Chapter 12: Using Mobile Computers
What is the main advantage of using Direct Access over VPN connections? * Users don't have to manually connect to the remote network * Direct Access uses IPV4 rather than IPV6 * Direct Access supports more operating systems than VPNs * Direct Access connections are uni-directional
* Users don't have to manually connect to the remote network
Transparent caching saves temporary copies of files based on which of the following criteria? 1. File size 2. Network roundtrip latency 3. Number of requests for the file 4. User time limits
2. Network roundtrip latency
Which of the following is NOT a prerequisite for a DirectAccess server? 1. Two consecutive, public IPv4 addresses 2. Two network interface adapters 3. A NAT connection to the Internet 4. Membership in an AD DS domain
3. A NAT connection to the Internet A DirectAccess server must have a direct connection to the Internet, not a NAT connection.
Which of the following wireless networking standards uses spatial multiplexing to increase bandwidth? 1. IEEE 802.11b 2. IEEE 802.11g 3. IEEE 802.11n 4. IEEE 802.1X
3. IEEE 802.11n
Which of the following IPv6/IPv4 transition technologies takes the form of a hardware device? 1. 6to4 2. Teredo 3. NAT-PT 4. ISATAP
3. NAT-PT Network Address Translation-Protocol Translation (NAT‐PT): A hardware device that enables DirectAccess clients to access IPv4 applications.
Which of the following BitLocker operational modes must you configure using Group Policy? 1. TPM + startup key 2. TPM only 3. TPM + startup PIN + startup key 4. Startup key only
3. TPM + startup PIN + startup key
Which of the following tools can you use to import and export power management plans in Windows 7? 1. The Power Options control panel and Group Policy 2. Powercfg.exe and Group Policy 3. The Power Options control panel only 4. Powercfg.exe only
4. Powercfg.exe only
Which of the following wireless security protocols is the most secure? 1. WPA-TKIP 2. WEP (128-bit) with 802.1X authentication 3. WEP (128-bit) 4. WPA-AES
4. WPA-AES
Which technology is the most common to connect to a wireless network for a corporation that allows a data rate up to 54 MB/sec? 802.11a 802.11b 802.11g 802.11n
802.11g
What technology is used to configure power settings using the graphical control panel? APM ACPI PIM PS
ACPI - Advanced Configuration and Power Interface
_______________ enables remote users to automatically connect to the computer network whenever they have Internet access. DirectAccess BranchCache Remote App Network Access Protection
DirectAccess
Which of the following is the most secure password-based authentication protocol supported by the VPN client in Windows 7? 1. EAP-MSCHAPv2 2. POP 3. EAP (PEAP) 4. CHAP
EAP‐MSCHAPv2, the default selection for new connections and the strongest password‐based mechanism in Windows 7
What component is used to ensure that all clients meet a minimum set of criteria such as up-to-date anti-virus protection and Windows updates? VPN Reconnect Network Access Protection Remote App Direct Access
Network Access Protection
What bundles together the configuration settings that users most often use when giving a presentation into a single switch? Mobility on the Go Presentation Settings Mobile Show Mobile Display
Presentation Settings
Which of the following steps in the DirectAccess connection establishment process occurs first? 1. The client and the DirectAccess server authenticate each other using their computer certificates. 2. The client submits a health certificate to a Network Policy Server (NPS) on the host network. 3. The client attempts to connect to a designated network detection server on the intranet. 4. The client establishes a connection to the domain controller and performs a standard AD DS user authentication.
The client attempts to connect to a designated network detection server on the intranet.
What is the main advantage of using DirectAccess over VPN connections?
Users don't have to manually connect to the remote network. *Designed as a replacement for VPNs, DirectAccess eliminates the need for client users to manually establish wide area connections to their networks.
Which wireless technology is considered a weak encryption protocol? 802.1x WEP WPA WPA2
WEP
What replaced ActiveSync to synchronize data files, email, appointments, and contact information with the mobile devices? Partner Sync Center Sync Center Windows Mobile Device Center BitLocker
Windows Mobile Device Center
Which tool set is designed specifically for mobile PCs? * Computer Management console * Mobile Management console * Windows Mobility Center * Computer Information Center
Windows Mobility Center