What will you do to achieve the goal?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer is included by your network. A network address translation (NAT) relationship between the Internal network and the External network is defined by a network rule. A Windows Server 2003 computer is included by the Internal network, and the Windows Server 2003 is named Server01. You should utilize Remote Desktop to perform remote administration of Server01 from the External network. In addition, the users should be permitted to have a Remote Desktop connection to Server01 created by utilizing the non-standard TCP port 12345. What will you do to achieve the goal? (Choose more than one)
So what action should you perform?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server named ISA01 in the company. ISA Server 2006 is run by ISA01. Forward Web caching is provided by ISA01. An internal Web application is contained in the network. This application is accessed at http://app1.everbrightingbank.com. For ISA Server 2006, Firewall Client is run by all client computers. Now you receive an order from the company management. According to the company requirement, you have to make sure that the Web application can be accessed by all users directly. You intend to circumvent ISA01 to achieve your goal. So what action should you perform?
Which action should be performed?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A server is included by your network, and ISA Server 2006 is run by the server. Microsoft Exchange Server 2007 is utilized by your company for e-mail. Users utilize Microsoft Office Outlook 2007 to access their e-mail. Users should be allowed to access their e-mail remotely. The number of ports that are opened should be minimized by your solution. Which action should be performed?
From the following four options, which two should be performed?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer is included by your network. The ISA is named ISA01, and the ISA is operating in a Workgroup. ISA01 serves as a remote access VPN server for the network. Remote access VPN clients can connect to ISA01 by utilizing either PPTP or L2TP over IPSec. However, it is reported that after the corporate network is connected, file shares on the network file server will be unavailable without first being presented with an authentication prompt. You are required to make sure that credentials should not be required from the users when file shares are accessed. From the following four options, which two should be performed? (Choose more than one)
What action should you perform to achieve this?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server 2006 array in the company network. Six members are contained in the array. In order to make sure that outbound Web requests are resolved within the array, Cache Array Routing Protocol (CARP) is enabled by you. You receive report from web users on the corporate network after you have CARP on the array enabled. The users complain that Internet access has a slower performance than normal. You check network traffic patterns on each of the ISA Server 2006 array members by using Network Monitor. You find that on the intra-array network, quite high network utilization exists. Therefore, the amount of intra-array traffic should be reduced. What action should you perform to achieve this?
So what action should you perform?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server 2006 computer named ISA01 in the company network. ISA01 is configured to permit outbound Internet access. There is a listener named DefaultHTTP. This listener is also configured to listen for requests on port 80 on the external interface. There are two Web sites in the Internal network. The two Web sites are respectively named IT and Marketing. Employees use the two Web sites. The IT Web site is stored on a Web server named Web1.wiikigoinc.com. The Marketing Web site is stored on a Web server named Marketing1.wiikigoinc.com. Employees use the URL http://www. wiikigoinc.com to access the wiikigo, Inc., Web site. Employees must be allowed to access both the IT Web site and the Marketing Web site from the Internet. You must make sure that employees are able to use the URL http://www. wiikigoinc.com/it to access the IT Web site. You must also guarantee that employees can access the Marketing Web site by using the URL http://www. wiikigoinc.com/marketing. So what action should you perform?
Which action will you perform in the ISA Server log?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server array is included by your network and inbound and outbound firewall services are offered by the ISA Server array. The company set all client computers as SecureNAT clients. 1,000 users are contained on the network. The naming convention is Firstname.Lastname. A URL set in ISA Server named Blocked Web Sites is contained, and the URLs of 10 Web sites are included by the Blocked Web Sites. An Internet access rule is created, and access to the Blocked Web Sites URL set should be excluded. It is reported by a user named Nathan Geiger that 10 blocked Web sites are available to him. The ISA Server rule that allows Nathan to access the blocked Web sites should be identified. Which action will you perform in the ISA Server log?
Which action should be performed?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A single ISA Server 2006 computer named ISA01 is contained by your network. According to the company’s new, written security policy, internal computer names should not be published or available via the Internet. A new Web site should be published and many internal computer names within the Web site are contained by the new Web site. You are required to have this Web site published without violating the company’s security policy. Which action should be performed?
What will you do to configure the array by the use of the ISA Server management console?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There are two employees in your company, and remote access to the network is required by them. An ISA Server Enterprise Edition array is contained by your network.
And two servers are included by an ISA Server Enterprise Edition array. Firewall services and Web proxy services are offered by the array. The array should be configured to have VPN gateway services offered for remote client connections. What will you do to configure the array by the use of the ISA Server management console? (Choose more than one.)
So which authentication method should be choosed?
You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a VPN server in the company network. ISA Server 2006 is run by this VPN server. According to the company requirement, two-factor authentication for VPN access should be implemented. Since you are the technical support, the company assigns this task to you. You have to decide the authentication protocol which will support your planned implementation. So which authentication method should be choosed?