You are on page 1of 3

Multiple Choice

Select the correct answer for each of the following questions.

1. Which three types of policies are available on the Network Policy Server (NPS)? (Choose
all that apply.)
a. Health policies
b. Network policies
c. Connection request policies
d. Accounting policies

2. Which policy is used to establish sets of conditions and settings that specify which
RADIUS servers perform the authentication, authorization, and accounting of connection
requests received by the NPS server from RADIUS clients?
a. Health policies
b. Network policies
c. Connection request policies
d. Accounting policies

3. Which policy establishes sets of conditions, constraints, and settings that specify who is
authorized to connect to the network?
a. Health policies
b. Network policies
c. Connection request policies
d. Accounting policies

4. Which policy would you use if you want to limit when a user can log in through the
VPN?
a. Health policies
b. Network policies
c. Connection request policies
d. Accounting policies

5. How do you specify which RADIUS server handles authentication for a VPN server?
a. Health policies
b. Network policies
c. Connection request policies
d. Accounting policies

6. How can you stop an NPS server to stop acting as a RADIUS server and to stop process
connections requests locally?
a. Stop the RADIUS Server service.
b. Stop the RADIUS Client service.
c. Delete the default network policy.
d. Delete the default connection request policy.

7. Which of the following are remote connections based on when creating network
policies? (Choose all that apply.)
a. Parameters
b. Constraints
c. Conditions
d. Settings

8. Which of the following are remote connections based on when creating a connection
request policy? (Choose all that apply.)
a. Parameters
b. Constraints
c. Conditions
d. Settings

9. What technology allows you to decrease allocated bandwidth when using multilink?
a. NAT
b. PAT
c. TAP
d. BAP

10. If you use an ISDN line, which of the following allows you to use multiple connections
to allow for higher bandwidth?
a. Shared links
b. Multilink connections
c. BAP
d. Dynamic links

11. How many bits does Basic Encryption support?


a. 40-bit
b. 56-bit
c. 128-bit
d. 168-bit

Matching and Identification


1. Identify which encryption level you would use with the following specifications:
b_______ a) PPTP with 40-bit encryption keys
ss______ b) L2TP/IPsec with 168-bit Triple DES encryption keys
ss______ c) PPTP with 128-bit keys
s_______ d) PPTP with 56-bit keys
s_______ e) L2TP/IPsec with 56-bit DES encryption keys

2. Match the condition with the appropriate description.


4______ a) Calling Station ID
5______ b) NAS Identifier
6______ c) Tunnel type
1______ d) Called Station ID
3______ e) Service Type
2______ f) NAS Port Type
1. The telephone of the network access server
2. If it is a framed connection or login connection.
3. The type of VPN protocol used
4. Designates the phone number used by the caller
5. The name of the network access server
6. Type of media used

3. Identify the policies that you can create with the Network Policy Server.
_______ a) authorization policies
_______ b) authentication policies
x______ c) Network policies
x______ d) Health policies
_______ e) User policies
_______ f) computer policies
_______ g) Network Connection policies
_______ h) auditing policies
Build a List
1. Specify the correct order of steps for using network policies.
2____ Checks each NPS policy for matching conditions.
4____ If all matches, the connection is allowed. If not, the connection is denied.
1____ User tries to make a remote access connection.
3____ Checks each NPS policy for constraints.

You might also like