• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

1. You have Windows Firewall set to restrict all incoming traffic except for web traffic. You would like to set up a rule to allow a specific type of network service, such as FTP tranfers. Which of the following rules would be recommended for this situation?


A. Protocol


B. Program


C. Port


D. IPsec

C. A port rule would enable you to specify the specific port number (such as port 20 and port 21 for FTP transfers). To set up the port rule, you use Windows Firewall with Advanced Security and specify that you want to create a new inbound rule.

2. Your organization is planning on implementing DirectAccess so users can access the organization’s network when working from home. Of the following choices, what must be included in the plan?


A. IPv6


B. WINS


C. Libraries


D. Preferred wireless settings

A. DirectAccess requires IPv6, so IPv6 must be implemented to support it. WINS is used for NetBIOS name resolution but is not needed for DirectAccess. Shared libraries are used to share information among users within small workgroup but are not related to DirectAccess.

3. You are researching to see if Windows Firewall is adequate to protect your computer from attacks. Which of the following are the types of packet information analyzed by Windows Firewall?

A. Source IP address of the packet


B. Destination IP address


C. TCP/UDP port number


D. All of the above

D. Windows Firewall analyzes the source IP of the packet, destination IP address, TCP/ UDP port number, and other items.

4. Your company is setting up BranchCache on its enterprise network to allow caching and accessing of file from remote branch offices. Which of the following commands or Windows tools is used to configure BranchCache on the client computers?


A. netsh command


B. branchcache command


C. BranchCache utility


D. None of the above

A. The clients must be configured using either Group Policy or the netsh command. For example, you can use this command from an administrative command prompt to configure clients to use distributed caching: netsh branchcache set service distributed.

5. Your company wants to allow remote users to access the company’s internal network in a secure way. Which of the following would allow users to connect to the internal network?


A. Remote Assistance


B. AppLocker


C. PowerShell


D. VPN

D. VPNs, or virtual private networks, allow users to access private networks while connecting from an outside network, such as the Internet. Remote Assistance is used to allow a user to connect to one client computer. AppLocker is used to restrict which applications can run on different computers and isn’t useful here. PowerShell is a Windows scripting language.

6. You want to restrict the users who can connect to your computer using Remote Desktop Connection. In which dialog box would you find the setting to restrict who can authenticate?

A. Remote Assistance Settings


B. Remote Desktop Users


C. System Properties


D. Remote Desktop Connection

B. The Remote Desktop Users dialog box is opened by clicking Select Users on the System Properties – Remote tab. Remote Assistance Settings lets you control if a computer can be controlled remotely and how many hours an invitation stays open. The System Properties dialog box has options for enabling Remote Assistance and Remote Desktop connections. The Remote Desktop Connection window does not have options for setting user authentication.
7. You are using a Windows 8.1 touch-enabled tablet to access your office desktop computer remotely. Which of the following tools is best to take advantage of the Windows 8.1 touch features?

A. Remote Desktop Connection


B. Remote Assistance


C. VPN connection


D. Remote Desktop app

D. The Remote Desktop app is designed for Windows 8.1, including touch-enabled devices. Remote Desktop Connection, Remote Assistance, and VPN connections are not touch-enhanced.

8.You want to configure Windows Firewall to exempt computers or IP addresses from authenticating to your system. Which of the following methods would you use?


A.Enabling a port


B.Authentication exception


C.Configure remote authentication


D.All of the above

B. You can configure Windows Firewall to exempt computers or IP addresses from authenticating by setting up authentication exceptions. Enabling a port provides a way for you to allow or block traffic to a specific port or range of ports. You configure remote authentication to allow or restrict users who can remotely access your computer.

9. You want to help another user in your office with a computer problem they are experiencing. Which of the following remote tools would be the best tool to use so that they can watch you interact on the screen while you remotely access their computer?


A. Remote Assistance


B. Remote Desktop Connection


C. Remote Desktop app


D. VPN

A. Remote Assistance provides a way for a user who is already logged in to send an invitation for someone else to connect. Remote Desktop Connection and the Remote Desktop app close any current remote session. VPN connections can access other remote network resources, such as files, databases, and so forth.

10. You have Windows Firewall running with inbound and outbound traffic blocked. You need to provide a way for a program to access the Internet. What would you use to configure this?

A. Port exception using Windows Firewall with Advanced Security


B. Protocol exception using Windows Firewall with Advanced Security


C. Connection blocking with Windows Firewall


D. Allow an app or feature through Windows Firewall

D. The Allow An App Or Feature Through Windows Firewall option provides a way to change allowed apps through Windows Firewall. Port exceptions and protocol exceptions would not necessarily work as those features may allow additional programs to access the Internet. Connection blocking would block all apps and features by default.
11. You have a number of users who get permission from time to time to work from home by connecting to their office computers using Remote Desktop. The security officer has asked you to make sure that the home computers that are being used cannot connect to any other corporate network resource. What must you do?

