• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
In IPSec, what do connection security rules do?
configure IPSec settings between computers
What protocol does IPSec Transport Mode use to create a tunnel?
L2TP
When should IPSec Tunnel Mode be used?
when a VPN gateway isn't compatible with IPSec/L2TP
What range of addresses does ICS use?
192.168.0.0/24
What IP address does ICS assign to the internal adapter?
192.168.0.1
What two roles does an ICS computer play for clients sharing that connection?
default gateway and primary DNS server
What two types of WPA does Microsoft support?
WPA-PSK and WPA-EAP
What does WPA-EAP require that WPA-PSK does not?
certificates
What component provides RADIUS services for Windows?
Network Policy Server (NPS)
Where is the RADIUS log file stored?
%systemroot%\system32\Log Files
How is the RADIUS log file named?
IN<date>.log
Which Event Viewer log holds RADIUS events?
the Security log
What 3 VPN technologies are supported by 2008 and Vista?
Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), and Secure Socket Tunneling Protocol (SSTP)
What protocol do Microsoft VPN protocols use for user authentication?
PPP
What protocol does PPTP use for data encryption?
Microsoft Point-to-Point Encryption (MPPE)
What protocol does L2TP use for computer and data authentication and encryption?
IPSec
Which VPN technologies require computer certificates?
L2TP and SSTP
What protocol does SSTP use for data authentication and encryption?
SSL
What advantage does SSTP have over other VPN technologies?
it can pass most NATs, firewalls, and proxies
What Event Log are VPN connection events added to?
the System log
What are the 3 default Windows Firewall profiles?
public, private, and domain
What are the 4 Windows Firewall rule types?
Program (allow/block connections based on executable), Port, Predefined (Windows component), and Custom