exam questions

Exam AZ-801 All Questions

View all questions & answers for the AZ-801 exam

Exam AZ-801 topic 1 question 21 discussion

Actual exam question from Microsoft's AZ-801
Question #: 21
Topic #: 1
[All AZ-801 Questions]

HOTSPOT -
Your network contains an Active Directory Domain Services (AD DS) domain. The domain contains servers that run Windows Server as shown in the following table.

Server1 has the connection security rules shown in the following table.

Server2 has the connection security rules shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

Show Suggested Answer Hide Answer
Suggested Answer:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Lu5ck
Highly Voted 2 years, 4 months ago
Request - Authenticate whenever possible but authentication is not required Require - Must be authenticated to be allowed NTLM is the fallback protocol and is always available unless explicitly disabled. https://learn.microsoft.com/en-us/windows-server/security/kerberos/ntlm-overview With that said, the answer indeed is Y, Y, Y.
upvoted 10 times
...
Leocan
Highly Voted 2 years, 5 months ago
1. Y - combine Rule12 and Rule 31. 2. Y - Rule 31, (assume there are no connection security rules on Server3) 3. Y - Rule 31, (assume there are no connection security rules on Server3)
upvoted 7 times
...
BlackCat9588
Most Recent 4 months, 1 week ago
Sound it is in-completed question. Cannot coomnent
upvoted 2 times
...
RemmyT
10 months, 2 weeks ago
Server1 Rule11 172.16.10.0/24 172.16.20.50 'Require inbound and outbound' 'Computer (NTLMv2)' Rule12 172.16.10.10 172.16.0.0/16 'Request inbound and outbound' 'Computer (Kerberos V5)' Server2 Rule21 Any Any 'Request inbound and outbound' 'Computer (NTLMv2)' Rule22 172.16.20.0/24 172.16.0.0/16 'Require inbound and request outbound' 'Computer (NTLMv2)' Server3 Rule31 Any Any 'Request inbound and outbound' 'Computer (Kerberos V5)' Rule32 172.16.30.80 172.16.10.10 'Require inbound and outbound' 'Computer (NTLMv2)'
upvoted 2 times
...
smorar
1 year ago
1. Y - Rule12 and Rule 31. 2. Y - Rule 31 3. Y - Rule 31
upvoted 1 times
...
SlavekJ
1 year, 8 months ago
No, Yes, Yes - tested in lab 1 Why N - Rule11 Server1 (is included in scope 172.16.1.0/24) requires communication via ipsec with Server2 only and in NTLMv2 auth ONLY, but Server2 in Rule 32 can´t talk with, because it has auth Kerberos only, Rule32 is not valid, because Server2 has no interface from these endpoints(subnets). 2 Why Yes - Rule32 is invalid, but Rule31 is only Request Rule, not requiring, it doesn´t work, secure communication is not estabilished, but if Server3 has no rules, they can talk to each other not securely. It works. 3 Why Yes - it is the same like in number 2, they can talk to each other non securely.
upvoted 3 times
...
calotta1
1 year, 10 months ago
Yes, No, Yes.
upvoted 1 times
...
KakashiCopyNinja
1 year, 11 months ago
This question is not solveable, because one rule table for Server2 is missing. Is there someone to add the missing table to complete this question?
upvoted 1 times
...
syu31svc
2 years, 1 month ago
Yes No No I will go with this after testing it out But given that rules 31 and 32 are likely meant for Server3 and no rules are shown for Server2, it would be inconclusive
upvoted 1 times
syu31svc
2 years, 1 month ago
I meant No Yes Yes after test
upvoted 3 times
...
...
STFN2019
2 years, 2 months ago
for me it's 3x yes
upvoted 1 times
...
cris66
2 years, 3 months ago
I do not know what I am talking about so don't trust my opinion. I have changed my mind yet again and now think Y,N,N. Based on. A connection security rule forces authentication between two peer computers before they can establish a connection and transmit secure information. They also secure that traffic by encrypting the data that is transmitted between computers. Windows Firewall with Advanced Security uses IPsec to enforce these rules. In order to use connection security rules, both of the computers involved in the communications must have IPsec policies configured.
upvoted 2 times
...
cris66
2 years, 3 months ago
I do not understand the precedence of rules. MS Docs "The connection security rule applies to communications between any computer in Endpoint 1 and any computer in Endpoint 2." I have no experience in IPSec but seems strange to apply the rules to a server when in examples it is usually applied to Default Domain Policy or an OU with specific servers requiring IPSec. In the case of Server1 with question1 which is the most specific rule? You have 2 rules where 1 rule is more specific for Endpoint 2 and the other rule is more specific for Endpoint1. How do you decide which is more specific?
upvoted 2 times
cris66
2 years, 3 months ago
How can 1 be N? Even if you say Rule11 is more specific and requires NTLMv2, server 2 is requesting Kerberos only, not requiring it, so it will be happy to use NTLMv2.
upvoted 1 times
...
...
jecawi9630
2 years, 4 months ago
Got this in exam, on 01/26/2023. This question here is missing table for Server 2, with the rules 21 and 22. Do not remember the endpoints but authentication mode and authentication method as same as in table for server 3.
upvoted 4 times
...
cris66
2 years, 5 months ago
This link suggests that a domain member server would by default be able to send NTLMv2. https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level Member Server Effective Default Settings Send NTLMv2 response only
upvoted 2 times
...
cris66
2 years, 5 months ago
I think Y,Y,Y. for the second 2, if we dont know, surely we have to assume that the firewall is turned on with the default set of rules which would permit NTLMv2.
upvoted 2 times
...
rimvydukas
2 years, 5 months ago
1. N - Rule 11 is more specific one and in combination with Rule 31 this gives access denied as Rule 11 requests NTLM. 2. Y - Rule 31, (assume there are no connection security rules on Server3) 3. Y - Rule 31, (assume there are no connection security rules on Server3) Tested in my lab.
upvoted 3 times
...
joehoesofat
2 years, 6 months ago
So we cant really answer any question about node 3 because we dont know its rules- so that makes this question easier- you see that ntlm is required for node 1 but not node 2- node 2 can do KErberos- and node 2 can a well- so the first one is Y. beyond that- It would seem node 3 would need to have NTLM enabled for the other 2 questions to be yes- but since we dont know we say no and no so Yes no no
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...