PrepAway - Latest Free Exam Questions & Answers

What should you create?

Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Network Policy Server server role installed.
You need to allow connections that use 802.1x.
What should you create?

PrepAway - Latest Free Exam Questions & Answers

A.
A network policy that uses Microsoft Protected EAP (PEAP) authentication

B.
A network policy that uses EAP-MSCHAP v2 authentication

C.
A connection request policy that uses EAP-MSCHAP v2 authentication

D.
A connection request policy that uses MS-CHAP v2 authentication

Explanation:
802.1X uses EAP, EAP-TLS, EAP-MS-CHAP v2, and PEAP authentication methods:
EAP (Extensible Authentication Protocol) uses an arbitrary authentication method, such as
certificates, smart cards, or credentials.
EAP-TLS (EAP-Transport Layer Security) is an EAP type that is used in certificate-based
security environments, and it provides the strongest authentication and key determination
method.
EAP-MS-CHAP v2 (EAP-Microsoft Challenge Handshake Authentication Protocol version 2)
is a mutual authentication method that supports password-based user or computer
authentication.
PEAP (Protected EAP) is an authentication method that uses TLS to enhance the security of
other EAP authentication protocols.
Connection request policies are sets of conditions and settings that allow network
administrators to designate which Remote Authentication Dial-In User Service (RADIUS)
servers perform the authentication and authorization of connection requests that the server
running Network Policy Server (NPS) receives from RADIUS clients. Connection request
policies can be configured to designate which RADIUS servers are used for RADIUS
accounting.
With connection request policies, you can use NPS as a RADIUS server or as a RADIUS
proxy, based on factors such as the following:
The time of day and day of the week
The realm name in the connection request
The type of connection being requested
The IP address of the RADIUS client

17 Comments on “What should you create?

      1. Ricky says:

        You don’t get it do you? That link talks about the fact that this authentication method defined in the connection request policy, is only used with 802.1x or VPN with NAP. Since NAP isn’t mentioned here and isn’t used, why would it be C?




        0



        0
  1. Starlin says:

    Agree with Dude, must be B:

    Connection request policies are sets of conditions and settings that allow network administrators to designate which Remote Authentication Dial-In User Service (RADIUS) servers perform the authentication and authorization of connection requests that the server running Network Policy Server (NPS) receives from RADIUS clients. Connection request policies can be configured to designate which RADIUS servers are used for RADIUS accounting.




    0



    0
  2. AS says:

    Answer is C

    Authentication method set by connection request policies overrride authentication method set by network policy

    https://msdn.microsoft.com/en-us/library/cc753603.aspx

    “If you configure an authentication method in connection request policy that is less secure than the authentication method you configure in network policy, the more secure authentication method that you configure in network policy will be overridden. For example, if you have one network policy that requires the use of Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2), which is a password-based authentication method for secure wireless, and you also configure a connection request policy to allow unauthenticated access, no clients are required to authenticate by using PEAP-MS-CHAP v2. In this example, all clients connecting to your network are granted unauthenticated access.”

    EAP, EAP-TLS, EAP-MS-CHAP v2, and PEAP authentication
    The support that 802.1X provides for Extensible Authentication Protocol (EAP) types allows you to choose from several different authentication methods for wireless clients and servers.

    https://technet.microsoft.com/en-us/library/cc759077(v=ws.10).aspx




    0



    0
  3. robber says:

    https://msdn.microsoft.com/en-us/library/cc753603.aspx

    This line removes the “network policy” answers despite them being processed locally. From the 2 connection request policies ms-chapv2 only doesn’t make sense, so C.

    When you deploy Network Access Protection (NAP) by using the virtual private network (VPN) or 802.1X enforcement methods with Protected Extensible Authentication Protocol (PEAP) authentication, you must configure PEAP authentication in the connection request policy even when connection requests are processed locally.




    0



    0
    1. Ricky says:

      “WHEN” you deploy “NAP” blah blah. Question does not mention that.

      I think everyone is confused here because of either:

      a) They think it must be Connection Request Policy because of what Robber quoted. However, this question does not mention NAP being used at all, so we can’t just assume this.

      b) Authentication in Connection Request can override Network Policies. This is true, but we’re not told this is enabled either.




      0



      0
  4. den says:

    the answers are WTF-like!
    We had several of such projects (in conjunction with PKI) for customers and we always useed the default connection request policy and define “the magic” in the network policies. And we always used EAP-TLS and it definately works that way.
    Furthermore, the explanation of this answer states that there are several options how to implement 802.1X. So what would be wrong for example with using PEAP stuff? EAP-MSCHAPv2 is less secure anyway, wtf…?!
    so I’d go for A and using the default connection request policy




    0



    0
  5. Leisa says:

    I took an online test 3 times using the training site e-careers (tech.e-careers.com), and only got it “right” after the 3rd try:
    1st time – C – it was marked wrong
    2nd time – B – it was marked wrong
    3rd time – A – it was marked correct
    Of course they could be wrong too.




    0



    0

Leave a Reply