A. Make a VPN.


B. Disable the local resource options of the Remote Desktop.


C. Set up DirectAccess and use it to restrict remote computers.


D. Configure the Remote Desktop Gateway IP address on the client computer.

D. The Remote Desktop Gateway permits a remote computer to make a Remote Desktop connection to a user’s computer on the corporate network but blocks the remote computer from accessing anything other than the target computer.

12. Hackers like to send communications to your machine in the hope that the replies they get back from the computer will let them know where to attack. How do you prevent your machine from talking back to the hacker?


A. Remove your machine from the network.


B. Set up Windows Firewall in stealth mode.


C. Run winrs quickconfig hide me.


D. Disable return messaging.

B. In stealth mode the firewall receives probing packets that hackers use to determine what services and equipment it can target. The firewall simply loses the packets and does not sending anything back to the source.

13. You have a few hundred computers that have just been upgraded to Windows 8.1 and you need to assign static IPv6 addresses to them using Windows PowerShell. Which cmdlet can you use?

A. Set-NetV6IPaddress


B. Set-TCPNetSettng


C. Set-NetIPAddress


D. Set-NetAddressV6

C. To assign static IP addresses to your client computers, you can use the Windows Power- Shell cmdlet Set-NetIPAddress.

14. You have 60 Windows 8.1 computers in a new branch office and you find that they are unable to connect to the corporate network via the DirectAccess protocol. After running diagnostics on the client computers, you discover something is missing in the network configuration. What is missing?


A. The client computers do not have assigned IPv4 addresses.


B. The client computers do not have IPv6 addresses assigned to the network adapters.


C. The client computers do not have network adapters.


D. The gateway address of the branch office switch is missing from the configuration.

B. DirectAccess allows clients to access internal resources using Internet access but without creating a VPN. Also, DirectAccess does not require the user to manually create a connection.

15. Your company has several hundred users who telecommute part of the time. These groups need to access files on various devices when they are in the office and in the field, but the files must be synchronized so that changes made on office machines are propagated to laptops, tablets, and so on. What must you do to synchronize the various versions of files?


A. Enable drive mapping.


B. Ensure they also have a VPN connection.


C. Configure Sync Center to sync files on the various devices a user needs to use.


D. Create a new Remote Desktop connection with new drive settings to allow users to download the latest version.

C.SyncCenter was introduced in Windows 8 anWindows8.1and lets you sync your various devices. It uses your Microsoft account to connect with your local account so that things like browser history and offline files can be accessible from all your synced devices.

16. You have been asked to ensure that clients who need to use IPsec tunnels to access sensitive data use the highest encryption available for the service. Which encryption should you use?

A. AES


B. RSA


C. DES


D. 3DES

A. When using IPsec in the corporate environment where clients access highly sensitive data, it is best to use the highest encryption available.

17. When setting up a remote office environment, you find that there is no server at the site, only a Windows 8.1 computer used as an administrative machine. What is next best option you have to enable the site for branch computing?


A. Add a route by using netsh.


B. Download SP1 to enable you to use BranchCache on the workstation.


C. The site cannot be used as a branch office.


D. You can use distributed cache mode from the main office.

D. If hosted cache mode is used, you must enable the BranchCache feature on the server in the remote office. If you don’t have at least Windows Server 2008 R2, you can use distributed cache mode instead.

18. You have a new Window 8.1 client at a remote site who is complaining that it is taking her too long to access a file on the corporate network. What action can you take to help her?

A. Move the file server closer to her computer.


B. Configure her machine to use DirectAccess cache by running the DirectAccess cmdlet.


C. Run the command netsh branchcache set service distributed on her computer.


D. Run the command netsh branchcache set service enabled on her computer.

C. Windows 8.1 clients can cache or access files used with BranchCache. In addition, the clients must be configured using either Group Policy or the netsh command.
19. Which of the following Windows 8.1 versions can NOT be remote desktop host?

A. Windows 8.1 Pro


B. Windows 8.1 Enterprise


C. Windows RT 8.1


D. All of them can be

D. Windows RT and Windows 8.1 (basic edition) can use Remote Desktop as a client only. Computers running those versions cannot be set up as Remote Desktop hosts, meaning you cannot remotely access them from another computer.
20. You have several hundred computers on the corporate network, all of which are part of a workgroup. You are asked to ensure that remote access uses the most secure network con- nections on the VPN. What is the most secure tunneling protocol you can use on your Win- dows 8 and 8.1 computers?

A. Internet Key Exchange version


2 (IKEv2) B. Secure Shell Tunneling Protocol (SSTP)


C. Layer 2 Tunneling Protocol (L2TP)


D. Point-to-Point Tunneling Protocol (L2TP)

A. VPN connections use tunneling protocols. These tunneling protocols include encryption and provide additional protection for the connection.