Lesson 5: Configuring Routing and Remote Access (RRAS) and Wireless Networking Multiple Choice

ginglyformweekΔίκτυα και Επικοινωνίες

29 Οκτ 2013 (πριν από 4 χρόνια και 9 μέρες)

646 εμφανίσεις




Lesson
5
:
Configuring Routing and Remote Access (RRAS) and Wireless Networking




Multiple Choice




1.
Routers are considered components of which layer?

a)
l
ayer

1

b)
l
ayer

2

c)
l
ayer

3

d)
l
ayer

4


2.
For best results, the internetwork should be
limited to fewer than how many subnets with an
easily predicted traffic pattern (such as arranged consecutively in a straight line)
?

a)
5

b)
7

c)
10

d)
12


3.
Windows Server 2008 includes all of the following routing protocols that can be added to the
Rout
ing and Remote Access service with the exception of

__________.

a)
OSPF

b)
IGMP Router
&

Proxy

c)
DHCP Relay Agent

d)
RIPv2


4.
How can you view the IP routing table
?

a)
Routing and Remote Access console

b)
c
ommand

prompt

c)
both
B

&
C

d)
n
one of the above


5.
Which
entries refer to a separate multicast route
?

a)
0.0.0.0

b)
127.0.0.0

c) 224.0.0.0

d)
255.255.255.255



6.
Which
of the following
is the limited broadcast address

that

is general for all networks and
routers
?

a) 0.0.0.0

b) 127.0.0.0

c) 224.0.0.0

d) 255.255.255.255


7.
Which column of the IP Routing Table indicates the gateway value for each routing table
entry
?

a)
f
irst

b)
s
econd

c)
t
hird

d)
f
ourth


8.
Of the f
our types of routes
that
can be found in a routing table, which of the following cannot
be found
?

a)
d
irectly attached network routes

b)
r
emote

network routes

c)
c
lient

routes

d)
h
ost

routes



9.
Which option enables internal clients to connect to the Internet using a single, external IP
address?

a)
r
emote

access

b)
n
etwork

address translation

c)
v
irtual

private network

d)
c
ustom

configuration


10.
What type of connectivity creates a secure point
-
to
-
point connection across either a private
network or a public network
,

such as the Internet
?

a)
r
emote

access

b)
d
ial
-
up netwo
rking

c)
v
irtual

private network

d)
c
ustom

configuration


11.
An NPS Network Policy, which is a rule for evaluating remote connections, consists of
which of the foll
o
wing

items?

a)
c
onditions


b)
c
onstraints

c)
s
ettings

d)
a
ll of the above




12.

What encryption type
is used for dial
-
up

and PPTP
-
based VPN connections with

a 40
-
bit
key
?

a)
b
asic
e
ncryption

b)
s
trong
e
ncryption

c)
s
trongest
e
ncryption

d)
n
o
e
ncryption


13.
Which mutual authentication method offers encryption of both authentication
data and
connection data
?

a)
EAP.TLS

b)
MS
-
CHAPv2

c)
MS
-
CHAPv1

d)
Extensible Authentication Protocol
-
Message Digest 5 Challenge Handshake Authentication
Protocol (EAP
-
MD5 CHAP)


14.
Which generic authentication method offers encryption of authentication da
ta through the
MD5 hashing scheme
?

a)
Password Authentication Protocol (PAP)

b)
Shiva Password Authentication Protocol (SPAP)

c) Challenge Handshake Authentication Protocol (CHAP)

d) Extensible Authentication Protocol
-
Message Digest 5 Challenge Handshake A
uthentication
Protocol (EAP
-
MD5 CHAP)


15.

Which generic authentication method does
not

encrypt authentication data
?

a) Password Authentication Protocol (PAP)

b) Shiva Password Authentication Protocol (SPAP)

c) Challenge Handshake Authentication Protocol (
CHAP)

d) Extensible Authentication Protocol
-
Message Digest 5 Challenge Handshake Authentication
Protocol (EAP
-
MD5 CHAP)


16.

