PrepAway - Latest Free Exam Questions & Answers

Category: 70-351

Exam 70-351: TS: Microsoft Internet Security and Acceleration (ISA) Server 2006, Configuring

Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer named ISA01 is included by your network. A new secure Web site is deployed by the company. An application named App01 is hosted by the Web site. The client IP source address in the App01 logs App01 should be recorded for every request. ISA01 should be set to have the new Web site published. First, an SSL Web publishing rule is created by you. Now, the rule should be configured so as to satisfy the requirements. Which action should be performed?

What will you do?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer named ISA01 is included by your network. ISA01 functions as a remote access VPN server and a DHCP server.
The company intends to have VPN client computers assigned the following DHCP options:
DNS, WINS, and Domain name.
On the DHCP server, a DHCP scope that contains the three DHCP options is created. It is reported by VPN users that file shares is unavailable after logging on to the network. After detailed analysis, you find that WINS or DNS server address is not assigned to the VPN clients, and primary domain name is not listed.
You should have DHCP options assigned to the VPN client computers. What will you do? (Choose more than one.)

Which action should be performed to finish the task?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer is included by your network and computer is named ISA01. Outgoing connections is permitted to the Internet. A network address translation (NAT) relationship between the Internal network and the Internet is defined by a network rule. Access to PPTP and L2TP over IPSec VPN servers on the Internet is required by users on ISA Server protected networks. All network computers, except ISA1, are set as both Web Proxy and Firewall clients. Access rules on ISA1 are created to permit outbound connections to the Internet by utilizing PPTP Client, IPSec NAT Traversal (NAT-T) Client, and IKE Client protocols. You find a problem that Internet PPTP and L2TP over IPSec VPN servers cannot be connected by the users. You are required to make sure that PPTP and L2TP over IPSec VPN servers on the Internet can be accessed by the users. Which action should be performed to finish the task?

Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server array that contains two servers in the company. Winsock Proxy access to the Internet is offered by the array. Firewall Client for ISA Server is installed to all client computers. In the event if the failure of one server, it is reported by the users that an Internet-based application that utilizes a custom port can not be accessed. You are required to make sure that the Internet-based application can be accessed by all users when a single server fails. Which action should be performed?

Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. You work as the administrator of an ISA Server 2006 computer, and the computer is named ISA01. The company has ISA01 connected to the Internet. And the company has all client computers configured as SecureNAT clients. According to the company’s new written security policy, the company permits only Web-based traffic through the ISA Server. But all instant messaging traffic was permitted in the past. ISA01 should be configured to all instant messaging traffic and all other non-Web traffic blocked. Which action should be performed?

What will you do to achieve the goal?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer is included by your network. A network address translation (NAT) relationship between the Internal network and the External network is defined by a network rule. A Windows Server 2003 computer is included by the Internal network, and the Windows Server 2003 is named Server01. You should utilize Remote Desktop to perform remote administration of Server01 from the External network. In addition, the users should be permitted to have a Remote Desktop connection to Server01 created by utilizing the non-standard TCP port 12345. What will you do to achieve the goal? (Choose more than one)

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server named ISA01 in the company. ISA Server 2006 is run by ISA01. Forward Web caching is provided by ISA01. An internal Web application is contained in the network. This application is accessed at http://app1.everbrightingbank.com. For ISA Server 2006, Firewall Client is run by all client computers. Now you receive an order from the company management. According to the company requirement, you have to make sure that the Web application can be accessed by all users directly. You intend to circumvent ISA01 to achieve your goal. So what action should you perform?

Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A server is included by your network, and ISA Server 2006 is run by the server. Microsoft Exchange Server 2007 is utilized by your company for e-mail. Users utilize Microsoft Office Outlook 2007 to access their e-mail. Users should be allowed to access their e-mail remotely. The number of ports that are opened should be minimized by your solution. Which action should be performed?

From the following four options, which two should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer is included by your network. The ISA is named ISA01, and the ISA is operating in a Workgroup. ISA01 serves as a remote access VPN server for the network. Remote access VPN clients can connect to ISA01 by utilizing either PPTP or L2TP over IPSec. However, it is reported that after the corporate network is connected, file shares on the network file server will be unavailable without first being presented with an authentication prompt. You are required to make sure that credentials should not be required from the users when file shares are accessed. From the following four options, which two should be performed? (Choose more than one)

What action should you perform to achieve this?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server 2006 array in the company network. Six members are contained in the array. In order to make sure that outbound Web requests are resolved within the array, Cache Array Routing Protocol (CARP) is enabled by you. You receive report from web users on the corporate network after you have CARP on the array enabled. The users complain that Internet access has a slower performance than normal. You check network traffic patterns on each of the ISA Server 2006 array members by using Network Monitor. You find that on the intra-array network, quite high network utilization exists. Therefore, the amount of intra-array traffic should be reduced. What action should you perform to achieve this?


Page 4 of 10« First...23456...10...Last »