Which of the following rules will you have to implement to make this happen?
You are building the rules of your new firewall. You wish to allow only (Internal) access to standard
www sites on the Internet (External). You wish for all other traffic to be disallowed. Which of the
following rules will you have to implement to make this happen?
Which of the following rules will you have to implement to make this happen?
You are building the rules of your new firewall. You wish to allow only (Internal) access to secure
www sites on the Internet (External). You wish for all other traffic to be disallowed. Which of the
following rules will you have to implement to make this happen?
Which of the following rules will you have to implement to make this happen?
You are building the rules of your new firewall. You wish to allow only (Internal) access to smtp
email on the Internet (External). You wish for all other traffic to be disallowed. Which of the
following rules will you have to implement to make this happen?
What are the two options for you to configure on ISA Server 2006 for logging?
After you configure the monitoring options on your ISA Server 2006, you wish to configure logging.
What are the two options for you to configure on ISA Server 2006 for logging?
What does ISA Server 2006 use to prioritize packets?
Your company has many different services that go through your ISA Server 2006, and you need to
prioritize the network traffic. What does ISA Server 2006 use to prioritize packets?
What are the three basic areas of a newly installed ISA Server 2006 firewall?
You have just installed ISA Server 2006 on a Windows Server in your network, and you are
familiarizing yourself with the new firewall. What are the three basic areas of a newly installed ISA
Server 2006 firewall?
which two layers of the OSI model does a simple (stateless) packet filtering firewall operate?
You are considering your options for a new firewall deployment. At which two layers of the OSI
model does a simple (stateless) packet filtering firewall operate?
What kinds of attacks will this system be able to detect?
You have just installed your new network-based IDS. What kinds of attacks will this system be
able to detect?
what is the process by which you remove un-needed services and features from a machine to reduce the risk of v
When installing a firewall, what is the process by which you remove un-needed services and
features from a machine to reduce the risk of vulnerabilities to the underlying OS called?
What is the part of ISA Server used for saving your configuration changes?
Recently, you have made many changes to your ISA Server 2006 firewall. You are concerned
about saving these changes. What is the part of ISA Server used for saving your configuration
changes?