802.1X provides port
-
based security through the use of all of the following components with
the exception of

a(n) __________.

a)

a
u
thenticator

b)
s
upplicant

c)
v
erifier

d)
A
uthentication
S
erver


17
.

What term refers to the

device that is seeking access to the network, such as a laptop
attempting to access a wireless access point
?


a)
a
uthenticator

b)
s
upplicant

c)
v
erifier

d)
A
uthentication
S
erver


18.

Which one
-
way authentication method offers encryption of both authentication data and
connection data

(t
he same cryptographic key is used in all connections
; t
his method supports
older Windows clients, such as Windows 95 and Windo
ws 98
)?

a) EAP.TLS

b) MS
-
CHAPv2

c) MS
-
CHAPv1

d) Extensible Authentication Protocol
-
Message Digest 5 Challenge Handshake Authentication
Protocol (EAP
-
MD5 CHAP)


19.

One example of an NPS Policy Setting includes IP properties that specify IP address
assignme
nt behavior. Which of the following is
not
an option?

a) Server Must Supply
an

IP Address

b) Client Must Supply
an

IP Address

c) Client May Request
an

IP Address

d) Server Settings Determine IP Address Assignment



20.

By default, the Callback Options sett
ing is configured as

__________.

a)
Always Callback To

b)
Set by Caller


c)
No Callback

d)
None

of the above



True/False




21.
When most traffic is synchronous, as in voice and video transmissions, VPN is your best
option
.


22.
By default, the Callback

Options setting is configured as No Callback.


23.
By using the Routing and Remote Access service, Windows Server 2008 can be configured
as a router and remote access server.


24.
A hub examines the destination and source ad
dress of an incoming data frame

and forwards
the frame to the appropriate destination port according to the destination address.


25.
A static
-
routed IP environment is best suited to small, single
-
path, static IP internetworks.


Fill
-
in
-
the
-
Blank


26.
Open
__________

Path First
was desig
ned to address the

scalability limitations of RIP
to
create a routing protocol that could be used on significantly larger networks.



27.
The first column in the routing table indicates the
network
__________.





28.
The final column in the routing table
corresp
onds to the routing table entry’
s
__________.



29.
For remote network routes, the
__________
-
Hop

field is a local router’s IP address.



30.
The
__________

protocol translates internal, private IP addresses t
o external, public IP
addresses

and vice versa.


31.
After a user submits credentials to create a remote access connection, the remote access
connection must be authorized by a Windows Server 2008 server running the
Network
__________

Server
RRAS role service
.


32.
__________

is the pro
cess of verifying that an entity or object is who or what it claims to be.


33.
As a final step in configuring the Network Policy Server to provide authentication,
authorization, and accounting for your remote access clients, you will also need to configur
e

__________.



34.
__________

addresses include specific subnet broadcast addresses, such as 192.168.0.255
.



35.
You can view the IP routing table by using the
Routing
a
nd Remote Access
console or the
__________

prompt.



Short Answer



36.
802.1X provi
des port
-
based security through the use
of
an Authentication Server and what
two other components
?



37.
What are the four encryption options available in the Encryption tab
?


38.

802.1X
can allow or deny access
on the basis of a physical port

(
such as
someone plugging
into a single wa
ll jack using an Ethernet cable) or a logical port

(
such as one or more people
conne
cting to a wireless access point using the WiFi cards in one or more laptops or handheld
devices
)
. This
occurs

because 802.1x is based

on w
hat
?



39.

What is
a rule for evaluating remote connections
?


40.

What type of server can be used
to centralize remote access authentication, authorization, and
logging
?


41.

What
protocol enables private networks to connect to the Internet
?


42.
What was
designed to address the

scalability limitations of RIP

to create a routing protocol
that could be used on significantly larger networks
?


43.

What is a route to a specific IP address?