contains an Active Directory domain named Stellacon.com. The domain
contains a RADIUS server named Server1 that runs Windows Server 2012 R2. You add a
VPN server named Server2 to the network. On Server1, you create several network policies.
You need to configure Server1 to accept authentication requests from Server2. Which tool
should you use on Server1?
- A.Set-RemoteAccessRadius
- B.CMAK
- C.NPS
- D.Routing and Remote Access
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The NPS snap-in allows you to set up RADIUS servers and specify which RADIUS server would accept authentication from other RADIUS servers. You can do your entire RADIUS configuration through the NPS snap-in. |
47.
Your network contains an Active Directory domain named Panek.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the
following role services installed:
--> DirectAccess and VPN (RRAS)
--> Network Policy Server
Remote users have client computers that run either Windows XP, Windows 7, or Windows 8.
You need to ensure that only the client computers that run Windows 7 or Windows 8 can establish VPN connections to Server1. What should you configure on Server1?
--> DirectAccess and VPN (RRAS)
--> Network Policy Server
Remote users have client computers that run either Windows XP, Windows 7, or Windows 8.
You need to ensure that only the client computers that run Windows 7 or Windows 8 can establish VPN connections to Server1. What should you configure on Server1?
- A.A vendor-specific RADIUS attribute of a Network Policy Server (NPS) connection request policy
- B.A condition of a Network Policy Server (NPS) network policy
- C.A condition of a Network Policy Server (NPS) connection request policy
- D.A constraint of a Network Policy Server (NPS) network policy
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
NPS allows you to set up policies on how your users could log into the network. NPS allows you to set up policies that systems needs to follow, and if they don’t follow these policies or rules, they will not have access to the full network. |
48.
You are the network administrator for a large organization that contains an Active
Directory domain named Stellacon.com. The domain contains a server named Server1 that
runs Windows Server 2012 R2. Server1 has the Network Policy and Access Services server
role installed. You plan to deploy 802.1X authentication to secure the wireless network.
You need to identify which Network Policy Server (NPS) authentication method supports
certificate-based mutual authentication for the 802.lX deployment. Which authentication
method should you identify?
- A.PEAP-MS-CHAP v2
- B.MS-CHAP v2
- C.EAP-TLS
- D.MS-CHAP
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Windows Server 2012 R2 comes with Extensible Authentication Protocol with Transport Level Security (EAP-TLS). This EAP type allows you to use public key certificates as an authenticator. TLS is similar to the familiar Secure Sockets Layer (SSL) protocol used for web browsers and 802.1X authentication. When EAP-TLS is turned on, the client and server send TLS-encrypted messages back and forth. EAP-TLS is the strongest authentication method you can use; as a bonus, it supports smart cards. However, EAP-TLS requires your NPS server to be part of the Windows Server 2012 R2 domain. |
49.
You are the administrator of a large organization that contains an Active Directory
domain named Stellacon.com. The domain contains a server named ServerA that runs
Windows Server 2012 R2. ServerA has the Network Policy and Access Services server role
installed. Your company’s security policy requires that certificate-based authentication be
used by some network services. You need to identify which Network Policy Server (NPS)
authentication methods comply with the security policy. Which two authentication methods
should you identify? (Choose two.)
- A.MS-CHAP
- B.PEAP-MS-CHAP v2
- C.CHAP
- D.EAP-TLS
- E.MS-CHAP v2
- Answer & Explanation
- Report
Answer : [B, D]
Explanation :
Explanation :
PEAP-MS-CHAP v2 is an EAP-type protocol that is easier to deploy than Extensible Authentication Protocol with Transport Level Security (EAP-TLS). It is easier because user authentication is accomplished by using password-based credentials (username and password) instead of digital certificates or smart cards. Both PEAP and EAP both use certificates with their protocols. |
50.
You are the network administrator, and you have been asked to set up an accounting system
so each department is responsible for their cost of using network services. Your network
contains a Network Policy Server (NPS) server named ServerA. The network contains a
server named Database1 that has Microsoft SQL server installed. All servers run Windows
Server 2012 R2. You configure NPS on ServerA to log accounting data to a database on
Database1. You need to ensure that the accounting data is captured if Database1 fails. The
solution must minimize cost. What should you do?
- A.Implement Failover Clustering.
- B.Implement database mirroring.
- C.Run the Accounting Configuration Wizard.
- D.Modify the SQL Server Logging properties.
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
One advantage of NPS is that you can use the accounting part of NPS so that you can keep track of what each department does on your NPS server. This way, departments pay for the amount of time they use on the SQL server database. |