List two ways that NAP can be used to keep a network healthy.

What will be an ideal response?


Identifies clients and other computers on a network that do not comply with the security policies set through Windows Server 2008

Limits access by noncompliant computers, such as by not allowing access to resources, not permitting logon, or by quarantining a noncompliant computer to specific resources or portions of a network

Automatically updates or configures a noncompliant computer to match the security policies required for access, such as by changing policy settings on the client or updating the client operating system to have the latest security patches

Continuously checks throughout the entire network and server connection session to ensure that computers remain in compliance, even after they have been given access to the network, server, and resources

Computer Science & Information Technology

You might also like to view...

We take a sample of adults and measure their heights. If we record the gender of each person, we can calculate the average height and the variance of the height, separately, for men and women. Suppose, however, that this informa- tion was not recorded. Would it be possible to still obtain this information? Explain.

What will be an ideal response?

Computer Science & Information Technology

Match each item with a statement below.

A. an IPv4/IPv6-capable computer in which each version of IP accesses a separate Transport layer stack B. a virtual network infrastructure model describing IPv6-capable networks embedded within a larger core IPv4 LAN and communicating with other IPv6 networks using a tunneling technology C. a technology that translates an IP address used in one network, such as a private LAN, to a different IP address used in a different network, such as the public Internet D. a virtual network infrastructure model describing IPv6 nodes existing in a IPv4 core backbone and communicating with each other using a tunneling technology E. a method of verifying that a string is an IP address and, if so, determining if the address is IPv4 or IPv6 F. a route used by a network node to communicate with another network node on the same physical or virtual subnet G. the receiving node at the other end of the tunnel, which is responsible for reassembling any fragmented packets, removing the IPv4 header encapsulation, and processing the IPv6 packet H. the route used by a network device to communicate to other devices on a different physical or virtual subnet, leading to the next-hop device, which is typically a router I. a method used by ISATAP nodes to maintain a current list of routes and routers

Computer Science & Information Technology

Photoshop's type tools use the SHIFT key combined with the character code to create special characters.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What would we expect this for loop to do?

for (position = 1 through aList.getLength()) { dataItem = aList.getEntry(position) print(dataItem) }

Computer Science & Information Technology