Information Technology Reference
In-Depth Information
2. Certificates with which purposes can be used for mutual authentication of NPS and
client computers? (Choose all that apply.)
A. All Purpose certificates
B. Server authentication certificates
C. Root certificates
D. Client authentication certificates
3. When you configure NPS as a RADIUS proxy, it means the following:
A. It acts as a RADIUS client, authenticating all connection requests locally and
notifying the RADIUS server group that the request should have access.
B. It acts as a member of a RADIUS server group that accepts requests from RADIUS
clients and authenticates them.
C. It acts as a member of a RADIUS server group that accepts authenticated requests
from RADIUS clients and assigns remote computers to a network.
D. It acts as a RADIUS client, forwarding connection requests to a RADIUS server
group for authentication and authorization.
Objective 4.2: Conigure NPS policies
NPS supports three different kinds of policies: connection request policies, network policies, and
health policies. I'll leave health policies for Objective 4.3, but focus here on the first two policies.
Together, the client request policy and the network policy control which clients are allowed
to connect to the network. The connection request policy handles the initial request by a cli-
ent to connect to the network, and (depending on what port it came in on and other factors)
it passes the connection to the appropriate network policy. The network policy determines
how a client is authenticated, and whether a client is authorized to connect to the network.
This objective covers how to:
Configure connection request policies
Configure network policies for VPN clients
Manage NPS templates
Import and export NPS configuration
 
 
Search WWH ::




Custom Search