1.
____ uses PPP to encapsulate traffic for transmission across network using a secure socket layer (SSL) connection.
Correct Answer
A. Secure Socket Tunneling Protocol
Explanation
Secure Socket Tunneling Protocol (SSTP) uses PPP to encapsulate traffic for transmission across a network using a secure socket layer (SSL) connection. SSTP is a protocol that allows remote users to access a private network securely. By using SSL, SSTP ensures that the data transmitted between the client and the server is encrypted and cannot be easily intercepted or tampered with. This makes SSTP a secure and reliable option for remote access to private networks.
2.
The ____ component of RRAS provides support for multicast network traffic by routing multicast traffic to networks that host these services.
Correct Answer
C. IGMP router and proxy
Explanation
The IGMP (Internet Group Management Protocol) router and proxy component of RRAS (Routing and Remote Access Service) supports multicast network traffic by routing the multicast traffic to networks that host these services. IGMP is a protocol used by hosts and adjacent routers on an IP network to establish multicast group memberships. The IGMP router and proxy component in RRAS enables the routing and forwarding of multicast traffic, allowing networks to efficiently handle multicast communication.
3.
The ____ is a role service that provides you with a framework for creating and enforcing network access policies for client health, along with policies for authentication and authorization of connection requests.
Correct Answer
D. Network Policy Server
Explanation
The Network Policy Server is a role service that provides a framework for creating and enforcing network access policies for client health, as well as policies for authentication and authorization of connection requests. It allows administrators to define and manage policies that control network access for users and devices, ensuring that only authorized and healthy clients can connect to the network. The Network Policy Server plays a crucial role in maintaining network security and managing access control within an organization.
4.
A(n) ____ is the database used by a RADIUS server to authenticate users.
Correct Answer
C. User account database
Explanation
A user account database is the database used by a RADIUS server to authenticate users. This database contains the necessary information about each user, such as usernames, passwords, and other relevant credentials. When a user tries to access a network or service that requires authentication, the RADIUS server checks the user's credentials against the user account database to verify their identity. If the credentials match, the user is granted access; otherwise, access is denied.
5.
____ is a role service used to configure and manage network routing in Windows Server 2008.
Correct Answer
D. Routing and Remote Access Services
Explanation
Routing and Remote Access Services is a role service used to configure and manage network routing in Windows Server 2008. It allows administrators to set up and manage routing protocols, such as RIP, OSPF, and BGP, and provides remote access capabilities, including VPN and dial-up connections. With Routing and Remote Access Services, administrators can control and direct network traffic, establish secure connections, and manage network resources efficiently.
6.
____ are composed of routes.
Correct Answer
B. Routing tables
Explanation
Routing tables are composed of routes. Routing tables are data structures used by routers to determine the best path for forwarding network traffic. They contain a list of available routes, including destination addresses and associated metrics, which are used to make decisions on how to direct packets. Routing tables are crucial for efficient and accurate routing in a network, allowing routers to determine the most appropriate path for data transmission.
7.
A RADIUS client can be an NPS, which replaces the IAS from previous versions of Windows Server.
Correct Answer
A. True
Explanation
The statement is true because NPS (Network Policy Server) is the replacement for IAS (Internet Authentication Service) in previous versions of Windows Server. NPS is a RADIUS (Remote Authentication Dial-In User Service) client that allows for centralized authentication, authorization, and accounting for network access. Therefore, it is correct to say that a RADIUS client can be an NPS.
8.
A(n) ____ is a setting used to route RADIUS messages between the access client and the appropriate RADIUS server.
Correct Answer
A. RADIUS proxy
Explanation
A RADIUS proxy is a setting used to route RADIUS messages between the access client and the appropriate RADIUS server. It acts as an intermediary, forwarding RADIUS authentication and accounting requests from the client to the server, and vice versa. This allows for efficient communication and authentication between the client and server, ensuring secure network access.
9.
____ are responsible for forwarding packets between subnets, or networks with differing IP addressing schemes.
Correct Answer
A. Routers
Explanation
Routers are responsible for forwarding packets between subnets or networks with differing IP addressing schemes. They analyze the destination IP address of incoming packets and determine the best path for forwarding them to the appropriate destination. Routers maintain routing tables that contain information about the network topology and use this information to make intelligent routing decisions. By doing so, routers enable communication between different networks and allow devices with different IP addresses to communicate with each other.
10.
____ is an industry-standard protocol that provides centralized authentication, authorization, and accounting for network access devices such as wireless access points and remote access servers.
Correct Answer
C. RADIUS
Explanation
RADIUS is an industry-standard protocol that provides centralized authentication, authorization, and accounting for network access devices such as wireless access points and remote access servers. It allows network administrators to manage user access to the network by authenticating users' credentials, authorizing their access based on predefined policies, and keeping track of their network usage for accounting purposes. RADIUS ensures secure and efficient network access control and is widely used in various network environments.
11.
____ works by encapsulating PPP frames before they are transmitted across a network.
Correct Answer
C. Layer 2 Tunneling Protocol
Explanation
Layer 2 Tunneling Protocol (L2TP) works by encapsulating PPP frames before they are transmitted across a network. L2TP is a protocol that allows the creation of virtual private networks (VPNs) by establishing a secure connection between two endpoints. It operates at the data link layer (Layer 2) of the OSI model and uses PPP for authentication and encryption. By encapsulating PPP frames, L2TP ensures that data is securely transmitted over the network, providing a reliable and secure communication channel.
12.
A ____ is any device such as a remote access server, wireless access point, or VPN concentrator, that accepts remote connections from remote access clients.
Correct Answer
B. RADIUS client
Explanation
A RADIUS client is a device that accepts remote connections from remote access clients. This device could be a remote access server, wireless access point, or VPN concentrator. RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized authentication, authorization, and accounting management for remote access clients. The RADIUS client acts as the intermediary between the remote access clients and the RADIUS server, forwarding authentication requests and receiving responses.
13.
____ provides Dynamic Host Configuration Protocol (DHCP) relay agent functionality for networks.
Correct Answer
B. RRAS
Explanation
RRAS (Routing and Remote Access Service) provides Dynamic Host Configuration Protocol (DHCP) relay agent functionality for networks. This means that RRAS acts as an intermediary between DHCP clients and DHCP servers, allowing DHCP messages to be relayed across different network segments. By doing so, RRAS enables DHCP clients to obtain IP addresses and other network configuration information even if they are located on a different subnet from the DHCP server.
14.
____ route traffic based on information they discover about remote networks from other routers.
Correct Answer
C. Dynamic protocols
Explanation
Dynamic protocols are responsible for routing traffic based on information they discover about remote networks from other routers. These protocols dynamically exchange information with neighboring routers to learn about network topology, available routes, and the best path to reach a destination network. This allows routers to make informed decisions on how to forward traffic and adapt to changes in the network. Authentication servers, supplicants, and stub zones do not perform this specific function of dynamically routing traffic based on discovered information.
15.
As a software-based router, RRAS is recommended for use in small networks that require simple routing directions but is not recommended for large and complex environments.
Correct Answer
A. True
Explanation
RRAS stands for Routing and Remote Access Service. It is a software-based router that is built into the Windows operating system. It is designed to provide routing and remote access capabilities for small networks. RRAS is suitable for small networks that require basic routing functionality and simple routing directions. However, in large and complex environments, where there is a need for advanced routing features and scalability, it is not recommended to use RRAS as it may not be able to handle the complexity and volume of traffic efficiently. Therefore, the statement that RRAS is recommended for use in small networks but not for large and complex environments is true.