Network+ Disaster Recovery Quiz 1

November 9, 2017 at 1:54 pm

Disaster recovery (DR) is a critical component in networking today. It can encompass policies, tools, and procedures to enable the recovery or continuation of vital technology following a natural or human-induced disaster. Enjoy this quiz on the subject with the scope being Network+ from CompTIA.

Network+ Quiz - Disaster Recovery 1

Congratulations - you have completed Network+ Quiz - Disaster Recovery 1. You scored %%SCORE%% out of %%TOTAL%%. Your performance has been rated as %%RATING%%
Your answers are highlighted below.
Shaded items are complete.

70-742 Additional Notes – Standalone Certificate Authorities

August 20, 2017 at 1:54 pm



Stand-alone certification authorities (CAs) can issue certificates for purposes such as:

  • Digital signatures
  • Secure e-mail by using S/MIME (Secure Multipurpose Internet Mail Extensions)
  • Authentication to a secure Web server by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS)


  • Unlike an enterprise CA, a stand-alone CA does not require the use of Active Directory Domain Services (AD DS). Even if you are using AD DS, stand-alone CAs can be used as offline trusted root CAs in a CA hierarchy or to issue certificates to clients over an extranet or the Internet.
  • When users submit a certificate request to a stand-alone CA, they must provide their identifying information and specify the type of certificate they need. (This does not need to be done when submitting a request to an enterprise CA because the enterprise user’s information is already in AD DS and the certificate type is described by a certificate template). The authentication information for requests is obtained from the local computer’s Security Accounts Manager database.
  • By default, all certificate requests sent to the stand-alone CA are set to pending until the administrator of the stand-alone CA verifies the submitted information and approves the request. The administrator has to perform these tasks because the certificate requester’s credentials are not verified by the stand-alone CA.
  • Certificate templates are not used.
  • The administrator has to explicitly distribute the stand-alone CA’s certificate to the domain user’s trusted root store, or users must perform that task themselves.
  • If a cryptographic provider supporting elliptic curve cryptography (ECC) is used, a stand-alone CA will honor every key usage for the ECC key.

When a stand-alone CA uses AD DS, the CA has these additional features:

  • If a member of the Domain Admins group or an administrator with Write access to a domain controller installs a stand-alone root CA, it is automatically added to the Trusted Root Certification Authorities certificate store for all users and computers in the domain. For this reason, if you install a stand-alone root CA in an Active Directory domain, you should not change the default action of the CA upon receiving certificate requests (which marks requests as pending). Otherwise, you will have a trusted root CA that automatically issues certificates without verifying the identity of the certificate requester.
  • If a stand-alone CA is installed by a member of the Domain Admins group of the parent domain in the enterprise, or by an administrator with Write access to AD DS, then the stand-alone CA will publish its CA certificate and the certificate revocation list (CRL) to AD DS.

70-742 Additional Notes – AD Federation Services with Device Registration

August 19, 2017 at 2:53 pm



You can add the Device Registration Service (DRS) to your Active Directory Federation Service (AD FS) configuration. DRS provides seamless second factor authentication, persistent single sign on, and conditional access to devices attempting to access your corporate resources.

Prepare your Forest

To properly implement DRS, you first should prepare your forest. To do this you must meet the following requirements:

  • You must be an Enterprise Admin
  • The forest must be at the Windows Server 2012 R2 schema or higher
  • There must be at least one Global Catalog Server in the forest root domain

Step 1 – On the Federation Server run the PowerShell command:


Step 2 – When prompted for the ServiceAccountName – enter the service account you used for AD FS

Enable DRS on a Federation Server Farm Node

One each node in the farm, run the PowerShell command:


Enable Seamless Second Factor Authentication

Use the AD FS Management Console and navigate to Authentication Policies. Select Edit Global Primary Authentication. Click Enable Device Authentication and click OK.

Update the Web Application Proxy Configuration

On the WAP server – run the PowerShell command:


When prompted, input an account with administrative credentials.

70-742 Additional Notes – The Remote Access Server Role and WAP

August 18, 2017 at 4:22 pm


The important Remote Access server role incorporates the following technologies:

  • Remote Access Service (RAS)
  • Routing
  • Web Application Proxy (WAP) 

The Web Application Proxy is the most relevant role service above for the 70-742 exam and it explicitly makes the exam blueprint.

Remember the Web Application Proxy is to provide reverse proxy functionality for Web applications that exist inside your corporate network. What this means is that it permits outside users (on any device) to access these Web applications from outside your network.

WAP pre-authenticates access to your Web applications using Active Directory Federation Services (AD FS) and can also function as an AD FS proxy.

To install this powerful service, use the Add Roles wizard and target the RAS server role – or use PowerShell as follows:

Install-RemoteAccess -VpnType SstpProxy

Some features of WAP that are new in Server 2016 include:

  • Preauthentication for HTTP Basic application publishing – this allows mobile devices to use ActiveSync with Exchange
  • Wildcard domain publishing of applications  – this simplifies integration of services like SharePoint that have many applications in a domain to be published
  • HTTP to HTTPS Redirection
  • HTTP application publishing using pass-through preauthentication
  • Remote Desktop Gateway Apps
  • Better debug logging
  • Admin Console UI improvements
  • Propagation of client IP address to backend applications



CCNA – IP Networks Quiz

August 7, 2017 at 10:26 pm

Enjoy this quiz hitting a variety of fun IP network topics from the Cisco CCNA certification area. Note that many of these topics also apply to a wide variety of certifications from a wide variety of vendors – including CompTIA A+ and Network+.

CCNA - IP Networks


Congratulations - you have completed CCNA - IP Networks.

You scored %%SCORE%% out of %%TOTAL%%.

Your performance has been rated as %%RATING%%

Your answers are highlighted below.
Shaded items are complete.