Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
12 Cards in this Set
- Front
- Back
What are the 3 firewall actions?
|
block, allow, and secure
|
|
How are outbound connections handled by default by Windows Firewall?
|
they are not filtered by default
|
|
How are inbound connections handled by default by Windows Firewall?
|
they are blocked by default
|
|
What command-line command will show what applications are listening for incoming connections?
|
netstat -a -b
|
|
What does Network Access Protection do?
|
connects hosts to different network resources based on current health state
|
|
What are the 4 NAP enforcement types?
|
IPSec connection security, 802.1x access points, VPN servers, and DHCP servers
|
|
What additional component is required for IPSec connection security?
|
Certificate Services
|
|
What two methods can 802.1x used to control access levels?
|
access control list (ACL) or VLAN
|
|
What advantage do ACL's have as an 802.1x enforcement method?
|
non-compliant machines can't communicate amongst themselves
|
|
How does DHCP Server Enforcement prevent unauthorized network access?
|
only compliant machines are issued IP addresses
|
|
What subnet mask is granted to non-compliant machines when using DHCP Server Enforcement?
|
255.255.255.255
|
|
How does DHCP Server Enforcement handle non-compliant hosts?
|
they are given host routes for resources to become compliant
|