PrepAway - Latest Free Exam Questions & Answers

You need to configure Server1 to log the details of access attempts by VPN users

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS).

Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network.

You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users.

What should you do?

PrepAway - Latest Free Exam Questions & Answers

A.
Configure the system event log to Do not overwrite.

B.
In IAS, in Remote Access Logging, enable the Authentication requests setting.

C.
Create a custom remote access policy and configure it for Authentication-Type.

D.
Configure the Remote Access server to Log all events.

Explanation:
Internet Authentication Services (IAS) is a service included with Microsoft Windows Server 2003 that provides centralized authentication and authorization services. Remote Access Logging lists log files and allows you to configure additional logging options, one of which is authentication requests.

Reference:

Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training System, Syngress Publishing Inc., Rockland, 2003, p. 312

Craig Zacker, MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, Washington, 2004, p. 5:


Leave a Reply