What should you do to ensure that the user can use Remote Web Access to connect to her computer?
You are the administrator for a network that runs Windows Small Business Server (SBS) 2011 Standard. A user reports that when she logs on to the Remote Web Access website and attempts to remotely connect to her office computer, the following message is displayed in the Computers section: There are no computers available for remote access. You need to ensure that the user can use Remote Web Access to connect to her computer. You must also ensure that she cannot use Remote Web Access to connect to any other computer. What should you do?
What should you do to plan a name resolution strategy for Internet access?
You are the systems engineer for Contoso, Ltd. The network consists of a single Active Directory domain named contoso-ad.com. All servers run Windows Server 2003.
A Windows Server 2003 computer named DNSSRV1 functions as the internal DNS server and has zones configured as shown in the exhibit. (Click the Exhibit button.)
The network is not currently connected to the Internet. The company maintains a separate network that contains publicly accessible Web and mail servers. These Web and mail servers are members of a DNS domain named contoso.com. The contoso.com zone is hosted by a UNIX-based DNS server named UNIXDNS, which is running the latest version of BIND. The company plans to allow users of the internal network to access Internet-based resources. The company’s written security policy states that resources located on the internal network must never be exposed to the Internet. The written security policy also states that the internal network’s DNS namespace must never be exposed to the Internet. To meet these requirements, the design specifies that all name resolution requests for Internet-based resources from computers on the internal network must be sent from DNSSRV1. The current design also specifies that UNIXDNS must attempt to resolve any name resolution requests before sending them to name servers on the Internet.
You need to plan a name resolution strategy for Internet access. You need to configure DNSSRV1 so that it complies with company requirements and restrictions.
What should you do?
What should you do to design a monitoring strategy for the folders that contain customer information?
You need to design a monitoring strategy for the folders that contain customer information, which are shown in the Customer Data window below:
exhibit What should you do?
What should you do to select the appropriate actions to take in the scenario?
You work as a network administrator at Bilco Engineering, Inc. You have received instruction to start the design of an access control and permission strategy that will be used for user objects in Active Directory. You are required to select the appropriate actions to take in the scenario. exhibit What should you do?
What should you do to provide a solution which will meet the public Web site’s security requirements?
You work as a network administrator at Bilco Engineering, Inc. You have received instruction from the Bilco Engineering, Inc. network CIO to start designing the company’s Active Directory structure. You are required to provide a solution which will meet the public Web site’s security requirements. You are required to choose which of the following designs are suitable. What should you do? (Select the appropriate exhibit to use)
Which authentication method should be employed to provide for the desired level of security…
Which authentication method should be employed to provide for the desired level of security for customers who log on using portable computers?
Which action should be performed next to ?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A single server that runs ISA Server 2006 is contained by the network.
A new Web server is installed on your network. A Web site is hosted by the Web server. The ISA Server is configured to publish the Web site by utilizing SSL bridging. A new Web listener is created on the ISA Server. A certificate named ISA02k6.contoso.com is selected from the list of available certificates. The error message shown in the exhibit is displayed.
You should make sure that the certificate should be assigned to the new Web listener. You utilize Microsoft Management Console (MMC) to create a new console. Which action should be performed next?
Which action should be performed to utilize the most secure IPSec authentication method possible to enable the
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a main office in the company, and the company plans to add a branch office. There is an ISA Server 2006 computer in the main office and the new branch. You intend to utilize a site-to-site VPN to connect the main office and the branch office networks. A site-to-site VPN connection is created, and the company utilizes the L2TP over IPSec VPN protocol to connect the office networks. The company installs computer certificates on the ISA Server computer at each office. When the remote site network is created on each ISA Server computer, it is set to utilize certificates and a preshared key. The company sets the preshared key as the office name on the ISA Server computer at at each office. From the ISA Server computer at the main office, the ping command is repeatedly run to a host on the branch office network. The site-to-site VPN cannot work successfully. The Routing and Remote Access console is opened and the demand-dial interface is manually dialed. The following error message is displayed. The last connection attempt cannot work. A processing error is encountered by the security layer during initial negotiations with the remote computer, so that the L2TP connection attempt failed.
You are required to utilize the most secure IPSec authentication method possible to enable the site-to-site VPN connection. Which action should be performed?
Which action should you perform to make sure that the virus update Web site and the Windows Update Web site ca
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. You work as the network administrator in your company. Two ISA Server 2006 computers are included by the network, and the two computers are respectively named ISA01 and ISA02. There is a main office and one branch office in the company.
ISA01 and ISA02 are respectively in the main office and the branch office. ISA01 connects to the Internet, while ISA02 connects to the main office over a dedicated WAN link. Windows XP Professional is run by all client computers.
All client computers should have the ability to have virus definitions updated from the virus update Web site. The virus update Web site and the Windows Update Web site can be connected by ISA02.
You find a problem that the virus update Web site or the Windows Update Web site cannot be connected by ISA01. You can see the configuration of the firewall policy on ISA01 from the exhibit listed below.
You are required to make sure that the virus update Web site and the Windows Update Web site can be connected by ISA01.
Which action should you perform?
What action should you perform to make sure that resources on the Internet can be accessed by users in the acc
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server 2006 computer in the network. This computer is named ISA01. ISA01 has been configured to allow marketing department users to access resources on the Internet. Because of working requirement, users in the account department also need access to resources on the Internet. For the Account department, a new network and computers are added by you. You perform the installation of the Firewall Client and have the Web Proxy client configured on all computers in the new network. The exhibit below shows the configuration of the company network. Users in the account department report that resources on the Internet cannot be accessed by them. But you are sure that resources on the Internet can still be accessed by users in the marketing department and the internal servers. You have to solve this problem as soon as possible. That is to say, you have to make sure that resources on the Internet can be accessed by users in the account department. So what action should you perform to achieve this goal?