What should you do?
Your network contains an ISA Server 2006 array. The array provides Internet access and Web caching services.
A Web cache database exists on the ISA Server. The Web cache database uses the default settings.
Users access an external Web site daily. The Web site contains several large graphics. The domain name for the Web site is www.contoso.com. The Web site is accessible by using HTTP and HTTPS.
Some users report that the Web site takes a long time to load. You need to ensure that all users can access the Web site from the Web cache.
What should you do?
How should you configure authentication for the Web listener and the Web publishing rule?
Your network contains a server that runs ISA Server 2006. The ISA Server provides reverse proxy services.
The network also contains a Web server that runs Internet Information Services (IIS). The Web server requires user authentication.
You need to configure the ISA Server to provide access to the Web server. You want to achieve this goal while meeting the following requirements:
Authenticates inbound traffic from applications that pass through the reverse proxy. Implements a two-factor authentication system for remote access to the Web server. Does not use Windows passwords for to remote access authentication. Prompts users for authentication only once per session. You create a Web listener. You create a Web publishing rule that publishes the Web server. How should you configure authentication for the Web listener and the Web publishing rule?
What should you do?
Your network contains an ISA Server Enterprise Edition array. The array provides publishing and reverse proxy services. To ensure redundancy, the array contains two member servers. The array has Network Load Balancing configured on the external network only. You have a terminal server on the internal network. You install a certificate on the terminal server and configure the terminal server to use Secure Sockets Layer (SSL) as the security layer.
You need to configure the array to provide remote access to the terminal server.
What should you do?
Which action should be performed?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in your company, and ISA Server 2006 is run by the server. Web Proxy services are provided forward by the ISA Server for all users. An SQL database server is utilized by the ISA Server for the Firewall logs and the Web Proxy logs. The SQL database cannot work successfully. It is reported by the users that the Internet is not available. The ISA Server should be set to make sure that the users can get access to Internet when the SQL database fails. Which action should be performed?
Which action should be performed?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A server that runs ISA Server 2006 is included by your network. Microsoft Exchange Server 2007 is run by another server. The company has set Outlook Web Access (OWA) on the Exchange server to utilize Basic authentication. External user’s access should be provided to OWA on the Exchange Server. And the company intends to require the clients for re-authentication if their session is not active for a long period of time. Which action should be performed?
Which action should be performed?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer named ISA01 is included by your network. A new secure Web site is deployed by the company. An application named App01 is hosted by the Web site. The client IP source address in the App01 logs App01 should be recorded for every request. ISA01 should be set to have the new Web site published. First, an SSL Web publishing rule is created by you. Now, the rule should be configured so as to satisfy the requirements. Which action should be performed?
What will you do?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer named ISA01 is included by your network. ISA01 functions as a remote access VPN server and a DHCP server.
The company intends to have VPN client computers assigned the following DHCP options:
DNS, WINS, and Domain name.
On the DHCP server, a DHCP scope that contains the three DHCP options is created. It is reported by VPN users that file shares is unavailable after logging on to the network. After detailed analysis, you find that WINS or DNS server address is not assigned to the VPN clients, and primary domain name is not listed.
You should have DHCP options assigned to the VPN client computers. What will you do? (Choose more than one.)
Which action should be performed to finish the task?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer is included by your network and computer is named ISA01. Outgoing connections is permitted to the Internet. A network address translation (NAT) relationship between the Internal network and the Internet is defined by a network rule. Access to PPTP and L2TP over IPSec VPN servers on the Internet is required by users on ISA Server protected networks. All network computers, except ISA1, are set as both Web Proxy and Firewall clients. Access rules on ISA1 are created to permit outbound connections to the Internet by utilizing PPTP Client, IPSec NAT Traversal (NAT-T) Client, and IKE Client protocols. You find a problem that Internet PPTP and L2TP over IPSec VPN servers cannot be connected by the users. You are required to make sure that PPTP and L2TP over IPSec VPN servers on the Internet can be accessed by the users. Which action should be performed to finish the task?
Which action should be performed?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server array that contains two servers in the company. Winsock Proxy access to the Internet is offered by the array. Firewall Client for ISA Server is installed to all client computers. In the event if the failure of one server, it is reported by the users that an Internet-based application that utilizes a custom port can not be accessed. You are required to make sure that the Internet-based application can be accessed by all users when a single server fails. Which action should be performed?
Which action should be performed?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. You work as the administrator of an ISA Server 2006 computer, and the computer is named ISA01. The company has ISA01 connected to the Internet. And the company has all client computers configured as SecureNAT clients. According to the company’s new written security policy, the company permits only Web-based traffic through the ISA Server. But all instant messaging traffic was permitted in the past. ISA01 should be configured to all instant messaging traffic and all other non-Web traffic blocked. Which action should be performed?