ITN 200 MOD 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess. True False

False

The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server. True False

False

After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true? Jabez removed Marion from the Marketing group and added her to another group. Jabez removed the Remote Desktop Connection Broker service. Jabez created a shared folder that is accessible to remote servers in the collection. Jabez rebooted the remote access server.

Jabez created a shared folder that is accessible to remote servers in the collection.

Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network. Which of the following options should Damien configure on the Enable DirectAccess Wizard? Damien should not select the Use force tunneling option. Damien should select the Use force tunneling option. Damien should select the Enable DirectAccess for mobile computers only option. Damien should not select the Enable DirectAccess for mobile computers only option.

Damien should not select the Use force tunneling option.

The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use? ​ Layer Two Tunneling Protocol DirectAccess Next Generation Firewall Virtual Private Networks

DirectAccess

Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server? Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) Extensible Authentication Protocol (EAP)

Extensible Authentication Protocol (EAP)

You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration screen, which of the following services should you select? LAN routing Demand-dial connections NAT Dial-up access

LAN routing

Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use? Remote Access Server Remote Clients Infrastructure Servers Application Servers

Remote Clients

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS? Remote Desktop Licensing Remote Desktop Virtualization Host Remote Desktop Web Access Remote Desktop Gateway

Remote Desktop Gateway

Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using? Remote Desktop app Virtual Private Network RemoteApp DirectAccess

RemoteApp

Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. When configuring the remote access server, which of the following is Lashonda most likely to do? She will select the Demand-dial connections service. She will select the LAN routing service. She will install the Web Application Proxy role service. She will select the Dial-up access service.

She will select the Demand-dial connections service.

Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN. Which of the following is true of this scenario? ​ The remote access server also contains a network location server. Noortje had established a VPN connection before the system was restarted. Noortje is using a Windows 7 operating system. The client is using IPv4 packets to authenticate to the remote access server.

The remote access server also contains a network location server.

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization? Virtual Private Networks Web Application Proxy DirectAccess RemoteApp

Web Application Proxy

Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used? When a client is authenticated using an unencrypted authentication method When the Idle Timeout and Session Timeout constraints are set to 5 minutes When the access permission on the same screen is set to Access denied When a user account has the Control access through NPS Network Policy option set

When a user account has the Control access through NPS Network Policy option set

When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication. True False

False

Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario? Remote Desktop Protocol Password Authentication Protocol Point-to-Point Tunneling Protocol Layer Two Tunneling Protocol

Remote Desktop Protocol

You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work? 1723/TCP 443/TCP 500/TCP 1701/TCP

1701/TCP

Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server? Before installing the Remote Desktop Services server role After selecting the role services that Aria wants to install After choosing the desktop deployment type After selecting deployment options

After selecting the role services that Aria wants to install

An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router. In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology? ​ Next Generation Firewall Demarcation point Remote access server Point-to-Point Protocol over Ethernet (PPPoE)

Demarcation point

Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true? ​ Michaela expects users to connect from both laptops and desktops. Michaela's organization allows users to connect remotely using their personal computers. The Remote Desktop Licensing role service is not installed on the remote server. Michaela has installed an HTTPS encryption certificate for Remote Desktop Web Access.

Michaela's organization allows users to connect remotely using their personal computers.

Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router? Next Generation Firewall Last mile technology Demarcation point Point-to-Point Protocol over Ethernet (PPPoE)

Next Generation Firewall

Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application? Remote Desktop Gateway Remote Desktop Licensing Remote Desktop Virtualization Host Remote Desktop Web Access

Remote Desktop Web Access

Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true? Rory used the Log off option. Rory used the Disconnect option. Rory used the Send Message option. Rory used the Shadow option.

Rory used the Shadow option.

Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server? The remote access server should be outside the DMZ. The NAT router must be configured to forward remote access requests. The NAT router should be a Next Generation Firewall. The remote access server should be connected directly to the demarc.

The NAT router should be a Next Generation Firewall.

Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario? The number of connections for the SSTP protocol does not exceed the number of remote access clients. The remote access server was not rebooted after the recent changes. The client systems are running the latest version of Windows 10. The other protocols do not have updates to the number of connections.

The remote access server was not rebooted after the recent changes.

Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface. Which of the following statements is true of this scenario? Trang should add a DHCP relay agent for IPv6 before proceeding with the next step. Trang should reboot the remote access server before proceeding with the next step. Trang should select the network interface that is connected to the DHCP clients. Trang should select the network interface that is connected to the DMZ.

Trang should select the network interface that is connected to the DMZ.

You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server. True False

True


Ensembles d'études connexes

Intro to Crim Exam #4: Ch. 11, 12, 13, 14

View Set

Ch 11: Understanding Statistics in Research

View Set

Maternal Newborn Practice B 2019

View Set

Text structures in wheels of change pt. 1

View Set